This Week in Tech
Deadly pictures. Farmers becoming hackers. SSDs that can double as RAM. Lasers protecting Salmon. A physical key for safety in the digital world.... This week's news is a mixed batch - most of which sounds and feels a little incredible and sci-fi. Enough credible news outlets have reported on the topics to be reasonably sure that none of it is 'fake news' ;-) [and now I have just used an emoji in a blog post, something I never thought I'd ever do!]. Anyhow, there's a lot in this post that will make you shake your head in disbelief and which you can use to amaze and astound your learners.
Gif. The image format that allows for animated images to be shared on the web and through social media. The image format that has been intentionally used to physically attack a human being. You see, people who suffer from Epilepsy can have a seizure triggered by flashing lights (that's why there are epilepsy warnings for some video games, movies,etc.). So a Trump supporter (who else would be that dumb and malicious) designed a Gif that would trigger a seizure and then sent it to a reporter that they felt was criticising the president too much. He also made his intentions clear by putting “You deserve a seizure for your post” below the image. A Texas jury has just ruled that a Gif image can be considered a deadly weapon. Read the fascinating story at here and here Digital Trends. The person responsible tried to hide his tracks by creating and using a fake twitter account but has been traced and identified.
American farmers pwn their farming equipment.
No, pwn (pronounced 'pone') is not a typo. Well, it actually was originally one when some unknown hacker typed 'pwn' instead of 'own' when describing taking over someone's computer. This 'leetspeak' (language used by the 'elite', the hacking community) term is what American farmers are having to do to their Tractors, Combine Harvesters, and other computerised farming equipment, especially those made by John Deere. A fascinating article on Motherboard describes why and how they are doing this.
|"What you've got is technicians running around here with cracked Ukrainian John Deere software that they bought off the black market"|
Save the Salmon - with lasers
Sea Lice. Parasites that flourish in the nutrient rich environment of a densely packed fish farm. A real problem for fish farmers. Enter.... an underwater drone armed with lasers that shoots to kill! Check out the article on Digital Trends. Or just watch the video below.
Storage or Memory? Both!
The line between storage and memory is being blurred by a new Intel product - the Octane SSD. Ars Technica has a technical but interesting article that is worth a read, more for you to be informed so that you can say to your learners that maybe in the future Ram and Storage will be the same thing. Basically a normal SSD is 10 000 times slower to respond to a read or write request than RAM is. The new Octane SSD is only 10 times slower than RAM! This means that you can choose to use it either as RAM or storage, depending on the needs of the moment. NB: A very exciting and interesting technology that could have a huge impact on hardware of the future! Of course, like most new technology, it is insanely expensive now - expect to pay around R20 000 for less as 375 Gb unit.
The poisoned wine problem
Brian Brushwood presents this video (from his 'Scam School' Youtube Channel) which you can use to have some fun with your learners when doing binary numbers.
A battery that powers chips whilst cooling them
This is a loooooong way off, but holds some very exciting potential. I'm not going to repeat the article so just head over to Engadget and read it there.
Fido. The physical key to your digital security.
This one is also a long way off, but is a potential solution to the 'hackers keep stealing usernames and passwords' problem. Read it at My Broadband. In the meanwhile make sure your learners understand the need for (and use) two factor authentication on any of the sites and services they use that offer it.
Which is the Safest browser?
PC Building Simulator Game
Your learners might have fun with this. And they can learn something without destroying expensive hardware. Download the software (still in beta) here and check out the video below.
Fake news corner:
Other News for the week
That's it for this week. Hope you find it all as amazing, astonishing and interesting as I do. Happy teaching.
Welcome back to the blog. A few housekeeping changes this week before we get into the news.
Teaching about Fake News
It looks like 2017 is not only the year of fake news, but also the year in which we have to make an important change to the way we talk about the web and web content with our learners.
Yes, it is true that the web enables anyone to publish anything. Yes it is true that this has been a great enabler for people in general to express themselves and spread news that might otherwise be suppressed.
The thing is, the value of the content on the web depends very much on the sense of integrity and responsibility of those creating that content. The current trend of spreading blatant untruths without pause or hesitation or thought for the consequences devalues the web as a source of reliable content. We need to address this issue in the classroom. The least we (and our learners) can do is identify and refuse to spread fake news.
We know that Fake News has become an issue after the creation of both the CAPS and the textbooks and therefore resources for this topic are scarce. We will continue to feature 'Fake News Corner' in all the blogs throughout the year.
Why is Fake News spread?
Three main reasons are:
This Weeks Fake News links:
And, in other news - to show that accuracy and integrity is important, Wikipedia has banned the use of the Daily Mail (UK Newspaper) as a source because of its unreliability, bias and inaccuracy! Whatever you do, don't use the Daily Mail as a source to check the accuracy of something you think might be fake news! Read it at The Guardian.
This week we have a few InfoGraphics that could be useful for your classroom. Finding good material to print and put on your noticeboards / classroom walls is hard. Here's some useful stuff! To check out lots of other interesting infographics visit coolinfographics.com.
