You are here

4 Reasons Your Child Might Want to Become a Hacker

Did you know that not all “hackers” are criminals? Many organizations are looking for white-hat hackers -- people who break down malicious code -- to help defend against cyberattacks, writes malware researcher Amanda Rousseau in a recent article in Teen Vogue. She offers four reasons why students, especially girls, should consider this career path, including the high demand for these jobs and the opportunity to positively affect the world and make a difference in people’s lives.

Girl Scouts to Offer Cybersecurity Badges

Would you like a few strings of code with those cookies? Beginning in 2018, the Girl Scouts of the USA will offer 18 cybersecurity badges – including coding, principles of firewalls and even white hat hacking - available to girls in their programs who are in kindergarten through 12th grade. Girl Scout officials say the initiative seeks to encourage girls to pursue careers in the technology industry. The Girls Scouts currently have 1.8 million girls enrolled.

Your Cell Number – Are You Sharing It Too Freely?

Here’s a bad piece of news. Our cell phone numbers becoming a lot like Social Security numbers: they are the gateway to our identities, providing an entrance to personal data – your email address, physical address, even physical whereabouts—and all the personal information that is kept about you by nearly all corporations, financial institutions, and social media networks. Yet when we are asked for our cell numbers for whatever reason, we often give them out without even a second thought.  What can you do? Take a look at these tips and use common sense. If you are asked for your phone number, it never hurts to ask why.

Tips for Combating Hackers on Connected Devices

Teaching kids about the security vulnerabilities with Internet of Things (IoT) devices can help them avoid falling prey to hackers, writes Jacob Batchelor in an article entitled You've Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era. Batchelor explains ways to introduce the problem of hacking to kids, help them recognize the problem of IoT hacks, and show them what they can do to protect their privacy. Experts predict that in just a few years, interconnected devices such as refrigerators, baby monitors, toys, Amazon’s Echo and Google’s Home, will number in the billions.

Edmodo Hack Revealed

A recent hack of the educational platform Edmodo compromised tens of millions' user records and led to the revelation that the company was not only using ad trackers to monitor student and teacher behavior, but then forwarding the data to data brokers. The company issued a statement saying it is investigating the security breach and it has removed the "problematic" ad-tracking code from its platform. Edmodo is a platform that 78 million teachers, students and parents use to communicate about homework and lesson plans, and more.

Is Teaching Kids Ethical Hacking Essential?

Most kids do not grow up dreaming of becoming a hacker, but that may be exactly what the US needs according to David Brumley, a professor of computer and electrical engineering at Carnegie Mellon. Brumly promotes the idea of a nationwide cybersecurity education program to bolster cybersecurity and protect the nation from attacks, and writes that we need to recognize that the hacking mindset - learning to think differently, being curious, and always experimenting - is very valuable and may be the only way to keep this country safe in the future.

A Different Kind of Baby Monitor

How would you feel about a sound activated, WiFi speaker that is being touted as a device to help take care of your kids? Toymaker Mattel recently announced Aristotle by Nabi, a smart baby monitor device that has interactive capabilities. Aristotle is designed similar to an Amazon Echo or a Google Home, but programmed for children. Put another way, the hub is “an AI (artificial intelligence) to help raise your child,” as Fast Company described it. Mattel said that Aristotle could do everything from playing a lullaby for a crying baby to ordering diapers. It sounds like a device from the future and might make some people question how much is too much technology in our lives?

Social Media Sites Band Together Against Terror

Twitter, YouTube, and Facebook have all announced that they will be sharing databases to prevent terrorist groups from using the sites to post content and recruit. "There is no place for content that promotes terrorism on our hosted consumer services," the companies said in a joint statement.

Given the recent discussions about the spread of fake news on social media, critics hope this new collaboration could potentially pave a path for the companies to work together on other initiatives going forward. The problem of false news raises questions about the potential role these companies should play in battling that content. Some feel these companies have no business being arbitrators of the news or what’s right and wrong — and it would be easy for the companies to keep themselves removed and escape all responsibility in the matter. However, because of their outsized influence on today’s web, these companies are beginning to wake up to the fact that they will be held accountable for the content shared on their platforms considering that content has the ability to influence everything from terrorist acts to how people perceive the world on a global scale.

Voter Data Vulnerable To Hackers

As more and more states are using electronic voting systems in the US, the discovery of data breaches involving voter registration information worldwide is raising the question of

Ransomware Continues to be a Problem

Can you imagine how you would feel if a voice came through your computer’s speakers demanding a Bitcoin payment in return for your private tax files or for not telling the world about a medical con

Competitors with Capabilities

The potential for a widespread cyberattack on the US by another country or a terrorist cell is a real fear for Adm. Michael Rogers, head of US Cyber Command.

Seven Kinds of Cyberattacks

Former White House cybersecurity official Richard Clarke recently spoke at a health conf

Don’t Take Anything at Face Value - Misinformation

For a long time many watchers of the digital landscape have quietly been saying that the biggest cybersecurity risk is not identity theft, but misinformation.

Hackers and Your Personal Information – Assessing Your Risk

Do you think your personal information may have been exposed to hackers? You are not alone. Half of American adults had their personal information exposed to hackers last year.

Keeping Your Data Safe From Hackers

In the wake of revelations about the hundreds of millions of email address and other types of personal identification being hacked, there are some simple things you can do to protect yourself...

Watch Out for that USB Device

When it comes to school projects involving groups, one of the greatest inventions has been the USB drive for carrying files from house to house and home to school...