Cyber & Technology Academy
8 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Josh Eudy, A.C.E., C.C.I.I.
Scoop.it!

DNS impairment redirects thousands of websites to malware

DNS impairment redirects thousands of websites to malware | Cyber & Technology Academy | Scoop.it
Cybercriminals are exploiting the possibility of DNS impairment to redirect visitors of thousands legitimate websites to compromised domains serving malware
more...
No comment yet.
Scooped by Josh Eudy, A.C.E., C.C.I.I.
Scoop.it!

FBI launches cyber threat info-sharing platform -- FCW

FBI launches cyber threat info-sharing platform -- FCW | Cyber & Technology Academy | Scoop.it
The iGuardian portal builds on older FBI programs, including its Guardian and eGuardian counter-terrorism and collaboration systems.
more...
No comment yet.
Rescooped by Josh Eudy, A.C.E., C.C.I.I. from Learning Technology News
Scoop.it!

A Quick Guide to YouTube Privacy

A Quick Guide to YouTube Privacy | Cyber & Technology Academy | Scoop.it

While we don't share as much personal information on YouTube as on other social networks, if you're conscious of online privacy, you may want to take a look at your privacy settings.


Via Nik Peachey
Josh Eudy, A.C.E., C.C.I.I.'s insight:

Online Privacy is a major concern in todays time. Here is a quick guide for youtube privacy.

more...
Nik Peachey's curator insight, August 7, 2013 9:53 AM

This is worth checking out, especially if you use YouTube with students or encourage them to create their own channel.

Dean Mantz's curator insight, August 8, 2013 10:06 AM

Nik Peachey strikes again.  I back his statement that teachers and students need to be aware of YouTube's privacy.  Especially if it is being used in the classroom. 

Ms. Corri's curator insight, August 18, 2013 2:23 PM

Very important for students and teachers.

Scooped by Josh Eudy, A.C.E., C.C.I.I.
Scoop.it!

How the FBI Hacks Criminal Suspects

How the FBI Hacks Criminal Suspects | Cyber & Technology Academy | Scoop.it
When federal law-enforcement officials can’t track criminal suspects through traditional wiretaps, they turn to tools most commonly associated with hackers: software exploits.
more...
No comment yet.