❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 18 May 2024Main stream

Cloud Monitor Identifies and Remediates Problematic VPN Use in K-12 Districts

17 May 2024 at 18:00

Recently, we hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12 tech pros how important cybersecurity and safety monitoring are for Google Workspace, Microsoft 365, and online browsing. They […]

The post Cloud Monitor Identifies and Remediates Problematic VPN Use in K-12 Districts appeared first on ManagedMethods.

The post Cloud Monitor Identifies and Remediates Problematic VPN Use in K-12 Districts appeared first on Security Boulevard.

Parents overestimate sons’ maths skills more than daughters’, study finds

18 May 2024 at 03:00

Gender stereotypes at home may hamper female students’ ability to progress in the classroom, research suggests

Parents are more likely to overestimate maths ability in sons than daughters, according to research that suggests that gender stereotypes at home may hinder the progress of female students.

The findings, presented in a lecture at University College London this week, found that parents tend to be overconfident about their children’s academic performance in reading and maths regardless of gender. But, in maths, parents overestimated boys’ skills to a significantly greater extent.

Continue reading...

πŸ’Ύ

Β© Photograph: Robert Daly/Getty Images

πŸ’Ύ

Β© Photograph: Robert Daly/Getty Images

Yesterday β€” 17 May 2024Main stream

The science of lifespan β€” and the impact of your five senses | Christi Gendron

What you experience through your senses β€” sight, smell, hearing, taste and touch β€” can impact how healthy you are and how long you live, says neurobiologist Christi Gendron. She explores how environmental cues like temperature, light and even just the sight of death have influenced the lifespan of fruit flies, suggesting your everyday perceptions may have direct repercussions on your ability to live a long, healthy life.

πŸ’Ύ

Air Up: scent-flavoured water bottle becomes latest playground craze

By: Zoe Wood
17 May 2024 at 08:44

School must-have is setting pressured parents back Β£30 but could help keep kids off sugary drinks

From loom bands to fidget spinners, playground crazes are usually cheap and cheerful, but the latest must-have is an expensive drinks bottle that comes with scent pods that trick your brain into thinking water is cola or fruit juice.

The growing popularity of Air Up, with the cheapest bottles starting at about Β£30, is a dilemma for parents.

Continue reading...

πŸ’Ύ

Β© Photograph: Stephen R Johnson/Alamy

πŸ’Ύ

Β© Photograph: Stephen R Johnson/Alamy

The Tories' war on foreign students isn’t for the good of the country – it's about saving their own skins | Polly Toynbee

17 May 2024 at 02:00

This dying government is happy to see universities in crisis, the economy damaged and soft power lost – if it wins a few votes

A key turning point in British politics was Tony Blair’s famous three priorities: β€œeducation, education, education”. A giant step was his 1999 conference speech: β€œToday I set a target of 50% of young adults going into higher education in the next century.” By 2017-18 that symbolic threshold had been crossed in England, with more than half of young people taking that leap forward. In 1980 it was just 15%.

But universities are falling into severe financial crisis. Unsurprisingly, the Tories are not unduly bothered. They attack universities all the time, calling for cuts in student numbers. Now they are plunging the knife into vital funding from foreign students. They ignore pleas from major companies, which wrote to the government this week, to stop a migration policy that is threatening investment in the UK by blocking foreign students.

Polly Toynbee is a Guardian columnist

Continue reading...

πŸ’Ύ

Β© Photograph: Andrew Fox/Alamy

πŸ’Ύ

Β© Photograph: Andrew Fox/Alamy

Sex education is now just another political football. For the children’s sake, the adults must grow up | Gaby Hinsliff

17 May 2024 at 01:00

Teenagers need and want good information about sex. The government’s review, and this ideological tug-of-war, is failing them

Imagine a teenage boy, alone with his phone late at night. A message pings in from a pretty stranger, or even from the hacked account of a girl he already knows. Either way, it’s crudely calculated to grab his attention. There will be pictures, tantalising promises of something even more explicit, if he’ll send nudes in response. But if he does, the brutal trap springs shut.

What follows is a demand for money, if he doesn’t want the compromising pictures plastered all over the internet for everyone at school to see. Some boys (the vast majority of so-called sextortion victims are boys) try to pay up. The lucky ones panic and tell their parents. Tragically, a handful are known to have killed themselves rather than risk public humiliation.

Gaby Hinsliff is a Guardian columnist

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

πŸ’Ύ

Β© Illustration: Thomas Pullin

πŸ’Ύ

Β© Illustration: Thomas Pullin

Teachers in England stretched by pupils’ mental and family problems, MPs say

Education select committee concerned that excessive workload is driving teachers out of profession

Teachers’ workloads are being increasingly stretched by their pupils’ mental health and family difficulties, according to MPs who were critical of the government’s efforts to tackle chronic staff shortages in England’s schools.

The education select committee said it was β€œconcerned that since the pandemic teachers are spending more time on addressing issues that would typically fall outside the remit of schools, including family conflict resolution and mental health support,” and called for the government to support better provision inside and outside schools.

Continue reading...

πŸ’Ύ

Β© Photograph: David Jones/PA

πŸ’Ύ

Β© Photograph: David Jones/PA

What are Labour’s six pledges and how likely is their success?

Commitments range from cutting NHS waiting times to delivering economic stability – and are united by a lack of detail

Keir Starmer has unveiled six commitments which, he said, would constitute the first steps taken by a Labour government. The Labour leader was reluctant to use the word β€œpledge”, but the six statements inevitably drew comparisons with Tony Blair’s 1997 pledge card.

Unlike Labour’s promises going into that election, however, the steps Starmer outlined were generally vague and their success is likely to prove difficult to measure.

Continue reading...

πŸ’Ύ

Β© Photograph: Victoria Jones/PA

πŸ’Ύ

Β© Photograph: Victoria Jones/PA

Before yesterdayMain stream

All parents, working or not, should have access to childcare, say experts in England

16 May 2024 at 12:00

Rescue and reform manifesto from Early Education and Childcare Coalition calls for overhaul of model

A manifesto calling for an overhaul of childcare provision in England, including making early education accessible to all children regardless of whether their parents work or not, has been backed by dozens of leading employers and unions.

Thirty-five national organisations have joined forces to call for the reform of the current childcare model, including the Federation of Small Businesses, the Early Years Alliance, the Fawcett Society, Joseph Rowntree Trust and the National Children’s Bureau.

Continue reading...

