July 25, 2016

Over the years there have been two distinct varieties of ransomware which remain consistent: crypto and locker based. Crypto-ransomware is ransomware variants that actually encrypt files and folders, hard drives, etc. Whereas Locker-ransomware only locks users out of their devices, most often seen with Android based ransomware.

July 15, 2016

Fifty-one-year-old Su Bin, owner of Chinese aviation firm Lode-Tech, was sentenced to 46 months in prison for his part in a conspiracy to sell military technical data stolen from U.S. defense firms to state-owned companies in China, according to the Justice Department. Su, a citizen of the People's Republic of China, was sentenced July 13 in a federal court in California.

June 30, 2016

In 2014, a single U.S. government agency was hit with a blizzard of more than 1,370 external attacks on its most vital computer systems, with three out of every eight incidents resulting in a loss of data, according to a new report by the watchdog Government Accountability Office, suggesting hackers have been far more successful at getting at sensitive government information than previously disclosed.

June 28, 2016

The simplest way to prevent ransomware attacks is to regularly backup all of the important contents on your PCs. Dedicated backup software makes full copies of hard disk drives and stores them on some external source, usually a storage drive that is disconnected and purposefully kept offline following backups. Some newer cloud services can also make point-in-time backups that are stored on external servers, and they offer a similar level of protection.

May 31, 2016

Two other reasons for the spread of malware in advertising include the complexity of ad networks and a lack of accountability, says Jonathan Voris, an assistant professor of computer science at the New York Institute of Technology. When a user visits an ad-sponsored site, "at least a dozen different websites are contacted in order to serve up that advertising content," he says. That creates a lot of points of entry for hackers, who also exploit the fact that no one is sure who should take responsibility for malware being put on a user's computer...

May 30, 2016

In the last two years, there has been a perfect storm on the topic of student data privacy. The role of technology within schools expanded at an unprecedented rate, general awareness of consumer data security and breaches increased, and student databases at the state or national level were established or proposed, which drew great public scrutiny and fear.

May 25, 2016

Education 3.0, like other technology-driven changes from e-commerce to social networking, has powerful benefits. But, it also brings new concerns. It has a great capacity to engage and inspire students but many educators and parents are concerned about the cyber-security risks associated with the interconnectivity of Education 3.0, which are, unfortunately, quite real and require a pro-active approach to protect students, schools and universities.

May 20, 2016

A hacker is attempting to sell the account information of 117 million LinkedIn users stolen as part of a 2012 breach that appears much worse than originally thought. “Yesterday, we became aware of an additional set of data that had just been released,” the company said in a statement Wednesday. “We have no indication that this is as a result of a new security breach.”

May 15, 2016

Giving students an early start on computer science education with a focus on security is crucial. And high school is already too late, argues Project Lead the Way’s Vince Bertram. There is a disturbing trend in computer science education today: Not one of the top 10 computer science programs in the U.S. requires so much as a single cybersecurity course as a prerequisite for graduation, and just three of the top 50 computer science programs, as ranked by Business Insider, require majors to complete such a course.

May 13, 2016

When students are using a learning management system or a digital curriculum, their individual performance data is collected and shared with their teacher and other instructional personnel to help assess their progress.