Home » 2015 » May

Monthly Archives: May 2015

Fear the invisible

Written by: Ashraf Hamadi
Studying IT in Thorildsplans Gymnasium Stockholm, Sweden

moos+stein2Its remarkable today what kind of power you have just under your fingertips. I discovered this in an early stage. As a young boy I was fascinated about how one could gain access to another one’s computer and remotely use it. That discovery opened my eyes to the real definition of the internet. The features on the internet that are visible for us are just a diminutive part I thought. Opening a webpage or calling your loved one on skype are example of those “visible” things, the things that you deliberately do. But the internet is far greater than that.

Right now there are more than 3.0 Billion people connected to each other through the Internet. This means that more than 35% of the world’s population can go out on the internet, share knowledge, learn new stuff and spend some free time, but just as the internet has opened the world for each and every one of us, it has also opened up each and every one of us to the world. That means that the price for us to pay for us to stay connected is our privacy. I discovered that recently when I was asked to work on a 100 hour high school assignment which is meant to be a proof that the student is prepared for higher education or for work in a specific occupation.

What frightened me was the thought that we are constantly leaving our names, our birthdays and even our credit card information out on the internet, whether it’s regarding Facebook, PayPal or eBay. Seeing all this gave me a thought. I thought that the people should be warned, they should be feared of leaving such information in a wide and invisible place. So I thought that the best way to demonstrate it, is by creating a Trojan virus and infecting a PC to prove that without any hacking knowledge and limited programing knowledge you can steal private information without being noticed.

This resulted in me a 18 year old IT student learning python and creating a python program that could record your keystrokes and take pictures of your screen and invisibly send all the logs to a webserver accessed by only me. I was shocked to what I had accomplished and how easy it was to find all the research necessary. Therefore I feel its my obligation to in the best way I can, spread the word, and spread the truth that the invisible must be feared, because it gathering information about you and someday that information can be used against you.

 

You want to hear more from Ashraf Hamadi?

Come and meet him at The Nordics & Baltics NETACAD CONFERENCE 2015

taking place at the Thorildsplans Gymnasium Assembly Hall on 28th and 29th of May 2015

Registration

 

European Cybersecurity Challenge

ablauf2015_klMost countries lack sufficient IT security professionals to protect their IT infrastructure. To help mitigate this problem, many of them setup national cyber security competitions for finding young cyber talents and for encouraging them to pursue a career in cyber security.

The European Cyber Security Challenge leverages these competitions with a pan European layer to them:

The top cyber talents from each country meet to network and collaborate and finally compete against each other
to determine which country has the best cyber talents.

To find out who’s countries team is the best, contestants have to solve security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and collect points for solving them.

The competition is organized jointly in collaboration with experienced organizations from EU Member States for students. The Organizing Committee of the 1st pan-European Cyber Security Challenge is composed of the following representatives:

Who can participate?

Participants selected by their country’s organization responsible for running the ECSC qualification. In 2015, the following countries can assemble and send a team:

Austria, Germany, Switzerland, Romania, Spain and United Kingdom.

The selected participants should be the top participants from the national challenge and must meet the following criteria:

– They are between 14 and 30 years old
– They are a citizen of the county for which they participate or they live or study there
– They do not (yet) have a master degree or similar
– They do not have a higher education related to cyber security
(e.g., Certified Ethical Hacker, Bachelor in Forensics, …)

Team composition and categories

Teams consist of two (max. 3) coaches/staff members and a maximum of ten (10) contestants from two categories: Junior and Senior. The senior category might not contain more than five (5) members.

Junior: Between 14 and 20 years old
Senior: Between 20 and 30 years old

What are you waiting for?
Join in!

LINKS

Enisa Pan-european Cybersecurity Competition

Read all details about the European Challenge

Introduction to CyberSecurity Cisco Networking Academy

eskills2015

Nordics & Baltics NETACAD CONFERENCE 2015

We are looking forward to welcoming you at this year’s Academy Conference for all Instructors and Contacts from Academies located in Denmark, Iceland, Greenland, Norway, Finland, Estonia, Latvia, Lithuania and Sweden.

The event will be over two half days, starting the 28th of May in the afternoon and ending after lunch on the 29th May.2015 – the participation is free.

If you want to do the ITQ, please send an email to Eugene Morozov emorozov@cisco.com

techInActionBW

We have an exciting agenda for you at this year’s Instructor Conference

  • Internet of Everything session led by your Cisco Sweden Team
  • Community building to share experiences, challenges and best practice
  • Dinner event where you can connect with other instructors

We are looking forward to seeing you in Stockholm and connecting with you.

Kind regards,

Jutta Jerlich
Cisco Networking Academy

Bo Lindborg
Conference Organizer

EVENT DETAILS

The event is taking place at the Thorildsplans Gymnasium Assembly Hall located on the ground floor of the main building.
Thorildsplans Gymnasium, Drottningholmsvägen 82, 112 43 Stockholm
Phone: 08-508 43 500   info.thn@stockholm.se

Nordics Baltics Conference 2015 Agenda

Hotel Information

Registration

LINKS

IoT Case studies

Introduction to IoE in Networking Academy

IoE podcast for NetAcad members (link works when you are logged in)
Host: Jeremy Creech, Cisco Networking Academy Program
Dan Alberghetti, Central Oregon Community College
Rodrigo Floriano, United States
Bernadette O’Brien, RPI-Schenectady
Bob Vachon, Cambrian College in Sudbury, Canada

eskills2015

Follow Blog