Friday, June 3, 2011

So Cool: Tour a museum with a LIVE guide ONLINE.

This post is an excerpt from Museum Offers Real (Human) Guides Online.
Museum aan de stroom - a brand-new city museum covering the art, shipping and folklore of Antwerp, Belgium - is offering web visitors real, real-time guides. Through June 7, visitors to the museum's website can interact with, and direct, flesh-and-blood guides through their Discover the MAS Live program and website.

Using your computer, you "capture" a live guide and, your arrow keys, direct him or her to explore the museum for you in real time.

Sony: Hacked again... Yikes.

This post is an excerpt from Just When You Thought It Was Safe to Go Back in the Water... Sony Pictures Hacked.
On the heels of a Memorial Day weekend hack of the PBS website - an act of retribution for an unflattering Frontline report on Wikileaks, the prankster-hackers LulzSec have found their next target. And it's a target that's just recovering from another security breach, namely Sony.

LulzSec claims to have broken into the Sony Pictures website and compromised over a million users' accounts.

According to the group's statement, this includes "users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts." The group also says that it's breached the site's administrative security and has passwords, 75,000 music codes and 3.5 million music coupons.

The group claims to have accomplished this via "a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now." Indeed.

Wednesday, June 1, 2011

Protect yourself: PDF hacks come to light

This post is an excerpt from Anatomy of a PDF Hack.
By Tomer Bitton, security researcher, Imperva

PDFs are widely used business file format, which makes them a common target for malware attacks. Because PDFs have so many "features," hackers have learned how to hide attacks deep under the surface. By using a number of utilities, we are able to reverse engineer the techniques in malicious PDFs, providing insight that we can ultimately use to better protect our systems. We'll take you through the process that a hacker uses to insert a piece of malware into a sample PDF.

Tuesday, May 31, 2011

Yikes: What's an 'Act of War'?

This post is an excerpt from Pentagon Declares Cyberattack an Act of War.
Cyberattacks are part of the defense landscape and have been for a while. Among the more high-profile instances in the last year are the Stuxnet attack by the U.S. and Israel on Iranian nuclear facilities, the attacks by the Chinese government on Google and even a hack of a Pentagon project.

Now, the Wall Street Journal says a soon-to-be-released Pentagon policy document will announce officially that a cyberattack can be a jus ad bellum, or act of war.

Monday, May 30, 2011

Technology and Teaching: Where are we in the Matrix?

This post is an excerpt from Technology Integration Matrix.
The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students. The TIM incorporates five interdependent characteristics of meaningful learning environments: active, constructive, goal directed (i.e., reflective), authentic, and collaborative (Jonassen, Howland, Moore, & Marra, 2003). The TIM associates five levels of technology integration (i.e., entry, adoption, adaptation, infusion, and transformation) with each of the five characteristics of meaningful learning environments. Together, the five levels of technology integration and the five characteristics of meaningful learning environments create a matrix of 25 cells as illustrated below.