This Week in Tech
Seems like that old nursery chant: 'sticks and stones may break my bones, but words can never harm me' is no longer quite as true as we'd like to believe. Last week a judge in Massachusetts found a 17 year old young woman guilty of manslaughter for using text messages and a phone call to encourage and convince her 18 year old boyfriend to commit suicide.
|“This is saying that what she did is killing him, that her words literally killed him, that the murder weapon here was her words,” |
- Matthew Segal, lawyer with the American Civil Liberties Union of Massachusetts
Our learners live in a world where constant communication and the pressures of social media are pervasive. They often post private messages to each other and public messages on social media without giving a moments thought to the impact, implication, consequences or possible collateral damage these messages might cause. As educators, we need to take the time and effort to repeatedly draw to their attention cases that vividly illustrate this - cases that redefine the law and our society. This is one such case. The New York Times has a good article on the topic, but if you have already used up your free access for the month, here's a link at CNN. If nothing else, this could open the door to Manslaughter / Murder becoming, of all things, a cybercrime.
Human error - again
Computers are stupid. they only do what you tell them to do, so you better make sure that you tell them to do the right thing. One young person, first day on the job, just out of University, unguided and working according to a document telling him how to set up his own test development database did what many of our learners do: he copied the code in the document and executed it unmodified. The result: the entire companies database deleted. Gone. Unrecoverable. The CTO promptly fired him and he posted about his experience on Reddit. Many readers have come out in support of him and believe that the CTO should have been the one to lose his job.
A complete nightmare situation. A business almost down the tubes because of human error. I say almost, because surely there were backups and recovery, though tedious and inconvenient, would be possible? Wrong! Seems like there was a problem with the databases and backups were not being restored. A company that provides a document containing a potentially destructive code snippet to a complete noob for unsupervised use is not likely to make sure they follow the best backup procedure in the world. More human error, compounding the original human error...
Quartz Media has a nice article based on the incident.
Robot, Robots, Robots
Harvard students seem to want to prove that robots can be made from anything - they are developing a spider like robot made from drinking straws and powered by air.
And now, a robot that crawls up your butt - to make an unpleasant medical procedure weirder but less unpleasant. Curious? Check it out at Boing Boing.
Finally, the BBC has a short segment from Ashitey Trebi-Ollennu, chief engineer at Nasa’s Jet Propulsion Laboratory, on 5 robots set to change the world.
Motherboard has an article on a click fraud farm busted in Thailand. Fascinating visuals and a glimpse into the world where fake likes, ratings, etc are manufactured on demand.
In Russia though, this type of click fraud is out in the open. Here's an article about a vending machine that sells Instagram likes and followers!
Whilst Google seems intent on creating AI's that defeat humans at complex games demanding strategy and insight, Facebook has built itself an AI that has learnt to lie to get what it wants. Appropriate for a system where most people create fake representations of a perfect life? A fascinating read.
AI, self driving cars and Insurance
Some interesting questions raised in this article from Readwrite.com.
Scary new malware infection technique
Digital trends has an article on how hovering your mouse over a link in a PowerPoint slide can automatically download and install malware (no clicking required).
Ransomware Ponzi scheme
A Ponzi scheme is a pyramid scheme. Popcorn Time is a new type of malware tries to maximise its profits by using the strategy behind a pyramid scheme - when you get infected and your data is encrypted and held ransom, you are given a choice: either pay up or deliberately infect at least 2 others to 'free' your data. What would you do? The New York Times has the details, also at Fortune.com.
That's it for this week - good luck with the last of exams and the reports....
Those of you who saw "Minority Report" will remember that Tom Cruise's disgraced policeman character had an eye transplant to hide his identity from ubiquitous iris scans - but kept his old eyes in a baggie so that he could still log on to the police network. Iris scans have been touted as even more effective than fingerprints as a form of biometric identification. That's why there was a frisson of excitement that rippled around tech circles when Samsung introduced iris scanning to unlock the new Galaxy S8 smartphone.
