• U.S. Cyber Challenge opens registration for Cyber Quests competition

    Last week the Council on CyberSecurity, through the U.S. Cyber Challenge (USCC) initiative, announces the open registration of its qualifying Cyber Quests competition — a challenging online contest open to high school and college students, as well as professionals, who will compete against their peers across the country for an invitation to one of four Cyber Camps being offered this summer. The online competition and camps are designed to improve cybersecurity skills, provide training and mentorship from leading instructors and highlight skills for potential employers.

  • Science-themed music videos enhance STEM education

    As the United States puts ever-greater emphasis on science, technology, engineering, and mathematics (STEM) education to keep competitive in the global economy, schools are trying to figure out how to improve student learning in science. Researchers think music may be the answer for some kids. They studied the ability of music videos to enhance students’ understanding of scientific concepts.

  • Delaware launches cyber initiative

    Delaware is joining the number of states that have decided to invest in a statewide cybersecurity workforce to combat the growing threat of cyberattacks directed at both private and public institutions.Delaware hopes its cyber initiative will accelerate current efforts to develop a stronger cyber workforce. The Delaware Cyber Initiative proposes $3 million for a collaborative learning and research network in the form of part research lab, part business park, dedicated to cyber innovation.

  • The physics of the 3-point shot

    Creighton University physics professor Gintaras Duda, may not see very many basketball players in his classroom, but he says they are instinctual physicists because of what it takes to make the perfect shot on the court, particularly the 3-pointer.

  • “Hacker schools” grow to meet growing demand for programmers

    The increasing demand for computer programmers in the job market has led to the growth of “hacker schools,” an alternative to traditional education that offers students a quicker, cheaper, and effective way to learn computer programing. Hacker schools do not offer certificates or diplomas, instead they target students who currently have degrees in other fields but who want a career change.

  • Universities struggle to balance cybersecurity, openness

    Since January 2013, more than fifty academic institutions across the country have been targets of cyberattacks, compromising personal information and intellectual property. Unlike other organizations, universities cannot mandate what devices are used to access their networks, and they must accommodate faculty, students, and researchers spread across the globe. Academic network systems are attractive to hackers because they contain valuable intellectual property.

  • Hacking prof’s computer to change a grade is easier than studying

    Academic institutions are easy targets since many do not invest in sophisticated IT personnel or employ the latest cybersecurity programs. Some students have noticed this, and more and more universities are facing a new hacking problem: students hacking their professors’ computers in order to improve their grades. “It became so much easier to change my grades than going to class and working real hard,” a Purdie University student told an Indiana court.

  • Iona College to Launch BS, BA, MS concentrations in cybersecurity

    Iona College announced the launch in fall 2014 of undergraduate and graduate programs in computer science with a concentration in cyber security. The concentration will be offered for the Bachelor of Science, Bachelor of Arts, and the Master of Science degrees. The programs will provide students with fundamental cyber security skills, theoretical as well as hands-on experience. Students are exposed to new research ideas across many cyber security areas including software security, Web application security, mobile security, networking security, database security, and cryptography.

  • Wisconsin YES youth business plan contest helps promote STEM education

    The number of skilled individuals needed in STEM industries is enormous, and growing, making it more and more crucial to promote the education of students in these disciplines. Wisconsin Yes! Aims to foster interest in science and tech education and encourages students to be independent, creative thinkers capable of problem solving. The statewide Wisconsin YES! youth business plan contest will close to entries 5 p.m. Monday, 17 March. Public, private, and home-schooled students across Wisconsin are eligible to turn their science- and tech-related ideas into business plans and compete for cash and prizes.

  • High level of “brain waste” among highly educated immigrants

    Many highly educated immigrants coming to the United States without a job lined up have been unable to find work at their level of education, leading to considerable “brain waste,” researchers have found. The prevalence of such “brain waste” exceeded 40 percent for immigrants with a bachelor’s degree, 50 percent for those with a doctoral or professional degree, and 75 percent for those with a master’s degree.

  • Connecting individual K-12 STEM subjects for better results

    A new report from the National Academy of Engineering and National Research Council examines current efforts to connect the science, technology, engineering, and mathematics (STEM) disciplines in K-12 education, both in formal classroom settings and informal learning environments, and suggests research to help determine the conditions most likely to lead to positive outcomes such as greater student retention and achievement, improved college-readiness skills, and increased interest in pursuing a STEM-related career.

  • Too much too young? Teaching children about violent extremism

    Dealing with the rise of homegrown terrorism has prompted governments to take novel approaches in combating such threats. The U.K. government, for example, has recently pushed for schools to teach children as young as four about the dangers of violent extremism. One counter-radicalization strategy adopted by the U.K. government is Prevent, which has been used effectively in British secondary schools. Prevent has in the past been viewed with suspicion, however, particularly by British Muslim communities, as Prevent funding has previously been tied directly to the number of Muslim schools in an area. What Australia can learn from the British example is ensuring that certain communities do not feel alienated. Instead, any attempts at education should focus on the problem of radicalization as a whole.

  • University of Texas at San Antonio ranked top U.S. cybersecurity school

    The University of Texas at San Antonio (UTSA) ranks as the top school for cybersecurity courses and degree programs according to a Hewlett-Packard (HP)-sponsored surveyof 1,958 certified IT security professionals. The schools undergraduate and graduate programs received top marks for academic excellence and practical relevance.

  • Washington State offers college financial aid to children of undocumented immigrants

    Governor Jay Inslee of Washington State yesterday signed legislation which will offer college financial aid to students brought into the United States illegally by their parents. California, Illinois, Texas, and New Mexico have passed similar legislations. The measure represents a shift in the position of State Senate Republicans: last year, the GOP-controlled Senate blocked a similar measure,called the Dream Act of Washington State, but earlier this month the Senate passed its own version of the bill, which the the governor, a Democrat, signed.

  • Collegiate cyber defense competition advances to regional finals

    Seven members of the University of Maine Cyber Defense Team will compete at the annual Northeast Collegiate Cyber Defense Competition at the University of New Hampshire in March. The team was one of nine out of a pool of fourteen schools that qualified for the regional competition. The competition simulates security operations for a small company. Teams must quickly familiarize themselves with network systems and software before beginning to defend against attacks while also providing customer service to users.