Research has shown that when computers were fitted with proximity sensors (which facilitate online security by automatically logging users out when they move away from the machine) users began placing cups over the sensors to disable them.
We educational technologists often have cybersecurity discussions with students, parents and teachers with digital fluency levels ranging from expert to little-to-no knowledge. As parents and teachers we can understandably be fearful of the role of technology in kids’ lives, however this can sometimes be a barrier to student learning.
Now that school is back in session, many high schoolers have new phones, new computers and new privileges for using their devices – and new responsibilities too. High schoolers today are more technology-savvy than average adults. While many people think that young people use their devices primarily for video games and social networking, the reality today is that high schoolers use technology for l...[Read More]
Cyber criminals are extremely active across the globe – and, unfortunately, also very successful. In Africa, too, businesses are losing billions to cybercrime. A quick Internet search shows that governments in the Southern African Development Community aren’t really prioritising cybersecurity. Botswana doesn’t name cyber security as one of its national priorities. Nor does Mozambique. Zambia’s 201...[Read More]
Visitors to the 2018 World Cup in Russia will be eager to enjoy the football and soak up the culture. But safety concerns are lurking in the background of this tournament. Whether it is the threat of racial abuse, football hooliganism, or falling victim to fraud, many football fans have good reason to be wary. But alongside these traditional threats, travelling fans and players also need to be vig...[Read More]
As the investigation into Russia’s interference in the US election deepens, it is becoming obvious that the events in 2016 are just the tip of an iceberg. Ever since the Russian cyber assault on Estonia in 2007, policymakers and cyber security scholars have debated how best to deter cyber attacks that cross international borders. Yet both state and non-state actors continue using the internet for ...[Read More]
Cyber warfare is upon us, from interference in elections to a leak of cyber weapons from a national stockpile. And, as with most evolutions in warfare, the world is largely unprepared. Cyber peacekeeping presents significant challenges, which we explore in our research. Any theatre of war now includes cyberspace. It has been used in targeted attacks to disable an adversary’s capabilities, such as ...[Read More]
Cybersecurity is going to be arguably the biggest trend – and threat – in 2018. I wrote that sentence before the shock announcement last week from Intel that all (yes, all) of its processors have two serious security defects that were discovered last year. In fact, all processors contain the vulnerabilities that could potentially make all computers insecure, as they affect chips made by Intel̵...[Read More]
October is Cybersecurity Awareness month, which is being observed in the United States, Europe, and elsewhere around the world. Ironically, it began with updates about a large-scale hack, and is ending with a large-scale ransomware outbreak. Internet firm Yahoo kicked things off on Oct. 3 when it admitted that hackers in 2013 had accessed information about all three billion of its user accounts, n...[Read More]
My introduction to advanced communication technology (i.e. the Internet and World Wide Web) came in 1999. Having grown up in the two-channel universe of the 1960s and ‘70s, I was agog at the power it represented. The technology was nascent at that time — not many web pages yet existed — but I could still see the potential for good. Here was a technology that I felt could really save the world. I a...[Read More]
Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online. Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity threats we face. While most of us would rather leave the problem to the IT department, it’s essential we ...[Read More]
Assuming you’re a regular reader of this or other technology news sites your kneejerk reaction to this headline should be “nope”. That’s a good instinct. Because just as new hardware tends to outpace the legislation that governs it, the people and companies behind that hardware tend to prioritise features, functions and time to market over security. With the pace of innovation and the potential pe...[Read More]