Category: Uncategorized

  • IOTW: Everything we know about the Optus data breach | Cyber Security Hub – Cyber Security Hub

    Australian telecommunication company Optus suffered a devastating data breach on September 22 that has led to the details of 11 million customers being accessed.
    The information accessed includes customers’ names, dates of birth, phone numbers, email addresses, home addresses, driver’s license and/or passport numbers and Medicare ID numbers. Payment detail and account passwords were not compromised in the breach.
    Optus confirmed that it has now contacted all customers to notify them of the cyber-attack’s impact, beginning with those who had been affected by the breach and finishing with those who had not had their data accessed.
    It is unclear how the breach happened, as Optus has only confirmed that it involved someone gaining unauthorized access to its servers. In a statement, the company said that the breach was shut down “as soon as it was discovered” but that it cannot provide any further details as the attack is currently under investigation by the Australian Federal Police.
    Someone claiming to be the hacker told Australian journalist Jeremy Kirk that they had “accessed an unauthenticated API endpoint” meaning that they did not have to log in to access the data and that it was “all open to internet for any one[sic] to use”.
    Following the breach, there was a rise in phishing attacks and fraud attempts against those who had been directly affected by the cyber-attack. This increase in phishing attacks led to Optus warning customers that no communication from them would include hyperlinks, and that if they received a communication from someone claiming to be Optus with a link in it, it was illegitimate.
    Optus also offered a 12-month subscription to credit monitoring and identity protection service Equifax Protect to reduce the risk of identity theft for those who had their data accessed in the breach.
    A person claiming to be the hacker responsible for the data breach posted a small sample of the customer data stolen to the hacking forum Breached on September 23. 
    Using the alias optusdata, the hacker demanded that Optus pay them US$1 million ransom, or they would leak the data of all 11 million customers affected by the breach. Due to the ongoing federal investigation, Optus was unable to verify the validity of the data posted.
    When Optus did not respond to the ransom demand, optusdata then posted a text file of 10,000 customer data records on September 26, allowing other malicious actors to use the data in their own phishing campaigns.
    Victims of the breach reported on September 27 that they had been contacted with demands that they pay AU$2,000 (US$1,300) or their data will be sold to other hackers.
    However, on the same day, the supposed hacker posted a new message on Breached, rescinding their demand and apologizing to Optus.
    The hacker said there were “too many eyes” so they will not be selling the data to anyone and claimed that they had deleted all the data from their personal drive, and that they had not made any copies. They offered an apology also to the 10,200 people who had their data exposed via their posts on Breached, and to Optus itself, saying “hope all goes well with this”.
    They finished by saying they “would have reported [the] exploit if [Optus] had [a] method to contact” and that while the ransom was not paid, they “dont[sic] care anymore” as it was a “mistake to scrape publish data in the first place”. 
    It has still not been confirmed by Optus or the Australian Federal Police if those behind the optusdata account are actually responsible for the hack.
    In Australian parliament on September 26, Home Affairs Minister Clare O’Neil blamed Optus for the attack, saying that the “breach is of a nature that we should not expect to see in a large telecommunications provider in this country”, and so “responsibility for the security breach rests with Optus”. Prime Minister Anthony Albanese said the breach should be “a huge wake-up call for the corporate sector”.
    Following this, the government announced that they will be introducing “very substantial” reforms including increasing the fines under the Privacy Act, which are currently capped at AUS$2.2 million, which O’Neil described on ABC’s 7.30 program as “totally inappropriate”.
    On September 29, O’Neil said in a tweet that Australia is “probably five years behind where we need to be” and that she “think[s] the Australian Government needs to lift its standards too”.
    Optus could now be facing a class action lawsuit as a result of the breach, with two legal companies announcing that they will be investigating them.
    On September 26, legal firm Slater & Gordon announced that they would be “investigating a possible class action against Optus on behalf of current and former customers who have been affected by the unauthorised access to customer data”.
    Days later, on September 28, legal firm Maurice Blackburn also announced that it would be “investigating a fresh legal claim against Optus”.
    This is the second time that Optus has faced a class action claim from Maurice Blackburn, the first in April 2020 when Optus mistakenly provided the personal information for 50,000 customers to marketing company Sensis.

    Join the global cyber security online community

    With more than 140,000 members, Cyber Security Hub is the vibrant community connecting cyber security professionals around the world.