Make sure to tell your Art department that the Metropolitan Museum of Art has made 375 000 high res images of art free to download and use as you wish! What an amazing resource! They explain the move to 'open access' here.
Can you spot the phish? This article from CSO Online makes for a great classroom exercise. It shows a number of real phishing emails and asks you to try and identify why they are phishing mails. It also gives explanations that you can share with your learners.
We all know that anti-virus software works by scanning files on your storage for known signatures of viruses and other malware. The question is - what happens when the malware does not store itself as a file but simply loads itself into memory, leaving no trace for anti-malware software to find? The answer is that the malware becomes almost impossible to detect and eliminate. The scary thing is that, although a proven concept since 2015, fileless malware is hitting the news in a big way this week. It seems that a spate of this type of attacks against mainly banks has been detected in the last while. The good guys are going have to put in looooong hours to find a solution to this one!
The Ransomware Industry
CSO Online says the stats prove the move away from general malware toward Ransomware. Apparently there was a 6% decline in new types of malware last year - at only 60 million new varieties been listed. They proceed to give various reasons, but the astonishing fact is:
|The number of attacks increased 167 times. |
Not 167 percent -- 167 times, from 3.8 million ransomware attack attempts in 2015 to 638 million in 2016.
And if you are in any doubt about how Ransomware is becoming big business, read this eye-opener from Boing Boing about the customer service offered by the operators of the Spora Ransomware. They want to make sure you trust that if you pay your files will be decrypted...
Ransomware is not the only type of hacking going commercial. More proof that hacking is being run like a business is the offering of payment for insider information / passwords / logins. The Hacker News has the low down on how porn and credit card numbers is not all that you can buy on the Dark Web.
That's it for this week. We hope you'll start making use of comments and shares - if you think that what we've got to say is worth it!
DRM VS Right to Repair
You buy something, you own it. That means you have the right to fix it if it breaks, right? That's what you might think, but that's not always the case in the world of tech - and tech driven products (which can include anything from cars to combine harvesters). The right to repair problem in South Africa is mainly limited to cars - car manufacturers refusing to provide independent repair workshops with information / parts needed to repair vehicles - people must rather use the (more expensive) manufacturers repair service instead.
In places like America manufacturers can not only obstruct repairs by third parties but they can also sue you if you try to repair the product using a third party - or try to do it yourself. They claim the the DMCA (Digital Millennium Copyright Act) protects the software in their product and that repairing it infringes their copyright.
The EFF (Electronic Frontier Foundation) has a great summary article on the concept of why we need a 'right to repair' and Motherboard has a great article on how farmers are at the forefront of the fight for the right to repair in America. More great social implications material here!
Hacking news for the week:
Hacking prevention for the week:
IT Divisions - how they see themselves and others
Good summary of how IT divisions see themselves on Imgur - but if you are worried about 'flipping the bird' or feel that your learners / colleagues / parents easily take offence then don't use it in class.
Your Pacemaker can snitch on you
Even devices that you think couldn't possible reveal details of your life can and do!
A man gets in some kind of financial trouble. Decides on an old but favourite criminal solution to the problem: burn down his house for the insurance money. When the fire is done and dusted, he has an insurance claim for around $400 000 in damages (well over R 4 million). He claims he managed to save some stuff from the fire by putting it in suitcases and chucking it out the window - and then lugging it to safety. Problem is, he has a pacemaker. Police got the data from his pacemaker and it shows no evidence of the strenuous activity involved. That and the fact that firefighters have identified that the fire was started from multiple points outside the house have led to the man being charged with arson and insurance fraud.
Article at Network World.
SHIMMERS: Chip & Pin cards can be skimmed
Now you can worry about your chip and pin cards not being safe in ATM machines and POS card readers. Hackers insert a circuit between the card and the chip reader. This captures the card data before passing it through to the ATM / POS device. The bad guys can then make a duplicate magnetic stripe version of the card.
Article and pictures at Krebs on Security.
Robots VS immigration / Globalisation
Trump says American workers are losing jobs to immigrants and globalisation (sending jobs to other countries where labour is cheaper). He has forgotten about (or simply doesn't know about) the real reason for job losses: robots and automation. CNN Money has a great article and video on the topic. The video is a perfect resource for the 'social implications of IT'.
Fake news corner
This dog seen at the protests against Trump's 'Muslim Ban' says it all:
We all take a lot of time and effort to teach our learners about Phishing - and about the more specialised, targeted "Spear Phishing" version of this type of attack. Well, it's time we added "Whaling" to that repertoire.
The term 'Whale' is often used in IT - and in business in general. A 'Whale' is generally a big spending customer - for example in all those 'free' games that you find available on mobile devices you are able to buy 'coins' or 'stars' or 'points' or something that will make it easier to progress through the game faster. Most people do not spend real money on these in game currencies - but there is a select group of users that do buy them - and they buy large. They are usually called 'Whales' - and they are where these companies make their money. Before science was sufficiently advanced whales were simply regarded as another type of fish - the biggest fish in the sea. So they are the biggest Phish for Phishers to focus their attention on as well. In the world of cybercrime a whale is typically a high level business person (CEO, COO, CFO, CTO = 'C' level executive, someone with 'Chief' in their title), politicians or celebrities.
