Feedback

Simfin

online safety and digital citizenship specialist

Adults who work with Young People News

06 November 2014

A new breed of relatively easy-to-use encryption and security services like Silent Circle have started popping up ever since Snowden made his revelations last year. One of the newest additions to that growing list is a Chrome browser extension called ShadowCrypt, which encrypts emails, Facebook status updates, tweets and other messages you send and post on social media.

Read more here

16 September 2014

 Do apps like Whisper, Secret and Ask.fm, which let their users mask their identity, give voice to cyberbullying and other bad behavior?

Mike Dreiblatt, president of the activist group Stand Up to Bullying and co-author of How to Stop Bullying and Social Aggression, says that such apps tend to bring out the worst in young people, and has some advice for the apps as well as parents.

Read the article

09 September 2014

 Google, which bases its business on collecting and analyzing huge reams of data for advertising purposes, has been scanning users' emails even before users have a chance to open or read them, including email messages that are deleted without being opened. Google knows what's in your email before you do.

 

Read the article here

26 August 2014

 Challenge Regional Cyber Day Event1: Girls into Cyber: panel and exhibition, Northumbria.

On Thursday 9thOctober at Gateshead Northern Design Centre, Cyber Security Challenge and Northumbria University will be holding the first Event1 in their series Regional Cyber Day.

We are delighted to announce that Lucy Winskell, Northumberland University's Pro Vice Chancellor has confirmed she will open the day's activities, introducing the women on the panel to highlight the myriad of back grounds and pathways that women have found into cyber roles and the exhibitors to inspire the audience of career changers and students during the day where attendees can network with regional employers, women in the industry and find out about the community.

The panel is to be opened by the Dr Jessica Barker, Cyber Security Consultant, starts off the discussion: Why is everyone talking about Cyber Security?

There will be speakers from GCHQ and IA Professional Bodies too [TBC]

Stands and activities include:

• Regional business stands: showcasing local cyber roles and pathways into work.

• Cyber 'Surgeries': 10 minute Q&A with students with the cyber community to discuss future job roles, memberships and the benefits of groups and networking.

• Enigma Machine: Bletchley Park's Education Officer demonstrates a real, working Enigma machine, providing drop-in activity sessions.

• Cyber-card game –Students and Career Transitioners can create teams to battle it out on a leader board during the day

• Cyber Community: UK wide network communities: (ISC)2., BCS., IISP.,to be available to talk about networking and membership opportunities.

More details and booking form here.

12 August 2014

Researchers at Microsoft and Ottawa's Carleton University set out to to take a cold hard look at passwords and here's what they found: the way we traditionally measure password strength is inconsistent—and often say nothing about how hard it might be to guess a password.

Here's an example: some systems force you to chose an eight-character password, using capital letters, numbers and at least one number. That sounds pretty secure, but it's not. The word P@ssw0rd fits these criteria and password cracking tools such as JohntheRipper or hashcat will guess it in minutes. That's because they use something called "mangling rules" which take dictionary words and substitute letters such as a for @ or s for $.

Read the article