    With more than 140,000 members, Cyber Security Hub is the vibrant community connecting cyber security professionals around the world.
    Join Now
    The cyber attack has reportedly affected NATOs response to the recent earthquakes affecting Syria an…
    Two separate lawsuits have been filed against the company for allegedly failing to protect customer…
    This marks the second social engineering attack the company has suffered in less than a year
    The lawsuit alleges that LastPass stored crucial information that allowed hackers access to victims’…
    This data breach marks the second cyber attack the company has suffered this year, both allegedly by…
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • Threat actors are using remote monitoring software to launch … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    The attacks have leveraged otherwise legitimate RMM tools like ScreenConnect — now ConnectWise Control — and AnyDesk to launch financially motivated attacks against federal workers.
    The advisory included a sample phishing email seen in September that claimed a Geek Squad subscription will be debited from the victim bank account. The email contains a phone number to get the victim to call to cancel the subscription and get a refund.
    Though attacks were seen against staff in civilian executive branch agencies, federal officials are concerned that sophisticated actors could use the same techniques against more sensitive targets. 
    “Malicious actors can leverage legitimate remote monitoring and management software to target national security systems, Department of Defense and defense industrial base personnel and data on work and home devices and accounts,” an NSA spokesperson said. 
    As part of its mission to secure these agencies and systems, NSA released this guidance “so network defenders can protect their home and work devices and accounts from bad actors,” the spokesperson said. 
    “As such, RMM has become a more prominent vector for initial access, persistence, and data exfiltration across the [state, local, tribal and territorial governments] and critical infrastructure space, particularly when those organizations are targeted by financially motivated ransomware actors,” said TJ Sayers, cyber threat intelligence manager at the Center for Internet Security.
    The advisory cites research from Silent Push, which had been investigating criminal infrastructure that was impersonating PayPal. Researchers found a wide range of impersonated brands and criminal activity poses a threat to a much larger segment of the private sector
    “Our observations indicate that this is intended for a wider victim audience and all businesses should be wary,” Ken Bagnall, founder and CEO of Silent Push, said.
    Get the free daily newsletter read by industry experts
    The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain
    Everyone wants to stay on good terms with their employer. Threat actors know this too, and they exploit this weakness accordingly. Don’t fall for it.
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain
    Everyone wants to stay on good terms with their employer. Threat actors know this too, and they exploit this weakness accordingly. Don’t fall for it.
    The free newsletter covering the top industry headlines

    source

  • Help wanted for 3.4M jobs: Cyber workforce shortage is an acute … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    Research from (ICS)2 shows an ongoing skills gap in the information security space is under greater pressure than before.
    An ongoing shortage of qualified workers in the information security space is becoming even more acute, as a new report from (ICS)2 shows the industry needs to grow by about 3.4 million workers to close the global workforce gap. 
    The global cyber workforce has reached an all-time high of 4.7 million workers this year and added a total of 464,000 workers to the profession worldwide over last year, according to the 2022 (ICS)2 Cybersecurity Workforce Study, done in collaboration with Forrester Research. The research was based on a survey of almost 12,000 people in charge of their cybersecurity programs. It was conducted in May and June. 
    Even with the considerable number of new hires, the increased rise in malicious attacks against organizations has left the industry with millions of job openings.
    About 70% of respondents said their organizations don’t have enough cybersecurity employees. More than half of respondents at organizations with workforce shortages said they are at moderate or extreme risk of a cyberattack. 
    “Organizations unquestionably need more cybersecurity professionals to join their security teams due to the significant threats and number of high-profile security breaches they are facing,” Clar Rosso, CEO of (ICS)2, said via email.
    The report shows how a years-long shortage of qualified cybersecurity workers has been made even worse by a series of troubling developments in the worldwide labor market and the information security space. 
    Almost three-quarters of respondents said they expect their cybersecurity staff to increase somewhat or significantly over the next 12 months, which is the highest rate in recent years. That figure was only 53% in 2021 and 41% in 2020.
    The report shows the best ways to address the gap include training internal talent, rotating job assignments, utilizing mentorship programs and training workers from outside the IT or security space. 
    In the U.S. the cybersecurity labor shortage has been a priority among the highest levels of government and industry. The White House in July held a summit to address the industry’s labor shortage, announcing a 120-day apprenticeship sprint
    Get the free daily newsletter read by industry experts
    The agency placed a premium on low cost, high impact security efforts, which account for more than 40% of the goals.
    Chief Product Officer Josh Prewitt said the company restored email access to more than three-quarters of its Hosted Exchange customers. But Rackspace officials pushed back on alleged connections to ProxyNotShell.
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    The agency placed a premium on low cost, high impact security efforts, which account for more than 40% of the goals.
    Chief Product Officer Josh Prewitt said the company restored email access to more than three-quarters of its Hosted Exchange customers. But Rackspace officials pushed back on alleged connections to ProxyNotShell.
    The free newsletter covering the top industry headlines

    source

  • Australia named the country 4th most at-risk of cyber crime in the world – iTWire

    Australia is the fourth country most at risk of cyber crime in the world, acording to research by proxy network provider Proxyrack.
    Proxyrack says that its research has calculated the rate per 100,000 in each country to find out where cybercrime is happening the most and Australia had 2,204 victims in its population of 26.2 million and 8 victims per 100,00 people.
    “Everyone knows the importance of staying safe online and amongst all the great things that the internet has brought us, it has also presented opportunities for hackers and scammers to make an illegitimate living.,” notes Proxyrack .
    “There are many things you can do to stay safe online, such as using a residential proxy and installing anti-virus software.