πŸ’Ύ

Β© Photograph: Stuart Boulton/Alamy

πŸ’Ύ

Β© Photograph: Stuart Boulton/Alamy

The Role of Identity and Access Management in K-12 Cybersecurity

16 May 2024 at 07:36

We’re all familiar with the concept of a driver’s license or passport. As a form of identification, these documents serve two purposes: They verify someone is who they claim to be. They authorize access to buildings, services, and so on. But that’s the real world β€” on the internet, people have a β€œdigital identity.” In […]

The post The Role of Identity and Access Management in K-12 Cybersecurity appeared first on ManagedMethods.

The post The Role of Identity and Access Management in K-12 Cybersecurity appeared first on Security Boulevard.

Universities in England risk closure with 40% facing budget deficits, says report

Analysis by Office for Students says increasing number will need to make significant changes to their funding model

An increasing number of universities in England face β€œa material risk of closure” unless they dramatically cut costs or merge over the next few years, according to the higher education regulator’s annual health check.

The report by the Office for Students (OfS) paints a bleak picture of universities overreliant on international students to plug the gaps left by the declining income from domestic student fees, with the OfS warning that 40% of England’s universities are expected to run budget deficits this year.

Continue reading...

πŸ’Ύ

Β© Photograph: Joe Giddens/PA

πŸ’Ύ

Β© Photograph: Joe Giddens/PA

Tories call Starmer β€˜a serial promise breaker’ in attack on Labour’s pledge card launch – UK politics live

16 May 2024 at 10:16

Conservative party chair Richard Holden says Labour leader β€˜doesn’t have courage or conviction to stick to a single pledge’

Ed Miliband, the shadow energy secretary, is up now. He highlights the energy pledge.

4) Set up Great British Energy a publicly-owned clean power company, to cut bills for good and boost energy security, paid for by a windfall tax on oil and gas giants.

Continue reading...

πŸ’Ύ

Β© Photograph: Leon Neal/Getty Images

πŸ’Ύ

Β© Photograph: Leon Neal/Getty Images

Pupils in England can learn about gender surgery but not β€˜ideology’, says Keegan

Education secretary says new guidance will not stop schools teaching children about gender-reassignment surgery

Children will be allowed to learn about trans people who have undergone gender reassignment surgery but not β€œgender ideology”, the education secretary has said.

Gillian Keegan said government guidance on sex education was aimed at stopping β€œgender ideology” that was β€œignoring biological sex” being used in some schools.

Continue reading...

πŸ’Ύ

Β© Photograph: Lucy North/PA

πŸ’Ύ

Β© Photograph: Lucy North/PA

I’d hate to be learning English again. Apostrophes are a nightmare | Adrian Chiles

16 May 2024 at 06:00

Spell unlikely words, cram them into sentences: there must be a better way for kids to get the measure of a language

The mice’s nest was under the floorboards. The geese’s pond was smelly. There, I’ve done it. I’ve put two words, possessives I have never used and will never use again, into sentences. These were two of 10 awkward possessives that my friend’s daughter had been tasked with putting into sentences. Men’s and ladies’ were on the list too. My friend asked how she might go about explaining the rules behind these apostrophe positions to her nine-year-old. I’m afraid I couldn’t be of much assistance. Rather her than me.

The exercise was almost triggering for me. I hated doing these things with my daughters when they were at primary school. This was about the only homework they were ever set – learn how to spell these words and put them into sentences. The purpose is obvious. I get that teaching English spelling is a nightmare and putting a word into a sentence shows that you know what it means, and hopefully helps you remember how to spell it. But, oh Lord, the agonising, circuitous routes around words you’d have to find to construct a bloody sentence.

Adrian Chiles is a broadcaster, writer and Guardian columnist

Continue reading...

πŸ’Ύ

Β© Photograph: Maskot/Getty Images

πŸ’Ύ

Β© Photograph: Maskot/Getty Images

How US schools became a political battleground: β€˜These are proxies for a bigger clash in society’

16 May 2024 at 03:09

In They Came for the Schools, Mike Hixenbaugh looks at how a conservative agenda caused conflict in his Texas school system

Mike Hixenbaugh had been a journalist for years, reporting on a variety of topics ranging from education policy to healthcare, the military and other subjects, when one day he discovered a potential story literally in his front yard. It was the summer of 2020, and in response to a local Facebook thread spreading false information about antifa operating in his neighborhood, Hixenbaugh and his wife, who is Black, put up a Black Lives Matter lawn sign in their front yard. The response was prompt: β€œEvery weekend for two months after my wife put the sign up, someone drove their four-wheeler into our yard and did donuts in it, churning up deep divots in the grass.”

At that point, Hixenbaugh realized that something had been happening in his quiet Dallas suburb of Southlake, something that was probably very big – unraveling just what was afoot would be the journalistic work of years, and would ultimately result in his new book, They Came for the Schools.

Continue reading...

πŸ’Ύ

Β© Photograph: Jon Shapley/Houston Chronicle via Getty Images

πŸ’Ύ

Β© Photograph: Jon Shapley/Houston Chronicle via Getty Images

Age curbs on sex education topics risk making some children vulnerable

One-size-fits-all guidance will lead to some children accessing information via internet searches

When it comes to sex education in schools in England, teachers and experts agree on one thing: using age alone to determine what topics to cover and what to avoid risks leaving some children more vulnerable.

Headlines announcing the new guidance, to be published under consultation this week, focused on its bar on teaching sex education in primary schools to children earlier than year 5, when they are aged 9.

Continue reading...

πŸ’Ύ

Β© Photograph: Ben Birchall/PA

πŸ’Ύ

Β© Photograph: Ben Birchall/PA

You're not supposed to actually read it

By: Artw
15 May 2024 at 14:55
A GOP Texas school board member campaigned against schools indoctrinating kids. Then she read the curriculum. The pervasive indoctrination she had railed against simply did not exist. Children were not being sexualized, and she could find no examples of critical race theory, an advanced academic concept that examines systemic racism. - Her fellow Republicans were not relieved to hear this news.

UK free school meal allowances too low for healthy lunches, study finds

15 May 2024 at 15:00

Researchers also find lack of fresh fruit and vegetables in schools and say portion sizes sometimes not enough

Free school meal allowances are not enough for students from lower-income backgrounds to buy healthy school lunches, research suggests.

The study, presented at the European Congress of Obesity (ECO), involved 42 pupils aged between 11 and 15 at seven schools across the UK.

Continue reading...

πŸ’Ύ

Β© Photograph: Ben Birchall/PA

πŸ’Ύ

Β© Photograph: Ben Birchall/PA

With spatial intelligence, AI will understand the real world | Fei-Fei Li

In the beginning of the universe, all was darkness β€” until the first organisms developed sight, which ushered in an explosion of life, learning and progress. AI pioneer Fei-Fei Li says a similar moment is about to happen for computers and robots. She shows how machines are gaining "spatial intelligence" β€” the ability to process visual data, make predictions and act upon those predictions β€” and shares how this could enable AI to interact with humans in the real world.

