The internet has made defensive writers of us all
!Cool Resources
‘Hostile to privacy’: Snowden urges internet users to get rid of Dropbox
Edward Snowden has hit out at Dropbox and other services he says are “hostile to privacy,” urging web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.
We Need Better Managers, Not More Technocrats
Building digital organizations is ultimately about leadership.
Edtech Tofu: Using FormMule and IFTTT for a moderated student twitter feed.
This project has been updated to use the new Google Sheets and formMule add-on, read about it here Just about a year ago, I had the...
Google and Apple Won't Unlock Your Phone, But a Court Can Make You Do It
Silicon Valley's smartphone snitching has come to an end. Apple and Google have promised that the latest versions of their mobile operating systems make it impossible for them to unlock encrypted phones, even when compelled to do so by the government. But if the Department of Justice can't demand that its corporate friends unlock your phone, it may have another option: Politely asking that you unlock it yourself, and letting you rot in a cell until you do.
Newest Androids will join iPhones in offering default encryption, blocking
The move raises yet another barrier to police who want to gain access to the troves of personal data typically kept on smartphones.
Apple's Patriot-Act-detecting "warrant canary" dies
It's been less than a day since the company published its new, excellent privacy policy — but Gigaom has noticed that the latest Apple transparency report, covering Jan 1-Jun 30…
A Wonderful Google Form Guide for Teachers
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Forget iPads, Education Needs a Whole New Framework
The biggest problem with our educational system is that it's big business. And the education-technology revolution, while claiming to be the answer to our outdated system, only fuels the money machine, providing zero incentive to make changes that will truly help our children.
10 Ways to Say the Right Thing Every Time
Powerless is a myth. Something as simple as a raised eyebrow has the power to influence.
How to Invite and Survive Feedback From a Group - Leadership Freak
Life is simpler without others in it. But, everything that matters includes people.
http://www.makeuseof.com/tag/torrentlocker-new-ransomware-evil/
"TorrentLocker" Malware Combines Elements From CryptoLocker, CryptoWall
A new piece of ransomware called TorrentLocker has been analyzed by researchers, and uses visual components borrowed from CryptoLocker and CryptoWall.
Chuck Sambuchino's Submission Tips for Writers | Writers In The Storm
Chuck Sambuchino shares sixteen tips for professional submissions.
http://www.writersdigest.com/editor-blogs/there-are-no-rules/wolman-anthology
Leadership Day Challenge: Connect, Curate and Contribute
The Challenge: Connect, Curate and Contribute! I’m very excited to take part in Leadership Day 2014! I feel it is important to consider all types of educational leaders, from classroom to campus level, from campus level to district level, and everyone in between. Our number one goal as educators should always be our students, and finding ways to support, engage, improve and transform the learning experience. Below are three challenges I have have for educational leaders.
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Calling all bloggers! – Leadership Day 2014
10 Ways to Defeat Blood Sucking Vampires - Leadership Freak
Blood sucking vampires lurk in the shadows of your organization. If you don't stop them, they'll drain you.
The 8 scariest digital security stories of 2014 (so far)
The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences
Why the Security of USB Is Fundamentally Broken
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t \[…\]
Feds haven’t reached out about massive password cache – IT firms struggle t
IT firms struggle to fix busted Web padlock — Black Hat’s big idea: U.S. should buy zero days — Beijing says it won’t buy Apple products
So Google scans email for dodgy images - should we be worried about scannin
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on …
‘Staggering’ data breach of 1.2B usernames and passwords could worsen: Expe
How to recover files from a CryptoLocker attack, without paying!
Boffins have created a free service to help anyone has fallen foul of the notorious CryptoLocker ransomware that encrypts computer files and demands a ransom be paid for the decryption key.
Technology SAMR Model for Administrators Part 4: Classroom Evaluations
Through the SAMR (Substitution, Augmentation, Modification, and Redefinition) model of technology, administrators can bypass the distractions and interruptions that often interfere with classroom evaluations.
New Protection Scheme Makes Weak Passwords Virtually Uncrackable
ownCloud 7.0.0 Private RSA Key Disclosure
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
Minilock, a simple but powerful file encryption app