Archive for November 2014
Cybersecurity skills need boost in computer science degrees
University
computer science courses are failing to make clear the need to develop skills
in cybersecurity, leaving the UK with a shortage of experts
This
is according to a paper published jointly last week by the Council of
Professors and Heads of Computing and (ISC)2, the International Information
Systems Security Certification Consortium.
“Twenty
years ago very few courses paid any significant attention to security, and the
situation has started to change, albeit slowly,” says “Perspectives:
Integrating Cybersecurity into Computer Science Curricula”.
This
is despite “a growing voice from industry that cybersecurity knowledge should
be core to the disciplines of computing and information technology”, meaning
such skills should therefore be “a key element of the computing and computer
science curriculum, particularly at the undergraduate level”.
Currently
most institutions offer computer science courses in which there is one module
or unit – approximately 5 per cent of the total credits – dedicated to
cybersecurity in a three-year degree, the paper claims.
It
also notes that graduates find it difficult to enter the cybersecurity industry
because “the supervisory cost of placements is very high for companies to take
on many graduates of any kind in cybersecurity roles”.
“Academia
must look at its curricula and accreditation requirements,” said Liz Bacon,
president of the Chartered Institute for IT, adding it was also incumbent on
industry to accept more trainees and placement students.
She
said that more sandwich placements needed to be made available, and that
lecturers could not single-handedly boost interest in cybersecurity among
students, and that “talks from external speakers” and “war stories” from
industry were more likely to excite students.
“It
is not enough to integrate technical cybersecurity subjects into computing
degrees as cybersecurity is an increasingly a diverse discipline, requiring a
mix of business savvy, soft skills and technical skills for varied roles,”
added Adrian Davis, managing director (Europe, the Middle East and America) of
(ISC)2.
“Universities
have a real opportunity to include and make explicit reference to cybersecurity
topics within many degrees.”
In
August, the first GCHQ-certified master’s courses were unveiled, with Edinburgh
Napier University, Lancaster University, the University of Oxford and Royal
Holloway, University of London, among those accredited.
Making Malware Cleanup Easier
Making Malware cleanup easier
You'll
find a recommendation to install software to detect and clean up malware in
almost any security guide. Although a single product isn't sufficient to defend
against all modern security threats, the general recommendation persists
because the technology remains effective in blocking categories of known
threats and cleaning up malware infections if they find their way onto your
computer. Since resolving a malware problem is a little bit different each
time, we're committed to working with our partners to give people on Facebook
the help they need in keeping their information secure.
Our
goal is to make it easier for people to find and use the right technology to
better protect their devices. We've worked with F-Secure and Trend Micro to
incorporate free anti-malware software downloads directly into our existing
abuse detection and prevention systems. These are the same systems that help us
block malicious links and bad sites from among the trillions of clicks that
take place every day on Facebook.
How to Unlock Pattern Locks on Android Devices
How to Unlock Pattern Locks
on Android Devices
Nowadays many android phone users use the
inbuilt “pattern locks” as a security to their phones. But the main problem
with it is that, if you forget the pattern you used and you try out many wrong
attempts, it gets locked permanently. So, just follow these simple steps
to unlock pattern locks on your android device and use it again free
of cost.
Unlock using Google Account :
If you don’t have data connection or internet access or if you
don’t have your google account linked to your phone, then, you can skip this
step and refer the Additional TRICK.
When you try different patterns and unable to unlock your phone in five attempts. Then a message
pop-up and shows two buttons “next” and “try again”. Now click on “next” button
and you see two options for unlocking phone. One is answer the
security question and the second option is to provide Google account details.
Mostly people don’t set a security question. But if you set it
then simply answer the question and unlock your device
quickly. Otherwise check the Google account option and click “next”.Now provide
your Google account username and password attached with your device and click
on “sign in”. After that you are directed to choose new pattern and now you can
unlock with this pattern.
1) Switch off the phone.
2) Now hold these buttons all together at the same time
“Volume up +
Home Key + Power Button”
until the phone boots (if you device doesn’t have a home button
just hold together volume up key and power key)
3) Now a screen like DOS will come up with different options
4) Use the volume key to move up and down then scroll down to
“Restore Factory Defaults” or “Delete all User Data” depending on which is on
your device. Select this factory reset option and then press power button to
let the action begin.
Now it asks you for confirmation, select “yes”.
5) After clicking on the settings above, now scroll down to
“Reboot System Now” and wait for your phone to reboot (restart).