πŸ’Ύ

How fantasy worlds can spark real change | Annalee Newitz

When the world's problems have you weary, journalist and science fiction writer Annalee Newitz suggests a good dose of escapist fiction to refresh your perspective. Step into the whimsical world of science fiction, cosplay and "goblincore" to see how fantasy worlds help us reimagine our relationships with our communities and each other β€” and why the best way to solve your problems may start with escaping them.

πŸ’Ύ

How an Intrusion Detection System Can Ensure End-User Security

15 May 2024 at 04:00

It’s never been more important for businesses to invest in the best security measures available to them. Hackers and cybercriminals are constantly attempting to attack organizations and access their data. What’s more, cyber attacks are becoming increasingly sophisticated and new threats are constantly emerging.Β  So, it’s vital that businesses stay up-to-date with security measures to […]

The post How an Intrusion Detection System Can Ensure End-User Security appeared first on TuxCare.

The post How an Intrusion Detection System Can Ensure End-User Security appeared first on Security Boulevard.

Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

14 May 2024 at 20:22

Β 

There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers.Β  Training plays an important part.Β  That is why I am partnering withΒ Infosec4TC, an online training provider that offers free courses in addition to affordable classes, to offer huge discounts on cybersecurity training (links below have embedded discount codes).Β 

I have negotiated with the great team at Infosec4TC to reduce the price on select courses by up to 65% off!Β  Many courses include working on real cybersecurity projects, realistic assignments, and prep-work for certifications.Β  They have an impressiveΒ TrustPilot scoreΒ and a 14 Day Money Back Guarantee full refund policy!

Check out these featured classes:

9e619400e5fefc5af21d373fc8f7f4aaf3de2de8dda7669c9bc3c78e68b83611.png

Cyber Security Specialist Live Workshop – a total of 64 hours of instruction that cover the breadth of issues for operational specialists.Β  Check out the course curriculum for details.

af65f812960ac262dec0df0d7a8c92ff0b11ce9516563e622d0c8b5491c71aeb.png

SOC Analyst (Blue Team) Live Workshop – a live, hands-on course designed for front-line tier-1 Security Operations Center analysts.Β  It teaches tools, analysis, event management, threat hunting, and incident response principles.

Β 

240c35758c4e1ef32a9bdafbd311845d9009c63f0537930c6ecb4ee83522bf41.png

ISO/IEC 27001:2022 Lead Implementer Live Workshop – an interactive session that covers the standards, methods, and best practices for Information Security Management Systems (ISO 27001) for managers and supervisors.

Β 

Also available is theΒ Gold Membership AccessΒ membership that grants access to over 175 training courses, labs, materials, practice exams, and exam simulators.Β  Check out the details.

Β 

Be sure to look at theΒ free classesΒ as well!

f7bb41d442426f32d13126050012bd95795e1bcbe58abb0a66771b3baae5636c.png

Drop me a note if you take one of these courses.Β  Let me know your thoughts and if I should continue to work with them to offer big discounts!

The post Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses! appeared first on Security Boulevard.

Why the world needs more builders β€” and less "us vs. them" | Daniel Lubetzky

We're programmed to think every issue is binary: "us vs. them." But Daniel Lubetzky, the founder of KIND Snacks, says the real enemy isn't a person but a mindset. He introduces a new initiative that aims to bring together "builders" from around the world to replace extremism with practical problem-solving β€” and shows how you can join the movement.

πŸ’Ύ

Hackers Exploit Unpatched Bug in Helsinki Education Division Data Breach

Helsinki Education Division Data Breach, Data Breach, Helsinki Education Division

Hackers exploited an unpatched remote access server vulnerability in the Helsinki education division data breach to scour through records of 80,000 students, their guardians, and all of administrative personnel. The City of Helsinki detected the data breach on April 30, promptly initiating an investigation that found the hacker had gained access to student and personnel usernames and email addresses. Hannu Heikkinen, the chief digital officer of the City of Helsinki, in a Monday press conference said, β€œFurther investigation has shown that the perpetrator has gained access to the usernames and email addresses of all city personnel, as well as the personal IDs and addresses of students, guardians and personnel from the Education Division.”
β€œAdditionally, the perpetrator has also gained access to content on network drives belonging to the Education Division,” Heikkinen said.
β€œThis is a very serious data breach, with possible, unfortunate consequences for our customers and personnel,” said City Manager Jukka-Pekka Ujula. β€œWe regret this situation deeply.”

Helsinki Education Division Data Breach Linked to Remote Access Bug

The preliminary investigation found out that the Helsinki Education Division data breach was possible due to a vulnerability in a remote access server.
β€œThe server had a vulnerability which the culprit was able to exploit to connect to the Education Division network.”
The city authorities did not reveal the name of the remote access server but said a hotfix patch was available at the time of exploitation, but why it was not installed on the server is currently unknown.
β€œOur security update and device maintenance controls and procedures have been insufficient,” said Heikkinen.
The breach targeted an extensive group, with most of the network drive data – comprising of tens of millions of files - containing non-identifying information or ordinary personal data, minimizing potential abuse, according to the city authorities. However, some files include confidential or sensitive personal data such as fees for early childhood education customers, children's status information like information requests by student welfare or information about the need of special support and medical certificates regarding the suspension of studies for upper secondary students, and sick leave records of Education Division personnel. The data breach also includes historical customer and personnel data. Meaning, even if an individual is not currently a customer or a member of staff at the Education Division, the hacker may still have accessed their data.
β€œConsidering the number of users in the city’s services now and in previous years, in the worst case, this data breach affects over 80,000 students and their guardians,” Ujula said.
Satu JΓ€rvenkallas, executive director of the Education Division, said the authorities are currently unable to provide an accurate assessment of what data the hacker may have accessed as β€œthe volume of data under investigation is significant.”

