GS

Finding clues in text messages

Text messaging apps sometimes keep your old messages. That can be handy if you want to remember a conversation or share some information in a text with someone else.  Cyber investigators look at texts and emails to find clues to solve a hacking mystery. What kind of words would you look for in texts or …

Finding clues in text messages Read More »

Use Social Engineering

Social engineering is a cyberattack strategy that attempts to manipulate or deceive a user so that they give up their personal information. If it sounds too good to be true, it probably is!  No matter what your hobbies or interests are, scammers have developed many different techniques to get you to click on their link …

Use Social Engineering Read More »

Explore Different Kinds of Hackers

Sometimes the word “hacker” makes people think “criminal.” But the term “computer hacking” doesn’t mean breaking the law or hurting people. It just means changing code. ■ White Hat Hackers Schools and clubs hold “hackathons” where people get together and design or improve programs and apps. The hackathons are usually focused on meeting a need …

Explore Different Kinds of Hackers Read More »

Explore Two-Factor Authentication

Some computer security systems use something called two factor authentications. That means that the person wanting to get into the account must have two things to prove they should have access. For example, if you’ve ever had to be picked up at school by a grown-up, you know about two-factor authentication. Most schools use two-factor …

Explore Two-Factor Authentication Read More »

Mix Up your Password

To make a really strong password, you need to get creative. Here’s why: Hackers have programs that can run through dictionaries with lightning speed. They can identify millions of passwords in minutes. Then they use another program to try all these passwords to hack into people’s accounts. Hackers also have programs to search books, movie …

Mix Up your Password Read More »

Hacking a Password

Every time you set up an account on your computer or phone, you have to create a password. An account is just a way for the website or app you are using to know who you are. If you have email, keep or turn in school work online, or play online video games, you have …

Hacking a Password Read More »

Words to Know

Brute force attack when an attacker tries many different passwords in hopes of guessing correctly Computer network a group of computers—or other digital devices—connected together insome way Cybersecurity the protection of digital devices, such as phones or computers, against attacks Dictionary attack when an attacker uses an existing list of words as potential passwords Digital …

Words to Know Read More »

Crack a Code

Wouldn’t it be fun to have a secret language that only you and your friends knew? You’d have to create your own secret code. Cryptography is the process of writing and solving codes.  When you take a message and turn it into a code, you encrypt it. When you turn the code back into a …

Crack a Code Read More »