Educational Technology Is Making Achievement Gaps Even Bigger
The local name for the Philadelphia neighborhood of Kensington is “the Badlands,” and with good reason. Pockmarked with empty lots and burned-out row...
Supreme Court Says Phones Can’t Be Searched Without a Warrant
In a unanimous decision, the Supreme Court ruled that the vast amount of data contained on modern cellphones must be protected from routine inspection.
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]
EFF and 31 Other Organizations Call for Privacy Assessment of FBI's Biometr
The FBI plans to roll out the face recognition component of its massive Next Generation Identification (NGI) biometrics database this summer—but the Bureau has six years of catching up to do in explaining to Americans exactly how it plans to collect, use and protect this data. Today we called on...
Snowden gets German Fritz Bauer award for exposing US intelligence
Former US intelligence contractor Edward Snowden has been awarded the Fritz Bauer Prize of the German Humanist Union, a prominent civil rights organization, for exposing the controversial surveillance practices of the NSA and its accomplices.
Useful Tips on Using Evernote to Improve Visual Thinking
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Who Doesn’t Want to Close the E-Mail Privacy Loophole?
Bloomberg Businessweek helps global leaders stay ahead with insights and in-depth analysis on the people, companies, events, and trends shaping today's complex, global economy
When considering adding cryptography to an embedded system (or any other information system) manufacturers always ask: “Why do I need cryptography?” That is, unless they have already been burned by…
Companies warned of major security flaw in Google Play apps
University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for criminals to steal corporate or personal data.
Feds Asked Cops to Deceive Courts About Use of Spy Tool, Emails Show
Police in Florida have been deliberately deceiving judges and defendants about their use of a controversial surveillance tool known as a stingray at the request of the U.S. Marshal's Service, according to newly obtained emails.
9 Ways Fear Is Slowing the Integration of #edtech in Schools
Fears surrounding the integration of #edtech have bled into our school systems and classroom practices. The following are 9 ways 'fear' is slowing adoption:
Teachers Professional Development Guide: Must Have Tools and Resources
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Make Personalized Learning a Reality Says Ed Tech Task Force
Do we really need another Blue Ribbon committee to tell us our school system is broken and we, in the U.S., are hopelessly falling behind the rest of the world?
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.