The phishers have a new trick–they send you an email purporting to be from iTunes or Amazon that tells you someone hacked your account and bought something. ‘Just click here and reset your password’. I got one the other day–it looked like this:
Hovering over the iTunes link reveals eurekaequestrian.com, not ‘apple.com’. Apparently Amazon has been having the same problem. Here’s a page from Amazon explaining that they don’t send that kind of email:
So, in short, it’s really important to read url’s, both the obvious ones (many of us got one today that was ‘wayneedu.zyro.com’) and the ones that only appear when you hover over them. When in doubt, hover. And when in doubt, don’t click.
Many WSU faculty (50% of them, to be precise) have been receiving requests to take part in a national survey of faculty attitudes towards technology at the university. The survey is being run by Educause, the national educational IT organization. This is the second year this survey has been run, and last year’s survey produced some interesting results about faculty interests and desires around everything computing-related.
Last year’s results, which are available in ‘infographic’ format here:
Some relevant findings from last year:
- Nationally, fewer than fifty percent of faculty are satisfied with IT support for research.
- Opinions on the use of smartphones in class are mixed, with about half of faculty banning or discouraging them and only a third encouraging or requiring laptops (I myself don’t see how I could ban smartphones, and I’ve taught classes where laptops were required because we were all learning how to use some online tool).
- Many faculty feel they could be better at using web-based content and online collaboration tools in their courses, but there was less enthusiasm about social media as a teaching tool.
There are two versions of the survey, one that takes about twenty minutes to half an hour, and another that takes only ten minutes. Whichever one you choose, your participation will be greatly appreciated, and will help C&IT plan our investments for the next couple of years.
Look for a reminder and your personalized invitation to join in the survey tomorrow. If you don’t get one, you’ll be asked to participate in a more general survey of IT satisfaction that all other faculty, staff and students will take part in later this semester.
So a guy selling pot is robbed by two other guys. And the police use a Stingray to track the robbers down. Then it went to court. The seller was charged with drug distribution, the other guys with felonies.
A couple of weeks ago a judge asked the police to let him see the famous Stingray device I blogged about last. Turns out the police and prosecutors were so loathe to permit the machine to see the light of day that they offered all the putative criminals plea-bargains and they all ended up with probation.
Whole story here.
It will be interesting to see how many of these cases show up in the next year, as Stingray gets better known, and the ‘non-disclosure’ agreements that police departments sign with the FBI when they get the devices get challenged by judges not impressed with secret superpowerful technologies used to conduct simple criminal investigations.
Three quite unrelated postings on ‘teh webs’ struck me this week. Two deal with what your apps are doing to you. One is a Danish public service announcement about what your apps are doing to you. Food for thought, whether we do anything about it or not, and whether we even could:
The third is a much longer piece on what can happen to someone who carelessly tweets something they thought was funny. Turns out not everyone is very charitable, and it can literally ruin your life:
Incidentally, this article is an excerpt from Ronson’s forthcoming book.
I have no solutions, just sobering second thoughts.
As part of National Data Privacy Month I’ve just posted on a national Educause blog about how local and state police are watching you a little too closely for my comfort. You can read about it here:
feel free to comment either below or on the Educause site.
We now have a license for all WSU students to download a copy of SPSS, the best-known commercial statistical software package. Any registered student is entitled to download a copy to their personal computer for free. Because of the way SPSS is licensed, it is only valid until the end of June of this year, but students can update the license starting in July 2015.
Because access is online students can do the download 24/7. They just need to visit
and log in with their WSU AccessID and password. Click ‘Student Software’, then choose SPSS from the column on the left, then select the product wanted. Detailed instructions can be found here.
Availability is restricted to students enrolled in a degree program. It must be installed on a personally-owned computer, and cannot be used for work-related purposes by those who are also employees (and, alas, it’s not available for free for those who are ‘just’ employees). Contact firstname.lastname@example.org if there are problems getting to the SPSS link.
Blackboard has released the free version of their mobile app. Previously it came with a small charge, but the latest version is free for all WSU faculty, staff and students. It’s available for both major platforms, iOS and Android, in the usual places (iTunes App Store and Google Play Store). Your students can use it to check their grades and assignments, view documents and web links, and create discussion and blog posts. Instructors can also post announcements (handy if you’re snowed in or forgot to mention something in class), create and edit assignments (although not grade them), email your class or create new discussions.
