Another great resource to add to our section " Twitter for Teachers " here in Educational Technology and Mobile Learning. Twitter Handbook for Teachers is an excellent guide from Lasic featuring some practical tips on how teachers can use Twitter for educational purposes. I have really enjoyed this guide and I am pretty sure you will like it as well. Have a look and share with us what you think of it. Enjoy
Starting Monday, most U.S. Internet users will be subject to a new anti-piracy system that could slow their Internet speeds to a crawl.
The CAS, designed as an "educational" service to combat casual piracy in the U.S., has been criticized as designed purely for corporate interests, at the expense of the average Internet user. While it doesn't require ISPs to cut off Internet access to repeat pirates — as is the case in France and New Zealand — it will issue escalating punishments to suspected pirates, severely reducing their connection speeds after five or six offenses.
A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.
In the case of USB smart card readers, the attacker can use the middleware software provided by the smart card manufacturer to perform operations with the victim's card as if it was attached to his own computer, said Paul Rascagneres, an IT security consultant at Luxembourg-based security auditing and consulting firm Itrust Consulting, last week. Rascagneres is also the founder and leader of a malware analysis and engineering project called malware.lu, whose team designed this USB sharing malware.
There are already documented cases of malware that hijacks smart card devices on the local computer and uses them through the API (application programming interface) provided by the manufacturer.
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.
It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.
Check out also my curation and my FREE course about it:
The Smartphone App Usage showcases the smartphone user behavior. This infographic will also take you through the world of mobile applications and provide you with rich insights and statistics on the popular app categories and mobile games.
And so the battle for the future of the internet rages on.
The ITU is currently meeting in Dubai under the banner of the World Conference on International Telecommunication (WCIT-12). The agenda is to consider changes to the International Telecommunication Regulations (ITR) – a treaty signed by 178 countries in 1988 to establish principles for the operation of international telecommunications.
OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
Compatible with Windows XP, Vista, 7 and 8 Requires Internet Explorer 8 or higher
We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.