May 31, 2016

Two other reasons for the spread of malware in advertising include the complexity of ad networks and a lack of accountability, says Jonathan Voris, an assistant professor of computer science at the New York Institute of Technology. When a user visits an ad-sponsored site, "at least a dozen different websites are contacted in order to serve up that advertising content," he says. That creates a lot of points of entry for hackers, who also exploit the fact that no one is sure who should take responsibility for malware being put on a user's computer...

May 30, 2016

In the last two years, there has been a perfect storm on the topic of student data privacy. The role of technology within schools expanded at an unprecedented rate, general awareness of consumer data security and breaches increased, and student databases at the state or national level were established or proposed, which drew great public scrutiny and fear.

May 25, 2016

Education 3.0, like other technology-driven changes from e-commerce to social networking, has powerful benefits. But, it also brings new concerns. It has a great capacity to engage and inspire students but many educators and parents are concerned about the cyber-security risks associated with the interconnectivity of Education 3.0, which are, unfortunately, quite real and require a pro-active approach to protect students, schools and universities.

May 20, 2016

A hacker is attempting to sell the account information of 117 million LinkedIn users stolen as part of a 2012 breach that appears much worse than originally thought. “Yesterday, we became aware of an additional set of data that had just been released,” the company said in a statement Wednesday. “We have no indication that this is as a result of a new security breach.”

May 15, 2016

Giving students an early start on computer science education with a focus on security is crucial. And high school is already too late, argues Project Lead the Way’s Vince Bertram. There is a disturbing trend in computer science education today: Not one of the top 10 computer science programs in the U.S. requires so much as a single cybersecurity course as a prerequisite for graduation, and just three of the top 50 computer science programs, as ranked by Business Insider, require majors to complete such a course.

May 13, 2016

When students are using a learning management system or a digital curriculum, their individual performance data is collected and shared with their teacher and other instructional personnel to help assess their progress.

May 09, 2016

Education lives in an era of big data and small devices. Smart devices, systems, and services that talk to other devices via the Internet mean educators as well as students can all be more productive. But this new-found freedom and the combination of mobile computing access to always-connected, cloud-based software has created headaches for anyone tasked with the job of securing it all.

May 05, 2016

Silicon Valley has struggled to notch policy wins in recent years on its legislative priorities, including immigration and patent reform, though the tech industry has succeeded in strengthening net neutrality protections and curtailing some government surveillance programs.

May 03, 2016

A series of data breaches overseas are spurring concerns that hackers could manipulate elections in the United States. Since December, hundreds of millions of voters in the U.S., the Philippines, Turkey and Mexico have had their data discovered on the web in unprotected form. In some instances, legitimate security researchers found the information, but in others, malicious hackers are suspected of pilfering the data for criminal purposes.

May 02, 2016

Clapper’s intelligence assessment details how Russian cyber actors are creating new ways to remotely hack into industrial control systems that run electrical power grids, urban mass-transit systems, air-traffic control networks, and oil and gas pipelines. According to private-sector cyber security experts, these actors have been able to successfully compromise the product supply chains of three control system vendors so customers unknowingly downloaded exploitative malware directly from the vendors’ websites along with routine software updates.