The Whale phisher typically sends an urgent e-mail from a trusted colleague / business partner requesting urgent payment for some critical aspect of the business. The CEO then gives the order that payment be made, short-circuiting the usual paperwork... The phisher scores big. In May this year an Austrian aircraft company lost nearly € 41 Million (more than R 645 000 000) to a Whaling attack. The CEO and CFO lost their jobs. Read about it here.
MyBroadband.co.za has a story on Whaling and some tips from the FBI about how to avoid such attacks, whilst Social-Engineer.com asks 'Why go after minnows when you can catch a Big Phish?'. Finally CSOonline.com has got some examples of scams that CEOs could fall for (especially the spoofed 'from' addresses that rely on similar looking mis-spellings to seem as if they are from a valid source) - if you can stand their irritating multi-page slideshow format.
Fighting back against RansomWare
A great resource for learning about, identifying and fighting Ransomware is nomoreransom.org. They even have tools that will decrypt certain types of Ransomware attacks. A great resource for teaching about this type of malware.
Watch out for that cheap wireless keyboard
You better watch out, you better beware, Keysniffer is already in town.
Armed with a bit of smarts and a wireless dongle that costs less than R200 a hacker can not only intercept whatever you type on your keyboard (without even having to install key logging malware on your computer) from up to 70 m away, but they can also insert their own keystrokes to change whatever you are typing.
How is this possible? Well, makers of cheap wireless keyboards (those that use their own wi-fi dongle instead of Bluetooth) let the communication between the keyboard and the computer take place without encryption (or with poor encryption). Why? Because its cheaper and cheaper = lower price or more profits or both. Wired magazine has the lowdown on this new hacking exploit.
There is no such thing as anonymity or privacy on the web
Keep on telling your learners this fact. Repeat it until they think you are a stuck record. For those that say that they are savvy and have the skillz and the toolz to keep private - point out to them that the TOR browser and account they are using is probably compromised. Researchers recently found over 100 TOR nodes that were spying on their users... Tell them to read the article at The Hacker News. Then point out that the web is a large, wild, ungoverned place which is about as tough and secure as a bag made of wet toilet paper. They need to always assume that most of what you do, create, store, collect, download electronically is traceable and watchable and has probably been intercepted by someone somewhere.
A general Resource for all
The World Digital Library is a resource created by the US Library of Congress with support from UNESCO. It contains many digitised images, texts and maps that are interesting to browse through but could also be valuable resources for the History / Geography teachers at your school.
Building at 225 bricks per hour
3DPrint.com has an article about an Australian company which has created a robot that can lay 225 bricks in an hour - as much as a human does in half a day. Basically a truck loaded with bricks arrives at the building site, extends a robotic arm and starts laying the bricks according to the design programmed into it from a CAD model. There's a time lapse video of the robot at work near the end of the article.
That's it for this week.
Prominent science and tech personalities such as Professor Stephen Hawking, Steve Wozniak, Bill Gates and Elon Musk (CEO of Tesla motors and SpaceX) have recently made public statements about how they fear that AI poses a threat to humanity (think along the lines of SkyNet in the Terminator movies or the killer AI in The Matrix).
"The development of full Artificial Intelligence could spell the end of the human race". - Stephen Hawking, December 2014.
Artificial Intelligence is potentially the "biggest existential threat" to humanity. - Elon Musk.
Why is this topical?
Well, this week Google's Deepmind AI beat the human world champion of a game called "Go". This is significant because "Go" allows for many more potential moves than other strategy board games such as chess and checkers. In fact the number of potential moves in a game of "Go" is said to outnumber the atoms in the universe - which makes it virtually impossible for an AI to win using brute force (i.e. simply calculating all the possible moves in a way no human can). In order to win the AI has to "think" and strategize in an almost human fashion. This week Deepmind's AI won the first two games (out of 5) against Lee Se-Dol, a feat that many believed completely impossible with current technology and 'at least a decade away'.
How it applies to real life:
As teachers of computer subjects we have always spoken of how computers, robots and automation have impacted on so-called 'blue-collar' work. Manufacturing jobs have been lost to computer controlled, automated assembly lines. Rote administration and clerical jobs (filing, switchboard operation, typing pools, rooms full of accountants and mathematicians performing calculations) have also been wiped out by faster, more efficient computers. But, we have also been able to reassure that there are many jobs out there that computers could never do - because they can't think. Rapid advances in AI are due to change that in the near future. Suddenly many 'white-collar' (office / admin work) jobs are on the line with the World Economic Forum predicting between 5 and 7 million jobs potentially lost by 2020. Just think of all the taxi drivers, bus drivers, truck drivers that self-driving car technologies will put out of work (just one example of AI impact on previously 'safe' jobs).
AI is no longer the concern of researchers and scientists but a real factor of influence in the lives, careers and choices of your learners.
What else happened this week?
That's it for this week. Happy teaching!
012 546 5313 or 086 293 2702
012 565 6469 or 087 230 8479
Copyright Study Opportunities 2016 - 2018. All rights reserved.