    “Despite these techniques, in the United States alone, there was a total loss of $18.7 billion, which shows just how dangerous the online world can be. “That’s why we wanted to find out the states and countries that are most at risk from cybercrime, as well as the states which have lost the most money to cybercrime,” comments Proxyrack, adding that it “also wanted to find out which types of cybercrime were the most common.” 
    Australia sits fourth in the world behind the United Kingdom, United States and Canada, with the report showing:
    1. United Kingdom—450 victims of cybercrime per 100,000
    The country most at risk of cybercrime is the United Kingdom, with 450 victims of cybercrime per 100,000 people. The UK had the second-highest number of victims out of all the countries on our list and more than three times as many victims per 100,000 people than any other country. 
    2. United States—138 victims of cybercrime per 100,000 
    The US takes second place with 138 victims of cybercrime per 100,000 people. The US had the highest number of victims on our list at 466,501, and the third-highest population. Despite being far off the UK’s number, the US is comfortably in third, with more than nine times as many as third place.
    3. Canada—15 victims of cybercrime per 100,000
    Completing our top three is Canada, with a total of 15 victims of cybercrime per 100,000 people. Canada had the third-highest number of victims on our list, with 5,788, which is far from the figures for the UK and the US. 
    To read the full Proxyrack research report click here.

    DOWNLOAD NOW!

    PROMOTE YOUR WEBINAR ON ITWIRE

    It’s all about Webinars.

    Marketing budgets are now focused on Webinars combined with Lead Generation.

    If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

    The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

    Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

    We look forward to discussing your campaign goals with you. Please click the button below.

    MORE INFO HERE!

    MORE INFO HERE!

    This wouldn’t be a self serving report from a provider of anti-malware VPN programs would it by any chance?Are they[…]
    Many years ago there was a guy called Bob Ansett who started a car rental company. He required that phone[…]
    The article lists external factors — what other people do to you. However, internal factors must be considered. That is[…]
    If you can’t get your opening paragraph right I am bloody sure I wont waste my time or $35.00.
    Once again the ACCC has proven its underlying modus operandi is flawed. It’s good at saying no but fails to[…]

    source

  • Cybercrime Meets ChatGPT: Look Out, World – IEEE Spectrum

    IEEE websites place cookies on your device to give you the best user experience. By using our websites, you agree to the placement of these cookies. To learn more, read our Privacy Policy.
    Misused chatbot could create customized malware and whole new cybersecurity threats
    The world is abuzz with what ChatGPT is capable of. Sure, it answers both mundane and philosophical questions, it writes code and debugs it and even could help screen for Alzheimer’s. But as with every new technology, the AI-powered chatbot by OpenAI is at risk of being misused.
    Researchers from Check Point Software found that ChatGPT could be used to create phishing emails. Combined with Codex, a natural language-to-code system also by OpenAI, ChatGPT could then be used to develop and inject malicious code. “Our researchers built a full malware infection chain starting from a phishing email to an Excel document that has malicious VBA [Visual Basic for Application] code. We can compile the whole malware to an executable file and run it in a machine,” says Sergey Shykevich, threat intelligence group manager at Check Point Software. He adds that ChatGPT mostly produces “much better and more convincing phishing and impersonation emails than real phishing emails we see in the wild now.”
    ChatGPT “will allow more people to be coders, but the biggest risk is that more people could become malware developers.”
    —Sergey Shykevich, Check Point Software
    Yet iteration is key when it comes to ChatGPT. “On the code side, the first output wasn’t perfect,” Shykevich says. “I would compare how I use it to Google Translate, where the output will mostly be good. But I will review that and make some corrections or adjustments. The same happens with ChatGPT where you can’t use the code exactly as is and small adjustments need to be made.”