To get it, just go to the relevant store and search for Blackboard Mobile Learn. Once it’s installed, open it and log in using your normal Wayne State credentials (yes, it’s safe–it goes directly to Blackboard).
Some FAQ’s about what you can do with it are here
As you’ve heard, this month is National Cyber Security Awareness Month. Wayne State has decided to celebrate by helping folks develop awareness of phishing techniques. By now everyone should be familiar with phishing (note I don’t even use ‘scare quotes’ to mark the word). But even though we read about it in the papers, and online, a scary number of our colleagues got phished in the past twelve months. Some of them were tricked into getting their direct deposit checks rerouted to a pop-up bank in Nigeria (really!) while others got their computers infected and had to have them reformatted, occasionally losing the data stored on them. And yes, I’m talking about our Wayne State colleagues, not people somewhere else.
C&IT has developed a quiz designed specifically for the Wayne State community. It is intended to help you recognize the warning signs in a phishing message. We’re hoping that heightened awareness and some training (hidden in the quiz) will help protect not only you, but the entire WSU community.
We will be sending out an invitation by email to participate in the ‘survey’. Every completed quiz will be automatically entered in a drawing to win one of two prizes. Students are eligible for a $100 gift card to Barnes & Noble. Employees are eligible for a Wayne State prize pack. Winners will be notified in early November.
My next blog will include specific tips on how to recognize phishing email messages, such as hovering over any links to see whether what pops up matches the text you can see (and also whether, if it’s claiming to come from Wayne State it has a .wayne.edu address).
So watch your mailboxes for more on this topic.
I just read a particularly good discussion of the (now dying down) controversy over the leaking of celebrities’ sexted photos. It makes a number of points that haven’t been raised elsewhere:
- Saying ‘don’t take revealing pictures of yourself’ because they might leak is like saying ‘don’t use a credit card because your identity might get stolen’.
- Phones are a new kind of sex toy, and they and their use is not going away.
- People don’t know where their photos go when they use their phones. Almost all phones (iPhones, Androids, at least) automatically, and without our noticing, back photos up to the cloud.
- Cloud providers need to get their security act together, but probably won’t, because there isn’t enough shrieking going on.
By now everyone knows that a number of (primarily young, almost exclusively female) Hollywood stars had compromising pictures of themselves posted to a public Internet site, provoking much social commentary.
The reason for this post is not the fact that it happened–it happens frequently, and sometimes goes under the heading of ‘revenge porn’. What is more interesting, from my point of view, is the nature of the reactions.
I was discussing this story with some of my younger colleagues at C&IT the other day, and found their response simultaneously startling and familiar. Their answer was ‘Who cares?!! Privacy is dead, get over it.’
What was startling was that I have friends who actually feel that way. What was familiar was the meme ‘privacy is dead’. It was first said in that form by Scott McNealy in 1999. For those who aren’t familiar with McNealy, he was the founder of Sun Microsystems, an early major computer hardware and software company (responsible, among other things for Java, MySQL and NFS).
Discussion of the leaked nude photos has varied widely. The initial response was outrage, particularly from some of the celebrities themselves (although some have also claimed that the photos were fake, for which there is some forensic evidence). On the other hand, much of the early response consisted of statements that could be paraphrased as ‘if you don’t want nude pictures circulating on the internet, don’t take them.’
Interestingly, subsequent commentary has had two directions. One is to suggest that blaming the stars for having nude pictures floating around is like blaming women for being raped because they wore [fill in your favorite meme] clothing.
On the other hand, a number of commentators have suggested the fault lies in the poor security structure of iCloud, or perhaps of the iPhone (apparently a hack of the Find My iPhone may have permitted the Apple cloud storage system to be breached, although that vulnerability has since been patched).
Other commentators (including my buddy Nick Gillespie) have suggested that this is something for which the cure would be worse than the disease.
Finally, danah boyd, a radical feminist blogger who works for Microsoft (yes, you read that right) wrote very thoughtfully several years ago about the morality of ‘outing’ people on the Internet, an activity somewhat related to this.
I have no words of wisdom to provide here–I’m an onlooker watching how the world is changing around me. Thoughts?