VPN Gateways, Network Edge Devices Need β€˜Special Attention’

The City officials immediately notified the Data Protection Ombudsman, the Finnish Police, and Traficom’s National Cyber Security Centre after the discovery of the data breach at the Helsinki’s Education Division. Traficom’s cybersecurity center acknowledged the notification and said it was supporting the City of Helsinki in investigating the case. β€œThe data breach that targeted the City of Helsinki is exceptionally large for its size in the municipal sector. The case affects many Finns and causes great concern,” it said on platform X (formerly known as Twitter). Critical vulnerabilities in network edge devices like this pose a risk to organizations' cybersecurity, said Traficom’s NCSC. Exploiting the vulnerabilities of VPN products intended for establishing secure remote connections, it is also possible for parties outside the organization to gain access to the internal networks, β€œespecially if other measures to limit the attack are not in use,” it added.
β€œSevere and easy-to-exploit vulnerabilities have been detected in the network edge devices of many major device manufacturers, such as VPN gateways, in the past six months,” said Samuli BergstrΓΆm, the director of the cybersecurity center. β€œThat is why it is important that special attention is paid to resources and expertise in organizations.”
A very recent example of one such VPN appliance abuse is the zero-day exploitation in Ivanti VPN products, Ivanti Connect Secure (formerly Pulse Secure) and Ivanti Policy Secure gateways. Chinese state-backed hackers used two zero-day vulnerabilities in these products: an authentication bypass (CVE-2023-46805) and a command injection (CVE-2024-21887) bug to compromise several organizations including MITRE. β€œReaction to the data breach has been quick and all the necessary resources are being and will be used on protective measures. This is the highest priority for the city’s senior management,” Ujula said. β€œAfter the breach, we have taken measures to ensure that a similar breach is no longer possible,” Heikkinen added.
β€œWe have not discovered evidence that the perpetrator would have accessed the networks or data of other divisions. However, we are monitoring all City of Helsinki networks closely.”
Information for affected individuals is available via the Traficom’s Cybersecurity Centre website, data breach customer service, crisis emergency services and MIELI Mental Health Finland. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it.Β The Cyber ExpressΒ assumes no liability for the accuracy or consequences of using this information.

Helsinki suffers data breach after hackers exploit unpatched flaw – Source: www.bleepingcomputer.com

helsinki-suffers-data-breach-after-hackers-exploit-unpatched-flaw-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Bill Toulas The City of Helsinki is investigating a data breach in its education division, which it discovered in late April 2024, impacting tens of thousands of students, guardians, and personnel. ThoughΒ information about the attack was circulatedΒ on May 2, 2024, the city’s authorities shared more details in a press conference earlier […]

La entrada Helsinki suffers data breach after hackers exploit unpatched flaw – Source: www.bleepingcomputer.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

An activist investor on challenging the status quo | Bill Ackman

Bill Ackman has made billions of dollars β€” and a name for himself β€” as an activist investor, buying up stock to push for change at companies. In this wide-ranging conversation with author and business ethics professor Alison Taylor, Ackman discusses how he's bringing his activism into the social and political spheres β€” and shares his thoughts on free speech, his notoriously long posts on X, the conversation around Harvard and DEI and more.

πŸ’Ύ

CBSE Results 2024 Under Threat: Database Vulnerability Could Compromise Student Scores

CBSE results 2024

As the Central Board of Secondary Education (CBSE) in India released the CBSE results 2024 for its class 10th and 12th examinations, a significant cybersecurity flaw was discovered on the official website. This vulnerability, identified by The Cyber Express, could potentially allow unauthorized individuals to view and alter students' examination results. The exams for Class 12 were held from February 15 to April 2, and for Class 10 from February 15 to March 13, conducted using traditional pen-and-paper methods where a total of 3,860,051 students appeared. Of these, 1,621,224 students participated in the Class 12 exams, while a significantly larger group of 2,238,827 students took the Class 10 exams. On Monday, students could access their results online by entering details such as their date of birth, roll code, and roll number. But the security loophole, discovered early this morning, could potentially lead to a massive CBSE data leak, affecting millions of students across India.Β Β The vulnerability was first noticed early this morning when the results were supposed to be securely accessible to students and their families. The flaw on the CBSE website revolves around the exposure of administrative credentials and a technical misconfiguration in the SQL database system, specifically within a stored procedure called 'Getcbse10_All_2024'. To the average person, this might merely seem like a glitch, but it's a significant security flaw that provides an opportunity for malicious actors to manipulate and misuse crucial information, including outcomes. The ramifications are profound, as this vulnerability endangers the personal and academic data of countless students, potentially impacting their future opportunities.

CBSE Results 2024: Student Data Risk Explained

[caption id="attachment_68160" align="alignnone" width="2648"]CBSE Results 2024 The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks.[/caption] The code message displayed on the website originates from a database query related to retrieving data concerning CBSE (Central Board of Secondary Education) Class 10 results for the year 2024. 'Getcbse10_All_2024' refers to a stored procedure in the database. A stored procedure is a prepared SQL code that you can save and reuse. In this case, it's likely a procedure intended to retrieve all data related to the CBSE Class 10 results for the year 2024. The procedure 'Getcbse10_All_2024' is expecting a parameter named '@admid', but it was not provided in the call to the procedure. The '@admid' likely stands for "Administrator ID" or a similar identifier that should be passed to the procedure to execute properly. The absence of this parameter means the procedure cannot run as intended, leading to an error. The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks. provider=MSOLEDBSQL: This specifies the provider used for SQL Server. MSOLEDBSQL is a Microsoft OLE DB provider for SQL Server. server=10.***.10.***: This is the IP address of the server where the database is hosted. Knowing the server address can allow unauthorized users to attempt connections to the database. Database=****results**: This is the name of the database. Knowing the database name helps in directing queries and commands to the correct database. uid=cbseresults24; pwd=****************** : These are the credentials (username 'uid' and password 'pwd') used to authenticate to the database. With these credentials, an unauthorized user could potentially gain full access to the database, allowing them to view, modify, or delete data. Although the exposed data presents a significant risk, a researcher from the AI-powered threat intelligence platform, Cyble, noted that the threat potential is somewhat mitigated by incomplete information disclosure. β€œThe IP address is internal and not public, which means that for a threat actor to extract information or gain access, they would need to engage in offensive actions like SQL injections or other methods. However, this does not diminish the seriousness of the exposed ID and password, which could still be exploited if the correct server address is discovered,” the researcher explained. The error message not only indicates a technical issue in the database query execution but also highlights a potential vulnerability. If exploited by an individual skilled in database management and privilege escalation, this vulnerability could allow unauthorized access to the database. Such unauthorized access could lead to various security risks, including data manipulation, deletion, or use for malicious purposes such as phishing or blackmail. Immediate steps should be taken to secure the database, which include changing the database credentials, reviewing logs to check for unauthorized access, and implementing better security practices like not exposing sensitive information in error messages or logs.

Why CBSE Matters

The Central Board of Secondary Education (CBSE) is a prominent national education board in India, overseeing both public and private schools. It is under the direct purview of the Ministry of Education, Government of India. The CBSE administers comprehensive examinations for students completing their 10th and 12th grades, which are crucial for advancing to higher education and professional pathways. The board is recognized for its rigorous curriculum and is influential in setting educational standards across the country. The Cyber Express has contacted officials at the Central Board of Secondary Education (CBSE) to notify them of a detected vulnerability. We inquired if they are aware of the issue, the causes of this glitch, and the steps they intend to take to address it. We are currently awaiting a response from the organization.