    Lorrie Faith Cranor, director and Bosch Distinguished Professor of the CyLab Security and Privacy Institute and FORE Systems Professor of computer science and of engineering and public policy at Carnegie Mellon University, echoes this sentiment. “I haven’t tried using ChatGPT to generate code, but I’ve seen some examples from others who have. It generates code that is not all that sophisticated, but some of it is actually runnable code,” she says. “There are other AI tools out there for generating code, and they are all getting better every day. ChatGPT is probably better right now at generating text for humans, and may be particularly well suited for generating things like realistic spoofed emails.”
    The researchers have also identified hackers using ChatGPT to develop malicious tools, such as an information stealer and a dark web marketplace. “[ChatGPT] will allow more people to be coders, but the biggest risk is that more people could become malware developers,” says Shykevich.
    “I think to use these [AI] tools successfully today requires some technical knowledge, but I expect over time it will become easier to take the output from these tools and launch an attack,” Cranor says. “So while it is not clear that what the tools can do today is much more worrisome than human-developed tools that are widely distributed online, it won’t be long before these tools are developing more sophisticated attacks, with the ability to quickly generate large numbers of variants.”
    Further complications could arise from the lack of ways to detect if malicious code was created with the help of ChatGPT. “There is no good way to pinpoint that a specific software, malware, or even phishing email was written by ChatGPT because there is no signature,” Shykevich says.
    For its part, OpenAI is working on a method to “watermark” the outputs of GPT models, which can later be used to prove that they were produced by AI instead of humans. Shykevich also notes that after Check Point Software published its findings, researchers found it was no longer possible to generate phishing emails using ChatGPT.
    To protect from these AI-generated threats, Shykevich advises companies and individuals to have the appropriate cybersecurity measures in place. Current safeguards still apply, and it’s vital to continue updating and strengthening these implementations.
    “Researchers are also working on ways to use AI to discover code vulnerabilities and detect attacks,” Cranor says. “Hopefully, advances on the defensive side will be able to keep up with advances on the attacker side, but that remains to be seen.”
    While AI-backed systems like ChatGPT have immense potential to change how humans interact with technology, they also pose risks—especially when used in dangerous ways.
    “ChatGPT is a great technology and has the potential to democratize AI,” says Shykevich. “AI was kind of a buzzy feature that only computer science or algorithmic specialists understood. Now, people who aren’t tech savvy are starting to understand what AI is and trying to adopt it in their day-to-day. But the biggest question, is how would you use it—and for what purposes?”

    Rina Diane Caballar is a journalist and former software engineer based in Wellington, New Zealand.
    The AI that powers the language-learning app today could disrupt education tomorrow
    It’s lunchtime when your phone pings you with a green owl who cheerily reminds you to “Keep Duo Happy!” It’s a nudge from Duolingo, the popular language-learning app, whose algorithms know you’re most likely to do your 5 minutes of Spanish practice at this time of day. The app chooses its notification words based on what has worked for you in the past and the specifics of your recent achievements, adding a dash of attention-catching novelty. When you open the app, the lesson that’s queued up is calibrated for your skill level, and it includes a review of some words and concepts you flubbed during your last session.
    Duolingo, with its gamelike approach and cast of bright cartoon characters, presents a simple user interface to guide learners through a curriculum that leads to language proficiency, or even fluency. But behind the scenes, sophisticated artificial-intelligence (AI) systems are at work. One system in particular, called Birdbrain, is continuously improving the learner’s experience with algorithms based on decades of research in educational psychology, combined with recent advances in machine learning. But from the learner’s perspective, it simply feels as though the green owl is getting better and better at personalizing lessons.
    The three of us have been intimately involved in creating and improving Birdbrain, of which Duolingo recently launched its second version. We see our work at Duolingo as furthering the company’s overall mission to “develop the best education in the world and make it universally available.” The AI systems we continue to refine are necessary to scale the learning experience beyond the more than 50 million active learners who currently complete about 1 billion exercises per day on the platform.

    Although Duolingo is known as a language-learning app, the company’s ambitions go further. We recently launched apps covering childhood literacy and third-grade mathematics, and these expansions are just the beginning. We hope that anyone who wants help with academic learning will one day be able to turn to the friendly green owl in their pocket who hoots at them, “Ready for your daily lesson?”
    Back in 1984, educational psychologist Benjamin Bloom identified what has come to be called Bloom’s 2-sigma problem. Bloom found that average students who were individually tutored performed two standard deviations better than they would have in a classroom. That’s enough to raise a person’s test scores from the 50th percentile to the 98th.
    When Duolingo was launched in 2012 by Luis von Ahn and Severin Hacker out of a Carnegie Mellon University research project, the goal was to make an easy-to-use online language tutor that could approximate that supercharging effect. The founders weren’t trying to replace great teachers. But as immigrants themselves (from Guatemala and Switzerland, respectively), they recognized that not everyone has access to great teachers. Over the ensuing years, the growing Duolingo team continued to think about how to automate three key attributes of good tutors: They know the material well, they keep students engaged, and they track what each student currently knows, so they can present material that’s neither too easy nor too hard.
    Duolingo uses machine learning and other cutting-edge technologies to mimic these three qualities of a good tutor. First, to ensure expertise, we employ natural-language-processing tools to assist our content developers in auditing and improving our 100-odd courses in more than 40 different languages. These tools analyze the vocabulary and grammar content of lessons and help create a range of possible translations (so the app will accept learners’ responses when there are multiple correct ways to say something). Second, to keep learners engaged, we’ve gamified the experience with points and levels, used text-to-speech tech to create custom voices for each of the characters that populate the Duolingo world, and fine-tuned our notification systems. As for getting inside learners’ heads and giving them just the right lesson—that’s where Birdbrain comes in.
    Birdbrain is crucial because learner engagement and lesson difficulty are related. When students are given material that’s too difficult, they often get frustrated and quit. Material that feels easy might keep them engaged, but it doesn’t challenge them as much. Duolingo uses AI to keep its learners squarely in the zone where they remain engaged but are still learning at the edge of their abilities.