We all know that any new security technology is seen by some people as a challenge. AND, no security technology is completely foolproof. So, it didn't take too long before hackers touted that they could fool the iPhone's fingerprint scanner by getting a mould of your fingerprint and casting a replica of the finger. Not something your average girlfriend of boyfriend wanting to check out your texts to see if you are cheating is likely to do. It involves a bit of skill and technique to execute effectively and is definitely more than a 30 second hack.
It is a little faster to hack the iris scan on the S8 - all you need is a camera with night mode (so that it captures infra-red), a good printer and a contact lens. It's still not a 30 second hack, but it's certainly easier to get a photo of someone's eyes than it is to make a mould of their fingerprint.
The lesson is that no biometric security will ever be infallible - people will always find a hack. It's probably better to use a combination of biometrics and the good old PIN / password.
Green power - solar and wind
Tramp and Eskom / the SA Govt have at least one thing in common: they seem determined to cut all support for green renewable energy. This is not the case all over the world though. China just created a 40 Megawatt floating solar power plant that has the added benefit of protecting water supplies by reducing evaporation. Check it out at Digital Trends. In the UK a wind farm of 32 turbines each capable of generating 8 Megawatts has just gone on line. Supposedly a single rotation of one turbine can power a house for 29 months! Read it at Engadget.
Printed Ovaries - that work!
This was meant for last week's blog but somehow got left out. CNN has an article on how scientists created a 3d printed ovary, placed it inside a mouse which mated naturally and then gave birth to two pups. The video is with watching - but put it on silent: there is no voice over and the music is irritating!
WannaCry - and what's next...
Al Jazeera has an interesting video on the ransomware attack and cybersecurity in the future. Worth paying attention to is the fact that EternalRocks is quietly spreading itself in a much stealthier fashion but not delivering any payloads yet. Linux systems also have a vulnerability to the same type of SMB exploit used by the two worms and sysadmins are advised to patch ASAP - info and links to patches at The Hacker News.
CSO Online compares the real cost of ransomware to the actual amounts paid in ransoms.
The Guardian got hold of leaked documents that reveal the guidelines given to the thousands of people employed as moderators for the site (this second article is very interesting, informative and a great source for classroom discussions). This prompted a little bit of internet outrage over where the lines are drawn between what can stay and what can't. It blew over fairly quickly. Basically: it is a grey area and moderators must use their own judgement....
At the same time Facebook is taking steps to counter the rising problem of the filter bubble that isolates people into worlds that only confirm their own biases and viewpoints. Engadget has more on their new approach to trending topics that might bring balance to both the news and the debates and discussions it sparks.
The connected future might belong to Thunderbolt 3
Engadget reveals that Intel is planning to build Thunderbolt controllers into their CPUs (removing the need for controllers on motherboards) and also plans to make the standard royalty free, meaning that putting Thunderbolt 3 ports into computers will cost no more than the hardware. Good news for those who want the fastest external device connection technology available. CNET has an excellent article on the differences between the different types of USB and Thunderbolt. Well worth the read.
FNB is introducing cashless ATMs in rural areas in South Africa. The machines allow people to do banking tasks without having to travel to bank branches.
Walt Mossberg retires
The well regarded tech journalist has written his last article and it is well worth a read: find it at recode.net. In it he discusses what feels like a current lull in technology (iteration of existing products rather than the next big thing) and relates it to preparing the ground for the rise of what he calls 'ambient computing'.
8K Monitor - too good for current computing
If you have R70 000 burning a hole in your pocket and are prepared to spend it all on a monitor you can buy Dell's new 8K beauty. Digital Trends explains just how wonderful the screen is, and how modern computers (and even GPUs) just are not up to the task of getting the best from this screen.
And on that note, that's all for this week folks. Good luck with the exams and marking ahead.
Remember that whole saga of Apple vs the FBI when Apple refused to create a back door for the FBI to investigate a terrorists phone? Apple said that it was too dangerous and would make iOS vulnerable to hackers. The FBI said something like 'but you can trust us, we are a powerful government agency, we will protect the backdoor and keep it safe and no one else will ever get to use it - especially not hackers....' Apple stuck to their guns and the matter was never tested in court because the FBI withdrew their case and found an alternative solution to their problem.