Technical Aspect of the CBSE Data Exposure: Potential Risks

The exposure of the admin database ID and password in the CBSE data leak opens up several potential risks. While none of these events have occurred, the exposure of such critical credentials could lead to severe consequences if not addressed promptly. 1. Unauthorized Access and Control: With the admin credentials exposed, there is a potential for unauthorized users to gain full access to the CBSE's SQL database. This would allow them to view, copy, and manipulate sensitive data, including examination results and student personal information. 2. Risk of Data Manipulation: The ability to alter data is a significant risk. Although no data has been reported as altered, the possibility exists. Unauthorized changes could include tampering with examination results or modifying student records, which could severely undermine the integrity of the CBSE's educational assessments. 3. Threat of Data Theft: The exposed credentials could potentially be used to access and extract sensitive information. This data, which could include personal details of students and staff, is at risk of being used for malicious purposes such as identity theft or fraud. 4. Potential for Operational Disruption: While no disruptions have occurred, the exposed credentials could be used to damage data integrity or lock out legitimate users, potentially causing significant disruptions to CBSE's operations and affecting educational activities. 5. Foundation for Further Attacks: The leak itself could facilitate further attacks. With administrative access, attackers could deploy additional malicious software, establish backdoors for continued access, or leverage the compromised database to launch attacks on connected systems. The situation remains fluid, and updates are expected as more information becomes available. Stay subscribed to The Cyber Express to learn more about the story as it proceeds. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive – Source: securityboulevard.com

cloud-monitor-scans-for-risky-video-files-in-google-drive/onedrive-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Alexa Sander Recently, we hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12 tech pros how important cybersecurity and safety monitoring are for Google Workspace, […]

La entrada Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive

10 May 2024 at 17:33

Recently, we hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12 tech pros how important cybersecurity and safety monitoring are for Google Workspace, Microsoft 365, and online browsing. They […]

The post Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive appeared first on ManagedMethods.

The post Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive appeared first on Security Boulevard.

Understanding Linux Cryptography: Security in the Open Source World

10 May 2024 at 04:00

Encryption plays a vital role by scrambling information, making it unreadable to anyone without the decryption key. Linux provides robust protocols like SSL/TLS to establish secure connections between clients and servers. Regularly update cryptographic software, libraries, and the Linux kernel for the latest security patches. Cryptography is the art of creating mathematical techniques to secure […]

The post Understanding Linux Cryptography: Security in the Open Source World appeared first on TuxCare.

The post Understanding Linux Cryptography: Security in the Open Source World appeared first on Security Boulevard.

1 simple question that could improve women's health | Meryam Sugulle

There's a reliable indicator of a woman's future likelihood of cardiovascular disease β€” but it rarely gets asked about, says obstetrician and researcher Meryam Sugulle. She delves into the role of the placenta in pregnancy, how it can predict health outcomes and the single question that should be worked into routine health screenings.

πŸ’Ύ

How far away is a ceasefire? An update on Gaza and the Rafah invasion | Ian Bremmer

In an exploration of conflict and diplomacy, president and founder of Eurasia Group and GZERO Media Ian Bremmer joins TED's Helen Walters to unravel the ideological underpinnings, contrasting objectives and humanitarian crises defining the current situation in Gaza. Listen for the latest on Israel’s invasion of Rafah and what happened to the proposed ceasefire deal as well as a dissection of the elusive quest for peace in a region haunted by the specter of war.

πŸ’Ύ

How aerosols brighten clouds β€” and cool the planet | Sarah J. Doherty

Here's a conundrum: the same aerosol pollutants that harm human health also help cool the climate, says atmospheric scientist Sarah J. Doherty. Is there a way to clean up the air without warming the planet? Exploring the unintended consequences of reducing air pollution, she makes the case for a better understanding of marine cloud brightening β€” or intentionally adding sea salt aerosols to clouds over the ocean, which could reflect sunlight back into space and potentially reduce global warming.

πŸ’Ύ

Network Security for Schools: Tools, Tips, And Best Practices

9 May 2024 at 07:05

Your school network is the most important piece of your entire IT infrastructure. But protecting it? That’s easier said than done. In this guide, we’ll explore the basics of network security and what your district can do to protect network resources from cyberattacks. What is network security? According to IBM, network security is a subset […]

The post Network Security for Schools: Tools, Tips, And Best Practices appeared first on ManagedMethods.

The post Network Security for Schools: Tools, Tips, And Best Practices appeared first on Security Boulevard.

Welcome to the world of audio computers | Jason Rugolo

In an exclusive preview of unreleased technology, designer and inventor Jason Rugolo unveils an entirely new kind of computer you can talk to like a friend. This "audio computer" β€” which can augment the sounds around you, translate conversations in real time, naturally respond to your voice and more β€” promises to shake up how we use our devices. It's shown publicly for the first time ever on the TED stage.

πŸ’Ύ

Why US politics is broken β€” and how to fix it | Andrew Yang

The electoral system in the United States needs a redesign, says political reformer Andrew Yang. Exposing the flaws of a system built on poor incentives, he proposes a cost-effective overhaul inspired by primary elections already working in places like Alaska and advocates for ranked-choice voting, where voters can choose candidates in order of preference regardless of party, stemming the influence of extreme ideologies.

πŸ’Ύ

The US has a teacher shortage β€” here's how to fix it | Randy Seriguchi Jr.

How much should we invest in teachers, and what should new investment actually involve? Education innovator Randy Seriguchi Jr. suggests the US should create a "G.I. Bill" for teachers, with a particular emphasis on uplifting Black male professionals. He shares a model of this idea in action through community partnerships in San Francisco, which provide aspiring teachers with graduate school tuition, subsidized housing, personalized fit assessments and more. "If we truly want to elevate this profession to inspire new, diverse talent to join us, we have to improve both the personal and professional experiences associated with teaching," says Seriguchi.

πŸ’Ύ

Is your partner "the one?" Wrong question | George Blair-West

Marrying for love is a relatively recent phenomenon for humanity, and we still don't fully understand what it means for building successful relationships, says author and psychiatrist George Blair-West. Drawing from his extensive experience working with couples, he shares four questions every couple should ask themselves before tying the knot β€” and highlights surprising findings on how the way marriage starts impacts if it ends.

πŸ’Ύ

How the US is destroying young people's future | Scott Galloway

In a scorching talk, marketing professor and podcaster Scott Galloway dissects the data showing that, by many measures, young people in the US are worse off financially than ever before. He unpacks the root causes and effects of this "great intergenerational theft," asking why we let it continue and showing how we could make it end. (Note: This talk contains mature language.)