    One of us (Settles) joined the company just six months after it was founded, helped establish various research functions, and then led Duolingo’s AI and machine-learning efforts until last year. Early on, there weren’t many organizations doing large-scale online interactive learning. The closest analogue to what Duolingo was trying to do were programs that took a “mastery learning” approach, notably for math tutoring. Those programs offered up problems around a similar concept (often called a “knowledge component”) until the learner demonstrated sufficient mastery before moving on to the next unit, section, or concept. But that approach wasn’t necessarily the best fit for language, where a single exercise can involve many different concepts that interact in complex ways (such as vocabulary, tenses, and grammatical gender), and where there are different ways in which a learner can respond (such as translating a sentence, transcribing an audio snippet, and filling in missing words).
    The early machine-learning work at Duolingo tackled fairly simple problems, like how often to return to a particular vocabulary word or concept (which drew on educational research on spaced repetition). We also analyzed learners’ errors to identify pain points in the curriculum and then reorganized the order in which we presented the material.
    Duolingo then doubled down on building personalized systems. Around 2017, the company started to make a more focused investment in machine learning, and that’s when coauthors Brust and Bicknell joined the team. In 2020, we launched the first version of Birdbrain.
    Before Birdbrain, Duolingo had made some non-AI attempts to keep learners engaged at the right level, including estimating the difficulty of exercises based on heuristics such as the number of words or characters in a sentence. But the company often found that it was dealing with trade-offs between how much people were actually learning and how engaged they were. The goal with Birdbrain was to strike the right balance.
    The question we started with was this: For any learner and any given exercise, can we predict how likely the learner is to get that exercise correct? Making that prediction requires Birdbrain to estimate both the difficulty of the exercise and the current proficiency of the learner. Every time a learner completes an exercise, the system updates both estimates. And Duolingo uses the resulting predictions in its session-generator algorithm to dynamically select new exercises for the next lesson.
    This playful illustration shows Duolingou2019s owl mascot wearing a deerstalker, smoking a pipe, and holding a magnifying glass, likening it to Sherlock Holmes.Eddie Guy
    When we were building the first version of Birdbrain, we knew it needed to be simple and scalable, because we’d be applying it to hundreds of millions of exercises. It needed to be fast and require little computation. We decided to use a flavor of logistic regression inspired by item response theory from the psychometrics literature. This approach models the probability of a person giving a correct response as a function of two variables, which can be interpreted as the difficulty of the exercise and the ability of the learner. We estimate the difficulty of each exercise by summing up the difficulty of its component features like the type of exercise, its vocabulary words, and so on.

    The second ingredient in the original version of Birdbrain was the ability to perform computationally simple updates on these difficulty and ability parameters. We implement this by performing one step of stochastic gradient descent on the relevant parameters every time a learner completes an exercise. This turns out to be a generalization of the Elo rating system, which is used to rank players in chess and other games. In chess, when a player wins a game, their ability estimate goes up and their opponent’s goes down. In Duolingo, when a learner gets an exercise wrong, this system lowers the estimate of their ability and raises the estimate of the exercise’s difficulty. Just like in chess, the size of these changes depends on the pairing: If a novice chess player wins against an expert player, the expert’s Elo score will be substantially lowered, and their opponent’s score will be substantially raised. Similarly, here, if a beginner learner gets a hard exercise correct, the ability and difficulty parameters can shift dramatically, but if the model already expects the learner to be correct, neither parameter changes much.
    To test Birdbrain’s performance, we first ran it in “shadow mode,” meaning that it made predictions that were merely logged for analysis and not yet used by the Session Generator to personalize lessons. Over time, as learners completed exercises and got answers right or wrong, we saw whether Birdbrain’s predictions of their success matched reality—and if they didn’t, we made improvements.
    Dealing with around a billion exercises every day required a lot of inventive engineering.
    Once we were satisfied with Birdbrain’s performance, we started running controlled tests: We enabled Birdbrain-based personalization for a fraction of learners (the experimental group) and compared their learning outcomes with those who still used the older heuristic system (the control group). We wanted to see how Birdbrain would affect learner engagement—measured by time spent on tasks in the app—as well as learning, measured by how quickly learners advanced to more difficult material. We wondered whether we’d see trade-offs, as we had so often before when we tried to make improvements using more conventional product-development or software-engineering techniques. To our delight, Birdbrain consistently caused both engagement and learning measures to increase.
    From the beginning, we were challenged by the sheer scale of the data we needed to process. Dealing with around a billion exercises every day required a lot of inventive engineering.
    One early problem with the first version of Birdbrain was fitting the model into memory. During nightly training, we needed access to several variables per learner, including their current ability estimate. Because new learners were signing up every day, and because we didn’t want to throw out estimates for inactive learners in case they came back, the amount of memory grew every night. After a few months, this situation became unsustainable: We couldn’t fit all the variables into memory. We needed to update parameters every night without fitting everything into memory at once.
    Our solution was to change the way we stored both each day’s lesson data and the model. Originally, we stored all the parameters for a given course’s model in a single file, loaded that file into memory, and sequentially processed the day’s data to update the course parameters. Our new strategy was to break up the model: One piece represented all exercise-difficulty parameters (which didn’t grow very large), while several chunks represented the learner-ability estimates. We also chunked the day’s learning data into separate files according to which learners were involved and—critically—used the same chunking function across learners for both the course model and learner data. This allowed us to load only the course parameters relevant to a given chunk of learners while we processed the corresponding data about those learners.
    One weakness of this first version of Birdbrain was that the app waited until a learner finished a lesson before it reported to our servers which exercises the user got right and what mistakes they made. The problem with that approach is that roughly 20 percent of lessons started on Duolingo aren’t completed, perhaps because the person put down their phone or switched to another app. Each time that happened, Birdbrain lost the relevant data, which was potentially very interesting data! We were pretty sure that people weren’t quitting at random—in many cases, they likely quit once they hit material that was especially challenging or daunting for them. So when we upgraded to Birdbrain version 2, we also began streaming data throughout the lesson in chunks. This gave us critical information about which concepts or exercise types were problematic.