Turns out Apple was very right though. A couple of weeks ago we reported on US government hacking tools and secrets being exposed by a hacker group calling itself the Shadow Brokers - and published on Wikileaks. That leak led to the biggest flood of ransomware infections in history. Computers across the globe became inaccessible - their data encrypted and unavailable. Ransoms of $300 - $600 were demanded. Here are some very important facts about the infection:
Wanna Cry infected hundreds of thousands of computers in over 100 countries world wide. It crippled businesses, government offices, health care (especially the NHS in the UK) and private computers indiscriminately.
The biggest lesson though is that machines with the latest version of the OS and up-to-date patches were pretty much safe from the attack.
Cartoon resources - great for class discussion or tests / exams:
MP3 is dead - NOT!
News articles this week tried to scare people into believing that MP3 as a music format is dead. Why? Well, basically the Fraunhofer institute that created MP3 is no longer licensing the format. Because their patents have expired. Which means that the format essentially moves into the public domain and is free for developers to write encoders and decoders for without having to pay royalties.
The articles suggested people use other formats such as AAC - which are, co-incedentally, still under patent and require royalty payments. These formats are newer and (slightly) better than MP3. I was just gearing up to explain the nonsense in detail when I came across this article by Marco Arment - who did it all for me so I don't have to!
The Working Dead - IT jobs in review
As IT and CAT teachers we have a vested interest in extolling the job market for IT savvy workers. InfoWorld has an excellent article on the evolution and turnover of IT related jobs and just how tricky the IT job market can be. Well worth a read so that you can talk in an informed manner with your learners on the topic.
Fake News corner:
You might wonder why I did not report on the supposed 'Blue Whale' suicide game last week. It's simple: what information was out there seemed sketchy, anecdotal and unreliable. It seemed like a sensationalist story, the kind that proliferates on Facebook. Here's htxt.africa doing some serious research and vindicating my opinion of the story and not giving it any kind of credence.
Welcome back. We all know that ICT is incredibly enabling. IT puts a lot of CAN into your world. This week we take a bit of time to think about responsibility and consequences. We look at three specific examples of where we can ask - 'you can - but should you?'. But first, let's start with some general news for the week:
Quick news summaries:
You can, but Should you: Monitor your staff?
Sensors are becoming smaller, cheaper and more powerful. Using them, people are developing systems to use energy and space in offices more effectively. To do this, the sensors need to track the movement of workers in the office. No workers in a room? OK, turn off the lights and climate control. Have an open plan office and need to manage work spaces, conference venues, meeting rooms, etc? Track who is where in the building.
The problem is that all technology can be used for many purposes. The same sensors that can tell you how many desks are empty and which meeting rooms are available can also be used to track how much time a worker spends at his / her desk. Some sensors can even tell how often people speak to each other. Big Brother is alive, well and coming to an office near you.
So the trade off is, once again, efficiency vs privacy. This is a topic within the frame of reference of your learners - and makes the whole privacy debate real to them. So why not give them the topic and get them to do a real debate in the class?
Some reference sites:
You can, but should you: Profit from fake news?
You live in a poor town in a poor country. There is an election in a foreign country that many people are interested in. You see an opportunity to create some 'news' web sites related to candidates in this election - and make some money off the advertising when people view your site. Your actions may have a significant impact on the outcome of that election. Should you go ahead and make money or not?
This topic is drawn mainly from a fascinating Wired article titled Inside the Macedonian Fake-News Complex. The article details the actions of a 17 year old who made $16 000 (more than R200 000) in four months feeding fake news to the American public during the elections. An interesting read - which raises interesting questions that you and your class need to be aware of.
You can, but should you: Watch porn online?
88 percent of the top 500 porn sites have tracking elements installed.
Finally, we all know that most school kids have looked at online porn at least once. You can be as shocked and in denial as you like - but surely it's better to be honest and upfront with the issue - and with them.
Articles detail how, no matter how you try to hide it, your porn viewing habits can be tracked - and all it takes is a hacker to put it out in public for the world to see... or blackmail you into a very uncomfortable situation. Check out Brett Thomas's Blog and Motherboard.
"If you are watching / viewing porn online ... even in Incognito mode,
you should expect that at some point your porn viewing history will be
publicly released and attached to your name."