πŸ’Ύ

hear that whistle blow

1 May 2024 at 19:26
Biden administration forgives $6.1 billion in student debt for 317,000 former Art Institute students

The decision covers people who were enrolled at any Art Institute campus from Jan. 1, 2004, to Oct. 16, 2017, a period in which Education Management Corp. (EDMC) owned the chain of schools. Today, the Education Department will begin notifying eligible borrowers, who are not required to take action. The agency said it also will refund payments that former students have made on loans that are earmarked for forgiveness. (CNBC) "The Art Institutes launched in 1970 when the Education Management Corporation purchased the Art Institute of Pittsburgh. The system continued to grow in the ensuing years, largely through additional acquisitions. In 2001, the Art Institutes owned 20 campuses; by 2012, there were 50." (Artnet) After much legal wrangling, the eight remaining schools permanently closed on September 30, 2023. Some 1,700 students were given a week's notice of the closures. "Over the last three years, my Administration has approved nearly $29 billion in debt relief for 1.6 million borrowers whose colleges took advantage of them, closed abruptly, or were covered by related court settlements, compared to just 53,500 borrowers who had ever gotten their debt cancelled through these types of actions before I took office. And in total, we have approved debt cancellation for nearly 4.6 million Americans through various actions." - Whitehouse.gov statement. 2015: EDMC to Pay $95.5 Million to Settle Claims of Illegal Recruiting, Consumer Fraud and Other Violations 2011: U.S. Files Complaint Against Education Management Corp. Alleging False Claims Act Violations 2010: A whistleblower alleged EDMC paid recruiters illegal bonuses to lure students to its schools through fraudulent means, and paid recruiters to falsify job placement data to entice students to choose EDMC colleges. Jason Sobek, the former recruiter for EDMC's South University who filed the lawsuit, also alleged that EDMC deliberately targeted students who were vulnerable and unlikely to succeed in college, including students who were mentally ill or homeless. Sobek claimed that EDMC trained and encouraged its recruiters to prey on these vulnerable students. 2007: The initial qui tam False Claims Act lawsuit against EMDC was filed by whistleblower Lynntoya Washington (formerly an assistant director of admissions at the Art Institute of Pittsburgh Online Division) β€” who later filed an amended complaint, jointly with Michael T. Mahoney (formerly director of training for director of training for Education Management's online higher education division). Last week, the DOJ announced a new whistleblower initiative, the Criminal Division's Voluntary Self-Disclosures Pilot Program for Individuals, to combat corporate crime:
Sometimes, the best evidence of corporate wrongdoing involves a company insider. Our experience shows that individuals who are involved in criminal conduct and are willing to accept responsibility and cooperate with us are critical sources of information. [...] Under this pilot program, individuals with criminal exposureβ€”not including CEOs, CFOs, high-level foreign officials, domestic officials at any level, or individuals who organized or led the criminal schemeβ€”who come forward and report misconduct that was otherwise unknown to the department will be eligible to receive a non-prosecution agreement (NPA) if they meet certain criteria. NPAs have been a part of the federal criminal system for decades, and prosecutors have long exercised discretion to offer NPAs as an essential tool to get culpable individuals in the door. Our new individual self-disclosure pilot program, which provides clear guidelines and threshold criteria, builds on the department's longstanding practice to advance our fight against complex corporate crime. At bottom, making NPAs available to individuals who come forward to report corporate crime and cooperate allows us to prosecute more culpable individuals and to hold companies to account. Under the new program, culpable individuals will receive an NPA if they (1) voluntarily, (2) truthfully, and (3) completely self-disclose original information regarding misconduct that was unknown to the department in certain high-priority enforcement areas, (4) fully cooperate and are able to provide substantial assistance against those equally or more culpable, and (5) forfeit any ill-gotten gains and compensate victims. The pilot program is designed to provide predictability and certainty by offering a pathway for culpable individuals to receive an NPA for truthful and complete self-disclosure to the department.
A few previouslies on U.S. education debt, for-profit colleges, and student-loan forgiveness.

Who lives in a pineapple under the sea?

By: Rhaomi
1 May 2024 at 18:55
You could call them "sky flowers," but that doesn't really make sense eitherβ€”after all, the faded blue behind each squiggle is water, not sky, and the squiggles themselves don't represent solid objects in any tangible, meaningful way. But they look right. The reds and greens and yellows add life and color in a way that a flat blue might not. Those odd shapes, suspended motionless with no clear reason or value, establish a tone. There are a lot of things that don't make sense on SpongeBob SquarePants. But there's a clear and coherent vision that runs through the entire show, from the design of SpongeBob's kitchen-sponge body down to the squeaky-balloon sound of his footsteps. It's a perspective, and a warm, specific, crazy little world. Of course it has sky flowers in it. What else would be up there?
Today marks 25 years since the original broadcast of "Help Wanted" -- the pilot episode of marine biologist Stephen Hillenburg's educational comic that became a delightful romp of "relentless optimism and fundamental sweetness", a hothouse flower of inventive and absurdist imagination, a cultural touchstone for multiple generations, and one of the most iconic and beloved animated franchises of the 21st century. Are you ready, kids?