    Another issue with the first Birdbrain was that it updated its models only once every 24 hours (during a low point in global app usage, which was nighttime at Duolingo’s headquarters, in Pittsburgh). With Birdbrain V2, we wanted to process all the exercises in real time. The change was desirable because learning operates at both short- and long-term scales; if you study a certain concept now, you’ll likely remember it 5 minutes from now, and with any luck, you’ll also retain some of it next week. To personalize the experience, we needed to update our model for each learner very quickly. Thus, within minutes of a learner completing an exercise, Birdbrain V2 will update its “mental model” of their knowledge state.
    In addition to occurring in near real time, these updates also worked differently because Birdbrain V2 has a different architecture and represents a learner’s knowledge state differently. Previously, that property was simply represented as a scalar number, as we needed to keep the first version of Birdbrain as simple as possible. With Birdbrain V2, we had company buy-in to use more computing resources, which meant we could build a much richer model of what each learner knows. In particular, Birdbrain V2 is backed by a recurrent neural-network model (specifically, a long short-term memory, or LSTM, model), which learns to compress a learner’s history of interactions with Duolingo exercises into a set of 40 numbers—or in the lingo of mathematicians, a 40-dimensional vector. Every time a learner completes another exercise, Birdbrain will update this vector based on its prior state, the exercise that the learner has completed, and whether they got it right. It is this vector, rather than a single value, that now represents a learner’s ability, which the model uses to make predictions about how they will perform on future exercises.
    The richness of this representation allows the system to capture, for example, that a given learner is great with past-tense exercises but is struggling with the future tense. V2 can begin to discern each person’s learning trajectory, which may vary considerably from the typical trajectory, allowing for much more personalization in the lessons that Duolingo prepares for that individual.
    Once we felt assured that Birdbrain V2 was accurate and stable, we conducted controlled tests comparing its personalized learning experience with that of the original Birdbrain. We wanted to be sure we had not only a better machine-learning model but also that our software provided a better user experience. Happily, these tests showed that Birdbrain V2 consistently caused both engagement and learning measures to increase even further. In May 2022, we turned off the first version of Birdbrain and switched over entirely to the new and improved system.
    Much of what we’re doing with Birdbrain and related technologies applies outside of language learning. In principle, the core of the model is very general and can also be applied to our company’s new math and literacy apps—or to whatever Duolingo comes up with next.
    Birdbrain has given us a great start in optimizing learning and making the curriculum more adaptive and efficient. How far we can go with personalization is an open question. We’d like to create adaptive systems that respond to learners based not only on what they know but also on the teaching approaches that work best for them. What types of exercises does a learner really pay attention to? What exercises seem to make concepts click for them?
    Those are the kinds of questions that great teachers might wrestle with as they consider various struggling students in their classes. We don’t believe that you can replace a great teacher with an app, but we do hope to get better at emulating some of their qualities—and reaching more potential learners around the world through technology.

    source

  • Education Department Announces Ohio and California Teachers as … – US Department of Education

    U.S. Department of Education
    Today, the U.S. Department of Education (Department) is announcing the 2022 recipients of the Presidential Cybersecurity Education Award, kicking-off Cybersecurity Career Awareness Week. Benjamin Dougherty, of Lakota West High School in West Chester, Ohio, and Robert “Allen” Stubblefield, Jr., of Troy High School in Fullerton, California, were selected as awardees for instilling in their students the skills, knowledge, and passion for cybersecurity.