-- Brett Thomas
Even if you don't feel comfortable debating the issue of porn, online porn and the viewing habits of the modern teenager - surely it is worthwhile to warn your learners of something that could potentially cause them (at minimum) great embarrassment in the future?
Solving the database problem of time
For the more technically minded. Running a global database is an immense technical challenge. But one of the issues that does not jump to the forefront of one's thinking is Time. How does a database track and manage user interactions (insertions, deletions, edits) on a global scale given the problems of different time zones - and the delays inherent in electronic communications? Only one company has solved this problem - Google. The database it developed is called Spanner, which it is making available to paying customers as a cloud service. Read about it at Wired.
Ransomware & Malware corner
Here's this week's Ransomware and Malware news.
Fake news corner
Here's a summary of fake news related articles for the week:
That's it for this week. Happy teaching!
Welcome back to the blog. A few housekeeping changes this week before we get into the news.
Teaching about Fake News
It looks like 2017 is not only the year of fake news, but also the year in which we have to make an important change to the way we talk about the web and web content with our learners.
Yes, it is true that the web enables anyone to publish anything. Yes it is true that this has been a great enabler for people in general to express themselves and spread news that might otherwise be suppressed.
The thing is, the value of the content on the web depends very much on the sense of integrity and responsibility of those creating that content. The current trend of spreading blatant untruths without pause or hesitation or thought for the consequences devalues the web as a source of reliable content. We need to address this issue in the classroom. The least we (and our learners) can do is identify and refuse to spread fake news.
We know that Fake News has become an issue after the creation of both the CAPS and the textbooks and therefore resources for this topic are scarce. We will continue to feature 'Fake News Corner' in all the blogs throughout the year.
Why is Fake News spread?
Three main reasons are:
This Weeks Fake News links:
And, in other news - to show that accuracy and integrity is important, Wikipedia has banned the use of the Daily Mail (UK Newspaper) as a source because of its unreliability, bias and inaccuracy! Whatever you do, don't use the Daily Mail as a source to check the accuracy of something you think might be fake news! Read it at The Guardian.
This week we have a few InfoGraphics that could be useful for your classroom. Finding good material to print and put on your noticeboards / classroom walls is hard. Here's some useful stuff! To check out lots of other interesting infographics visit coolinfographics.com.
Make sure to tell your Art department that the Metropolitan Museum of Art has made 375 000 high res images of art free to download and use as you wish! What an amazing resource! They explain the move to 'open access' here.
Can you spot the phish? This article from CSO Online makes for a great classroom exercise. It shows a number of real phishing emails and asks you to try and identify why they are phishing mails. It also gives explanations that you can share with your learners.
We all know that anti-virus software works by scanning files on your storage for known signatures of viruses and other malware. The question is - what happens when the malware does not store itself as a file but simply loads itself into memory, leaving no trace for anti-malware software to find? The answer is that the malware becomes almost impossible to detect and eliminate. The scary thing is that, although a proven concept since 2015, fileless malware is hitting the news in a big way this week. It seems that a spate of this type of attacks against mainly banks has been detected in the last while. The good guys are going have to put in looooong hours to find a solution to this one!
The Ransomware Industry
CSO Online says the stats prove the move away from general malware toward Ransomware. Apparently there was a 6% decline in new types of malware last year - at only 60 million new varieties been listed. They proceed to give various reasons, but the astonishing fact is:
|The number of attacks increased 167 times. |
Not 167 percent -- 167 times, from 3.8 million ransomware attack attempts in 2015 to 638 million in 2016.
And if you are in any doubt about how Ransomware is becoming big business, read this eye-opener from Boing Boing about the customer service offered by the operators of the Spora Ransomware. They want to make sure you trust that if you pay your files will be decrypted...
Ransomware is not the only type of hacking going commercial. More proof that hacking is being run like a business is the offering of payment for insider information / passwords / logins. The Hacker News has the low down on how porn and credit card numbers is not all that you can buy on the Dark Web.
That's it for this week. We hope you'll start making use of comments and shares - if you think that what we've got to say is worth it!
086 293 2702 or 012 546 5313
012 565 6469
Copyright Study Opportunities 2016 - 2018. All rights reserved.