Background Stephen Hillenburg, In His Own Words - "Compiled from various interviews, documentaries and other appearances, here is Stephen Hillenburg, talking about SpongeBob, his career, and more." Hillenburg's original educational comic, The Intertidal Zone, on the Internet Archive Hillenburg's death at age 57 from ALS led to an outpouring of grief and remembrance The original 1997 "story bible" SpongeBob Season 1 DVD Behind the Scenes The Oral History of SpongeBob SquarePants MeFi on the show's 10th anniversary ✏️ Animation ✏️ Spongebob Squarepants: The Art of the Gross-Up, a technique originally pioneered by Ren and Stimpy - see also: spongebobfreezeframes.tumblr.com Lovingly-curated Imgur galleries of all the matte-painting freeze-frame moments (notes):
Season 1: part one - part two - part three Season 2: part one - part two - part three - part four Season 3: part one - part two - part three - part four
(PS: Why so much focus on the first three seasons? Because Hillenburg left the show after the release of the first movie at the end of season 3, causing a noticeable decline in tone and quality.) ️ Voice Acting ️ The incredible voice cast has done plenty of table reads of key episodes (Help Wanted, Band Geeks, Shanghaied), not to mention dubbed classic cinema (previously), but most impressive are their fully-produced live-action skits: The Trusty Slab - More scenes Tom Kenny & Bill Fagerbakke Answer the Web's Most Searched Questions News you can use: How to do the SpongeBob laugh (Note that Kenny also doubled as series "host" Patchy the Pirate) ✍️ Essays + Articles ✍️ On The Postmodern Ethos Of "Spongebob Squarepants"
Like all postmodern "texts", Spongebob Squarepants doesn't deny the absurdity of existence. The show is filled with absurd and surreal moments, far too many to describe here. And as a postmodern show, Spongebob has its nihilistic moments as well. One in particular that stands out is from season three's episode "Doing Time", when Spongebob and Patrick attempt to break Mrs. Puff out of jail. After she refuses to leave, Spongebob wonders to Patrick if maybe she'd forgotten what it's like to "live in the outside world". The scene then cuts to a montage of typical postmodern malaise β€” a man (fish, rather) going to work, sitting in rush hour traffic, then gazing dejectedly out of his window as a woman asks if he's coming to bed. Depressing, hopeless, and completely nihilistic, this moment reminds viewers of their own mortality and the dangers of routine... or, if you're just a kid, you'll realize that being an adult can suck.
SpongeBob Made the World a Better, More Optimistic Place
On Monday, SpongeBob SquarePants creator Stephen Hillenburg died after a recent diagnosis with ALS. Nickelodeon confirmed the news on Twitter Tuesday afternoon. What followed was an outpouring of grief for the man behind one of the most recognizable and beloved cartoon characters of all time. [...] Through his show, Hilleburg was an evangelist of sorts for the unstoppable power of positive thinking, which he usually dramatized with absurd scenarios. Think of the time SpongeBob sculpts a perfect marble sculpture with a crack of the chisel, or when he wins a fast foodery face-off against the Flying Dutchmanβ€”the undead daddy of burger grillingβ€”with the special ingredient of love. SpongeBob tackles everything in lifeβ€”work, driving school, friendship, pain, lifeguarding, climate changeβ€”with a level of zealous breeziness usually reserved zen monks and six-year-old kids.
Memes Vox: How SpongeBob memes came to rule internet culture
It's hard to overstate just how popular SpongeBob SquarePants memes are. On Reddit, r/BikiniBottomTwitter β€” which exists mainly so that people can screencap the memes from Twitter and share them on Reddit β€” has more than 1.7 million subscribers, making it one of the site's most popular meme subreddits. (By comparison, the more general r/Spongebob subreddit only has 74,000 subscribers.) And SpongeBob memes don't just appear and then die; as Digg's editors noted in the site's 2018 SpongeBob retrospective, the biggest SpongeBob memes "are all pretty much meme superhits. There are no deep cuts here." What exactly is it about SpongeBob memes that make them so enduring and enjoyable?
SpongeBob SquarePants creator Stephen Hillenburg gave the internet language Revisit: A Chronology of SpongeBob Memes Tom Kenny and Bill Fagerbakke on Spongebob Meme Culture What's your favorite SpongeBob quote? Each Radiohead album described with SpongeBob -- just the first of a whole genre of video memes Music Songs:
Season 1: Opening Theme - Livin' In The Sunlight, Lovin' In The Moon Light - Ripped Pants - Jelly Fish Jam [CW: flashing lights] - The F.U.N. Song - Doing the Sponge - I Wanna Go Home Season 2: Loop de Loop - This Grill is Not a Home - Sweet Victory - Hey All You People - Hey Mean Mr. Bossman [Happy May Day, btw] Season 3: Striped Sweater - Electric Zoo - Underwater Sun - When Worlds Collide - You're Old - The Campfire Song Song
Plus a complete playlist of season 1's eclectic production music, including twangy ukelele, ragtime, traditional Hawaiian , whimsical Rakenhornpipe, and of course sea shanties like "What Shall We Do With the Drunken Sailor" Recaps + Retrospectives TVTropes' sprawling article on the series and recap of nearly the entire run Episode retrospectives:
Help Wanted (S1E1): Reimagined as a collaborative ReAnimation and as a black-and-white classic cartoon Pizza Delivery (S1E5): This Is What A Perfect Episode Of Spongebob Looks Like - A whole playlist of live-action remakes SB-129 (S1E14): How Spongebob Explored Existential Nihilism ("SB-129") Rock Bottom (S1E17): "Rock Bottom" reimagined as a Gothic claymation - Podcast discussion Hooky (S1E20): The Powerful Message In This Episode of Spongebob: Don't Get "Hooked" On Drugs Squirrel Jokes (S2E11): The Smartest Episode of Spongebob Squarepants (an Analysis) Shanghaied (S2E13): Live-action remake Band Geeks (S2E15): Band Geeks Is The Best Spongebob Episode - Band Geeks ReAnimated - the disappointing Super Bowl LIII cameo (and the improved LVIII version) Procrastination (S2E17): This SpongeBob Episode Will Make You Stop Procrastinating Sailor Mouth (S2E18): SpongeBob SwearPants: A Look At Moralization Of Swearing - Why "Sailor Mouth" Was So Controversial Squidville (S2E26): Spongebob's Darkest Episode Wet Painters (S3E10): Bubbles of Thought - Full storyboard recap Krusty Krab Training Video (S3E10): The Brilliance of Krusty Krab Training Video - Live-action remake Chocolate With Nuts (S3E12): Live-action (puppet!) remake Graveyard Shift (S3E24): How 'Nosferatu' turned up in SpongeBob SquarePants - Why a Painting of SpongeBob SquarePants Just Sold for $6 Million
The official YouTube playlist of 50 episode capsule summaries in 5 minutes ️ Clips ️ A grab-bag of memorable moments (via):
I DON'T NEED IT - How to blow a bubble - FIRMLY GRASP IT - 1% Evil, 99% Hot Gas - The gang's all here - We serve food here, sir - Krusty Krab Pizza - The pioneers used to ride these babies for miles - He's just standing there... MENACINGLY - Are there any other Squidwards I should know about? -Too hot... Too wet... Toulouse Lautrec - Everything is chrome in the future! - Photosynthesis -"MY LEG" - Advanced darkness - Steppin' on the beach - You used me... for LAND DEVELOPMENT - Stop starin' at me with them big ol' eyes - Have you finished those errands? - The story of the Ugly Barnacle - "No, this is Patrick" - Leif Ericsson Day - The boy cries him a sweater of tears, and you kill him - Ravioli Ravioli, give me the formuoli - Freeform jazz - That's OK, take your time - WHO ARE YOU PEOPLE - What I learned in boating school is... - Going on dry land - How does he dooo that? - DoodleBob - The inner machinations of my mind are an enigma - Is mayonnaise an instrument? - Flag twirlers - BIG... MEATY... CLAWS - That's his... eager face - Sweet Victory - Nosferatu! - - Sentence enhancers - Bold and Brash - MY NAME'S... NOT... RIIICK! - One Eternity Later... - Push it somewhere else - I'll remember you all in therapy - The Magic Conch - You like Krabby Patties, don't you, Squidward? - We've been smeckledorfed! - IMAGINATION - Wumbo - Smitty Werbenjagermanjensen - Striped Sweater - The French Narrator's time cards - Welcome to the Salty Spittoon, how tough are ya? - Weenie Hut, Jr.'s - The world's smallest violin - A clever visual metaphor used to personify the abstract concept of thought - Robots have taken over the world! - Spongebob and Patrick as parents - We're not cavemen -- we have technology! - HOOPLA! - Maximum Overdrive - It's time for the moment you've been waiting for - CHOCOLATE - Is your mother home? - Flatter the customer! - Mermaid Man and Barnacle Boy - What do you normally do when I'm gone? - That's a 4/4 string ostinato in D minor! Every sailor knows that means death! - Are you feeling it now, Mr. Krabs? -
Episodes
And lastly, the first three classic seasons online (click to expand)S1E1: Help Wanted / Reef Blower / Tea at the Treedome S1E2: Bubblestand / Ripped Pants S1E3: Jellyfishing / Plankton! S1E4: Naughty Nautical Neighbors / Boating School S1E5: Pizza Delivery / Home Sweet Pineapple S1E6: Mermaid Man and Barnacle Boy / Pickles S1E7: Hall Monitor / Jellyfish Jam S1E8: Sandys Rocket / Squeaky Boots S1E9: Nature Pants / Opposite Day S1E10: Culture Shock / F.U.N. S1E11: MuscleBob BuffPants / Squidward the Unfriendly Ghost S1E12: The Chaperone / Employee of the Month S1E13: Scaredy Pants / I Was a Teenage Gary S1E14: SB-129 / Karate Choppers S1E15: Sleepy Time / Suds S1E16: Valentines Day / The Paper S1E17: Arrgh! / Rock Bottom S1E18: Texas / Walking Small S1E19: Fools in April / Neptunes Spatula S1E20: Hooky / Mermaid Man and Barnacle Boy II S2E1: Your Shoes Untied / Squids Day Off S2E2: Something Smells / Bossy Boots S2E3: Big Pink Loser / Bubble Buddy S2E4: Dying for Pie / Imitation Krabs S2E5: Wormy / Patty Hype S2E6: Grandmas Kisses / Squidville S2E7: Prehibernation Week / Life of Crime S2E8: Christmas Who? S2E9: Survival of the Idiots / Dumped S2E10: No Free Rides / Im Your Biggest Fanatic S2E11: Mermaid Man and Barnacle Boy III / Squirrel Jokes S2E12: Pressure / The Smoking Peanut S2E13: Shanghaied / Gary Takes a Bath S2E14: Welcome to the Chum Bucket / Frankendoodle S2E15: The Secret Box / Band Geeks S2E16: Graveyard Shift / Krusty Love S2E17: Procrastination / Im with Stupid S2E18: Sailor Mouth / Artist Unknown S2E19: Jellyfish Hunter / The Fry Cook Games S2E20: Sandy, SpongeBob, and the Worm / Squid on Strike S3E1: The Algaes Always Greener / SpongeGuard on Duty S3E2: Club SpongeBob / My Pretty Seahorse S3E3: The Bully / Just One Bite S3E4: Nasty Patty / Idiot Box S3E5: Mermaid Man and Barnacle Boy IV / Doing Time S3E6: Snowball Effect / One Krabs Trash S3E7: As Seen on TV / Can You Spare a Dime? S3E8: No Weenies Allowed / Squilliam Returns S3E9: Krab Borg / Rock-a-Bye Bivalve S3E10: Wet Painters / Krusty Krab Training Video S3E11: Party Pooper Pants S3E12: Chocolate with Nuts / Mermaid Man and Barnacle Boy V S3E13: New Student Starfish / Clams S3E14: Ugh S3E15: The Great Snail Race / Mid-Life Crustacean S3E16: Born Again Krabs / I Had an Accident S3E17: Krabby Land / The Camping Episode S3E18: Missing Identity / Planktons Army S3E19: The Sponge Who Could Fly (The Lost Episode) S3E20: SpongeBob Meets the Strangler / Pranks a Lot
β™«β™ͺ