    “Today, we honor two talented and creative educators who are raising the bar for how we prepare students for rewarding careers in the fast-growing field of cybersecurity,” said U.S. Secretary of Education Miguel Cardona. “Educators and instructors nationwide can look to Mr. Dougherty and Mr. Stubblefield as glowing examples of what it takes to inspire passion for cybersecurity in our students and equip them with the academic and technical skills sought out by today’s employers. The Department of Education recognizes that cybersecurity educators are essential to our efforts to build stronger pathways for students into well-paying jobs in a field that’s increasingly vital to our nation’s security and prosperity."
    The Presidential Cybersecurity Education Award, now in its third year, is presented annually to two teachers selected for their superior accomplishments as educators, academic achievement indicators, and leadership contributing to the field of cybersecurity. The program also helps to create awareness for cybersecurity occupations, for which there are currently more than 700,000 job openings in the U.S.Employment for information security analysts — just one type of cybersecurity job – is projected to grow much faster than other occupations through 2031.
    “These educators play a crucial role in preparing our nation’s students for cybersecurity careers, helping ensure that these students are empowered with the education and skills to navigate career pathways into the cybersecurity field,” said National Cyber Director Chris Inglis. “Their expertise and dedication are an inspiration to educators and cyber professionals everywhere as we seek to expand high-quality cybersecurity education, prepare students for good-paying job opportunities, and ensure that our nation’s cyber workforce has the best and brightest – from all backgrounds – contributing to our collective defense.”
    Dougherty is the inaugural instructor of the Lakota Cyber Academy, where he has connected a highly technical, student-centered curriculum to strong recruitment and retention metrics. His program has grown to 200 students since launching in 2019, and these students have achieved impressive results in national competitions including National Cyber League and CyberStart America. Students in his program are currently employed in work-based learning positions in the banking and aviation sectors, among other industries.
    Stubblefield is a Cyber Defense educator at Troy High School who served in the U.S. Navy for 21 years before beginning his teaching career. Over the past 12 years, he has coached 486 middle school students in CyberPatriot competitions and 327 elementary students through summer camps. Stubblefield has offered financial and other support to make his program accessible to students from disadvantaged and underrepresented backgrounds. His work with elementary and middle school programs has created a robust watershed of students prepared to enter the high school academic pathway in cybersecurity that he also developed.
    Dougherty and Stubblefield were formally announced as the 2022 PCE awardees earlier today at the National Initiative for Cybersecurity’s kick-off event for Cybersecurity Career Awareness Week in Washington, DC. They, along with other recent award recipients, will be honored during the 2022 NICE K12 Cybersecurity Education Conference. The Presidential Cybersecurity Education Award is led by the U.S. Department of Education,in consultation with the White House Office of the National Cyber Director and the National Science Foundation.
    Our mission is to promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access.

    source

  • Only half of companies have the budgets necessary to mitigate … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    A growing number of major businesses in the U.S. and abroad are cutting budgets in the uncertain economic environment. A number of high-profile companies, including Amazon, Microsoft, Alphabet and others have announced thousands of job cuts in recent weeks. The layoffs come after the Federal Reserve repeatedly hiked rates to cool off rising inflation. 
    The Neustar report, based on the responses of 304 senior-level professionals across the U.S., Europe, the Middle East and Africa found that 4 in 5 executives believe the C-suite and board of directors at their organizations understand the existing threat levels. But more than two-thirds of respondents agreed that constraints on their budgets would limit their ability to respond to these threats. 
    The majority of respondents, 60%, said the most current risk is the rising sophistication of attacks, but more than half are also wary of the rising number of attacks. 
    Part of the long-term risk facing companies is in many cases they have converted to long term hybrid work, where employees only come into the office a few days a week and work from home the remainder of the week. The more geographically widespread deployment of workers has made it more challenging to secure the workplace from outside threats. 
    Morales said companies are increasingly turning to managed service providers in order to provide cloud-based security. 
    The study, which was conducted during fall 2022, reflects some issues raised by cybersecurity providers about customer spending decisions. In November, Palo Alto Networks reported a number of customers were giving potential security deals more scrutiny.
    Companies have also started to consolidate the number of security vendors they work with, in part to reduce complexity, but saving costs has also been a factor. 
    Get the free daily newsletter read by industry experts
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 
    The free newsletter covering the top industry headlines

    source

  • Legal Notes: Cyber-crime prevention starts with understanding laws … – Daily Commercial News

