Skip to Content
Uncategorized

Hackers In the Classroom

This article from the BBC on the program developed by ISECOM (Institute for Security and Open Methodologies) called HACKER HIGHSCHOOL.Quoted from the ISECOM web site:”The principles of hacking should be taught in schools, said Pete Herzog. It is the principles…
April 10, 2005

This article from the BBC on the program developed by ISECOM (Institute for Security and Open Methodologies) called HACKER HIGHSCHOOL.

Quoted from the ISECOM web site:

“The principles of hacking should be taught in schools, said Pete Herzog. It is the principles they need to learn to avoid from being victims on the Internet.

Herzog runs Hacker Highschool, a program to teach kids and teens security awareness and critical, Internet research skills. The program contains free security and privacy awareness teaching materials and back-end support for teachers of accredited elementary, junior high, and high schools. There are 12 workbooks, all available in Spanish and English. These are lessons that challenge teens to be as resourceful as hackers, including safe Internet use, web privacy, using the Internet for research, avoiding viruses and Trojans, legalities and ethics, and more.”

Now if only someone would develop an equally useful course on DRM and copyright…

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.