June 27, 2022
Today, many Americans will head out to the water—not to swim, but to catch a catfish in time for National Catfish Day.
But when we talk about catfishing in cybersecurity, we me...
June 23, 2022
Word Tamer is a site for learning the process of developing characters, settings, and plots. Word Tamer is set up as an interactive journey through a carnival of literary devices....
June 9, 2022
Facebook is once again the launchpad for a large-scale phishing campaign, according to researchers at PIXM. The campaign, which first shows signs of life back in September 2021, h...
May 27, 2022
Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulne...
May 19, 2022
TARA is a new tool designed to help you streamline your lesson planning process. It was designed by a couple of teachers for teachers. Earlier this week I had the opportunity to s...
May 17, 2022
Apple has released security updates for a zero-day vulnerability that affects multiple products, including Mac, Apple Watch, and Apple TV.
An out-of-bounds write or read flaw m...
May 17, 2022
More voices are being raised against the use of everyday technology repurposed to attack and stalk people. Most recently, it’s reported that Ohio has proposed a new bill in relati...
May 13, 2022
The website has been created by Klokan Technologies GmbH, specialists in online map publishing and in applications of open-source software. It aims to demonstrate a combination of...
May 13, 2022
Scammers often pose as well-known companies: online movie theaters, job hunting services, internet stores and so on. This time, phishers are targeting customers of Wells Fargo, on...
May 12, 2022
The teaching profession influences society in all areas. Yet, teachers and their role in forming the next generation are often not appreciated enough. All teachers need a sense of...
May 10, 2022
These online classroom timers are simple and easy to operate and do not require any software download or registration. Depending on which tool you choose, they offer different fea...
May 6, 2022
While the 419 cosmonaut backstory (surprisingly!) has layers of truth to it, your typical Instagram scam story doesn’t have an iota of fact it can stand on. But because the storie...
April 29, 2022
When someone finds their social media account compromised, they first think about letting their followers know. And they do. They warn others from reading any strange posts, usual...
April 29, 2022
Fraudsters like confusing and disorienting people. Successful ones avoid obvious lines of approach and try things you wouldn’t expect. A recent story highlights this, with a parti...
April 28, 2022
Although the data provided was limited, it was enough for the hackers to work on and use to target and harass specific women or sexually extort minors. In some instances, the data...
April 27, 2022
Emotet is spammed around in emails claiming to contain invoices, forms, or payment details. The attachment is a password-protected ZIP file with a shortcut link file (has the .LNK...
April 21, 2022
Google Calendar has an awesome new Appointment Schedule feature that allows you to create a booking page, so parents can sign-up for a time slot for parent teacher conferences!
...
April 14, 2022
I've always used some type of timer to keep track of how long students were working on an activity and to keep track of break times between activities. When I first started teachi...
April 8, 2022
A teacher’s work is never done. Seriously, it’s amazing how much responsibility educators manage to shoulder throughout the week. From planning and delivering lessons, to grading,...
April 8, 2022
Security researchers from Armorblox, a cybersecurity company specializing in email-based threats, have encountered a fake WhatsApp email with the subject “New Incoming Voicemessag...