    Click here to see Canada’s most comprehensive listing of projects in conceptual and planning stages
    Click here to see Canada’s most comprehensive listing of projects in conceptual and planning stages
    In early January, the Liquor Control Board of Ontario (LCBO) made a public announcement that a cybersecurity incident on the checkout page of its online sales website may have revealed customers’ names, email and mailing addresses, Aeroplan numbers, LCBO account passwords, and credit card information.
    A new year’s message that hits so close to home might shake Canadian business owners and their employees from their complacency. 
    A survey of 1,000 Canadian employers conducted by consultancy Terranova Security, in collaboration with research company Ipsos, revealed a surprisingly low level of concern about data theft at work.  
    “Only 40 per cent of employees say they work in a company where cyber security awareness training is mandatory. Forty-four per cent haven’t participated in any cyber security training, and a third indicated that their company doesn’t offer any relevant training at all.”
    Perhaps these companies are not fully aware of the legal and business risks they run by being so casual.
    As Mitch Koczerginski, Lyndsay Wasser and Carol Lyons of McMillen LLP write, data protection and cybersecurity in Canada are governed by a complex legal and regulatory framework.
    “Failure to understand this framework and take active steps to reduce risks (or the impact of such risks when they materialize) can have serious legal and financial consequences for an organization.”
    Under Schedule 1 of the federal legislation called the Personal Information Protection and Electronic Documents Act (PIPEDA), public and private organisations are required to safeguard personal information under their control.
    This includes the designation of an individual or individuals accountable for the collection of personal information. They must administer appropriate safeguards to protect against loss or theft, unauthorized access, disclosure, copying use or modification. The more sensitive the information, the higher level of security is required.
    That means more than just locked filing cabinets. With more employee and client information now on computers or stored in the cloud, Koczerginski, Wasser and Lyons suggest organizational actions like security clearances, limiting access to a “need-to-know” basis, and measures that include passwords and encryption.
    Aside from reputational damage and potential fines, Canadian companies and entities have been subject to a number of sometimes lengthy and costly class actions related to unauthorized access to, or disclosure of, personal information by employees.
    Outside attacks are also an increasing risk and can be quite sophisticated. The cyber attacker could pose as a trusted vendor, client or employee requesting payment of an outstanding invoice via wire transfer. False texts from what appears to be a managerial superior can open the door to fraud and data theft.
    Dependence solely on commercial property insurance is clearly a mistake.
    Alexandra Selfridge, partner with legal practice Procopio based in California, writes cybercrime losses are unlikely to be covered under conventional commercial property policies. More frequently, the necessary coverage is available through specific cyber underwritings.
    Even so, although specific cyber insurance costs have reportedly stabilized in recent months, they are still increasing by over 50 per cent year-over-year and can carry restrictive clauses.
    “Not all policies are equal,” says Selfridge.
    “Cybersecurity is an area that requires a multi-disciplinary approach with input from a variety of experts,” write the McMillan authors.
    “Organizations should conduct an audit of their existing cybersecurity status, including: an evaluation of, who and what is connected to their systems and networks; what is running on their systems and networks; and whether they have technology in place to prevent most breaches, rapidly detect breaches that do occur, and minimize the damage of such breaches.” To find answers, engaging a cybercrime investigator would be a good decision.
    “The cybercrime investigator is at the forefront of the fight against financial crimes, undertaking an array of intelligence collection and investigative tasks,” writes Paul Wright, senior adviser of forensic technology and investigations at Accuracy. “This involves using multiple analytical platforms, investigative tools, open-source intelligence, and other tools, which are constantly evolving. Empowering the investigator with the right tools to automate, collate and grade intelligence will significantly aid the quality and efficiency of investigations.”
    John Bleasby is a Coldwater, Ont.-based freelance writer. Send comments and Legal Notes column ideas to editor@dailycommercialnews.com.
    Your comment will appear after review by the site.
    Melanie Joly, minister of foreign affairs, recently visited the College of Carpe…
    John Tory’s final budget as Toronto mayor includes boosts to several housing pro…
    Digital twinning is being increasingly used in the automotive, health care, syst…
    MONTREAL — A former SNC-Lavalin vice-president found guilty of bribing foreign o…
    After years of designing and planning, Hydro One’s Celtic Tiger Tunnel Boring Ma…
    The accompanying table records the 10 largest construction project starts in Can…
    The Progressive Contractors Association of Canada (PCA) is concerned the project…
    The short-term might not look pretty. The mid-term is pretty good. The long-term…
    Digital twinning is being increasingly used in the automotive, health care, syst…
    Arbitration has become an increasingly popular method to resolve commercial disp…
    TORONTO — Ontario’s Home Construction Regulatory Authority (HCRA) has announced…
    CINCINNATI, OHIO — Ontario’s Priestly Demolition (PDI) has announced the majorit…
    OTTAWA — Prime Minister Justin Trudeau says he’s pushing Canada’s immigration sy…
    TORONTO The Ontario government has announced a new Hydrogen Innovation Fund that…
      Concrete industry stakeholders leading the drive for certification Bri…
    OHSWEKEN, ONT. — Ontario and the federal government are investing in a project t…
    © 2023 ConstructConnect Canada, Inc. All rights reserved. The following rules apply to the user of this site: Master Subscription Agreement, Terms and Conditions of Acceptable Use, Copyright Notice, Accessibility and Privacy Statement

    source