Skip to main content

Home/ Digital Citizenship in Schools/ Group items tagged hacking

Rss Feed Group items tagged

John Pearce

Where You'll Get Hacked [infographic] - 7 views

  •  
    "People complain that they want privacy, and then they put all their information up on Facebook. Thus, hacking is ultra-easy. I have seen teenagers post pictures of their first credit card, then a month later their new college student I.D. These kids are so excited to have signs of growing up, but as we grow up our lives need to be more private to guard from hackers. Now I am a culprit of being very relaxed about my online privacy, meaning, I have the same password for multiple sites, I use my high school name as my clue, and the name of my high school is on Facebook somewhere. So hack away, I look forward to meeting the person who decides to take up my identity!"
Barbara Combes

Why the AP hack is likely to happen again - 2 views

  •  
    An embarrassing Twitter hack caused a plunge in the markets and revealed the weakness in our reliance on technology. AAP It has been a bad couple of weeks for social media and Twitter in particular.
John Pearce

How to Protect Your Privacy and Secure Your Accounts Online - 4 views

  •  
    "Online privacy is a big issue, and the increasing popularity of social networks have only aided in adding fuel to the fire of this debate. But whether you're running a business online and don't want your accounts being hacked or you simply enjoy being active online and don't want your personal information or banking details being stolen, there are steps you can take to protect your privacy and more effectively secure your accounts."
Judy O'Connell

7 Tips for Citing an App in MLA Format | edSocialMedia - 6 views

  •  
    "That was the question I asked my students this fall and the answer I got surprised me. Students increasingly aren't going to the premium information services we've set up for them through our school library. They might not even be inclined to go elsewhere on the Web. Instead they often turn to Apps for their information. From The Elements to NASA, from National Geographic to the National Science Foundation there is a wealth of credible content in the App Store, but if students are using this information in an academic setting how do we help them correctly document and cite these sources? "This is a case of technology being ahead of the Modern Language Association," said my colleague Stephen Freeborn, longtime English teacher, but together with our school librarian we found a work-around hack that gets the job done."
John Pearce

The attack that could destroy the internet - 1 views

  •  
    "Almost since the birth of the internet there have been computer users who have attacked and hacked other computers out of malice or just because they could. One of these types of attacks features quite regularly in mainstream news; a Denial of Service or DoS attack. That's the general name they're given but actually a DoS attack is quite an old form of web attack and one that is largely unused. "
John Pearce

Internet of hackable things: wired world wide open to new age of cyber crime - 1 views

  •  
    "It sounds like the stuff of sci-fi nightmares - a stranger hacking your baby cam and shouting abuse at your toddler. Someone controlling your home's lights and power points via a system that should only respond to your smartphone. Criminals watching you and your family from your smart TV without your knowledge. But each of these has already happened, and mark the beginning of a cyber crime wave threatening business, governments and individuals around the world. The number of smart devices being connected online in what's called the "Internet of Things" will rocket from 13 billion to an estimated 50 billion by 2020. The problem, says LA security consultant Marc Goodman, is that they're all hackable."
Judy O'Connell

New Hacking Tools Pose Bigger Threats to Wi-Fi Users - NYTimes.com - 1 views

  •  
    "You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents' basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online. "
Judy O'Connell

In Cyberspace, No One Can Hear You Cry « Literacy 2.0 - 0 views

  •  
    "Cyberbullying is a new version of an old problem that presents a thorny paradox: We can't equip our kids with the skills they need to function in a digital world without inadvertently equipping them to be cyberbullies. Many of the "best" cyberbullies tend to be among our most digitally literate young people. Anyone can send a hate text, but it takes some serious cyberchops to hack a website or a profile page and plaster it with shameful pictures, hurtful messages and false accusations. Advanced technology skills in the hands of a bully are analogous to advanced weaponry in the hands of a terrorist. The more skillfully they are deployed, the more damage they cause."
Judy O'Connell

Preteen girls charged over Facebook sex prank - 2 views

  •  
    "Two preteen US girls accused of hacking into a classmate's Facebook page and posting sexually explicit photos and messages have been charged with cyberstalking and first-degree computer trespassing."
1 - 10 of 10
Showing 20 items per page