Study Opportunities' Blog
If you have an Android phone then Google has just released a cool app called Science Journal (get it here for free on the Google Play store). You use the app to record data from the sensors on your device (light, sound, movement) - which you can use as measuring equipment in experiments! The app also connects to Arduino powered electronics for additional sensors and data. The Google for education post about the software is here. Tell your school's science teacher about it - it's really great for use in practical physics experiments.
Some follow up on previous news:
SCARY: Old tech runs nuclear missiles....
How scary? Remember floppy disks? Not stiffies (as they were known in South Africa) not even the large old 5 1/4" floppy disk drives that held 360 K of data and powered the first Apple and IBM personal computers. No we are talking about the giant 8" floppy disks used in 1970's IBM mainframes.
Well, those same floppy disks and 1970's IBM mainframes are still being used to control Americas Nuclear missiles, bombers and other related military tech. Even older 1950's mainframe based outdated tech is the backbone of American Tax data, whilst other American departments still run systems that use DOS! CNBC has a summary of the revelations.
The full detailed tech report (for the real geeks) is available as a PDF here.
Short snippets for this week:
Until next week....
Another day, another malware.
Card skimmers are physical devices that criminals attach to ATM machines to copy the magnetic stripe information from bank cards as they are put into the ATM. They are usually used with a hidden camera which spies on you as you type in your PIN code.
The problem with card skimmers is that, because they are physical devices, an alert customer can spot that there is something wrong with the ATM.
For the criminals there are two solutions to this problem:
1) Use more creative hardware
The trend for computer kit to get smaller and thinner doesn't only apply to your smartphone. Since 2014 criminals have been able to create card skimmers so thin and small that they fit inside the card slot of the ATM - making the skimmer that much harder to detect. Krebs on Security has a great and detailed article on this here.
2) Make the ATM your card skimmer
Since 2009 criminals have figured out that using malware to infect an ATM can turn the whole machine into a card skimmer - no extra hardware or camera required. The malware was called Skimer and it is back in the news again this week because; surprise, surprise; there's a new version of the malware that's just crawled out of the woodwork (making a total of 49 versions of this malware). This new version was discovered by Kaspersky and you can read the details here.
What is new is that the malware hides itself and only becomes active when a specific 'magic' card is inserted into the ATM. The card contains activation codes on its magnetic stripe that set the malware into action. The criminal is given a menu of options which include the functions:
A big advantage of using malware like this is that the ATM customer has absolutely no way of telling that their data is being stolen. The criminal can also chose to run the skimmer function when and how they need, generally making the criminal activity harder to detect.
'Till next week..
This blog is still finding its feet. Apparently some readers feel that posts are too long, they don't like scrolling and explanations / elaboration of content is unnecessary. Therefore the format change. Bullets and links....
That's it for this week
086 293 2702
012 565 6469
Copyright Study Opportunities 2016 - 2021. All rights reserved.