How to govern AI β€” even if it's hard to predict | Helen Toner

No one truly understands AI, not even experts, says Helen Toner, an AI policy researcher and former board member of OpenAI. But that doesn't mean we can't govern it. She shows how we can make smart policies to regulate this technology even as we struggle to predict where it's headed β€” and why the right actions, right now, can shape the future we want.

πŸ’Ύ

The workers rebuilding communities after natural disasters | Saket Soni

As climate change leads to more and more natural disasters, a group of workers is showing up at one site after another to rebuild and repair. Labor organizer Saket Soni tells the stories of Resilience Force β€” the group of mostly immigrant workers restoring homes after hurricanes, floods and fires β€” and describes the unexpected bonds developing between the residents whose lives have been turned upside down and the laborers helping put things back together.

πŸ’Ύ

My epic journey becoming the fastest person to paddle around Australia | Bonnie Hancock

What challenges lie ahead of a staggering 12,700-kilometer paddle around the entire continent of Australia? Crocodiles and sharks were just the beginning, says Ironwoman Bonnie Hancock. Reflecting on her remarkable feat of becoming the fastest person to paddle around Australia, she shares lessons on perseverance, resilience and finding meaning in life's toughest moments.

πŸ’Ύ

How AI is unlocking the secrets of nature and the universe | Demis Hassabis

Can AI help us answer life's biggest questions? In this visionary conversation, Google DeepMind cofounder and CEO Demis Hassabis delves into the history and incredible capabilities of AI with head of TED Chris Anderson. Hassabis explains how AI models like AlphaFold β€” which accurately predicted the shapes of all 200 million proteins known to science in under a year β€” have already accelerated scientific discovery in ways that will benefit humanity. Next up? Hassabis says AI has the potential to unlock the greatest mysteries surrounding our minds, bodies and the universe.

πŸ’Ύ

An updated action plan for solving the climate crisis β€” and a look at progress to date | Ryan Panchadsaram, Anjali Grover and David Biello

When it comes to climate, what are we doing right and where should we focus our efforts next? Systems innovator Ryan Panchadsaram and strategist Anjali Grover talk with TED science curator David Biello about the latest on the world's progress toward solving the climate crisis β€” and why there's more reason for optimism than you might think. Using strategic goal-setting tools that have transformed countless organizations, Panchadsaram and Grover explore the urgent actions needed to steer the planet toward a sustainable future and the pivotal roles of innovation, investment and policy. "The climate story isn't yet written," Grover says.

πŸ’Ύ

❌
❌