Mobile apps have played significant roles in our daily living, in virtually every sector, such applications have been pretty useful.

In this article, we'll focus on how the education sector has benefited from these improved technology. With some applications haven simplified how students can accomplish their assignments without much struggle. By ordering academic term papers you can get more insights on student's welfare in matters relating to technology advancement.

From the teachers, students, and even other academic staff, all deserves a smooth experience within the learning environment. For instance, teachers find it challenging to manage a large number of students. It becomes challenging for a teacher to evaluate a student at a personal level.

However, with improved tech, students can access tablets and communicate with teachers on complex concepts personally. Still, the mobile apps have enabled teachers, students, parents, and other staff in handling different matters with ease.

7 Ways Mobile Applications have Improved the Education Sector



So, below are ways in which mobile applications have contributed to a better learning experience.



  • Real-time Tracking


As a student, you have several activities to accomplish. Without proper planning and organization, you might forget some of the essential details. For instance, there could be an upcoming exam which you must revise for. If you forget and get to the exam room minus revising, you can panic and end up getting low grades. However, with mobile apps, you can create a clear schedule and reminders of upcoming and urgent tasks to work upon them effectively.

  • Student Groups


It is now easier than before. Each student can create a profile with all their details and connect with other online platforms via mobile apps. This is an excellent idea because students can discuss different matters relating to education and get a solution. For instance, if, as a student, you didn't understand a particular concept in class, you can raise the topic and discuss it with others to find a real-time solution. The advantage here is that each person gives their opinion, and the more they discuss, the more you understand—besides, the response rate in real-time.

  • View Assignments & Grades


Mobile applications benefit the teachers and students at large in different ways. For example, teachers can easily allocate assignments to students via the mobile apps. On the other hand, students can access the projects and instructions and work on them as required. Still, students can view their progress via these apps and evaluate areas they need to put in more effort.

  • Seamless Learning


Another benefit of mobile apps for education is the smooth learning experience. Even if students aren't in the school, they can still access all the school programs via the app. For instance, the school can share the plans for lessons, assignments, the syllabus, course evaluation, among other requirements. Students can then analyze the report and plan their time well to manage all the activities in school.

  • Develop Problem-solving Skills


With education apps, students have to embrace creative thinking to solve some issues. Sometimes, the teacher isn't present, and the students must think on their own. In such a case, when the matter at hand is urgent, the students have to figure out ways to solve the issue. In the end, they become experts in solving different problems without close supervision.

  • Offline Data Storage


Mobile applications offer excellent storage space that students can access documents and files while offline. This simplifies students' work because they don't have to sync the app's data to get the required files.

  • Event Scheduling & Notifications


In a school environment, some events take place and calls for students to participate in one way or the other. It can be challenging for such essential information to reach all students within the required time frame. However, with mobile apps, the school updates the list of events and respective dates in advance so that students can plan their schedules appropriately.

7 Advantages of Mobile Apps in the Educational sector

Google has been working on the Android Open Source Project (AOSP) since last 18 months, in a bid to prevent memory safety bugs, by adding support for Rust programming language.

The company had preferred languages like Java and Kotlin as the best options for Android app development, and with the Android OS use of Java extensively, thereby protecting large portions of the Android platform from memory safety bugs.

However, Java and Kotlin languages aren't an option for the lower layers of the Android OS, with code written in C and C++ languages requiring robust isolation when parsing untrustworthy input, the technique of containing the code in a strictly constrained sandbox can be expensive, and results additional memory usage and latency issues.

What Rust Programming Language brings to the table



Rust programming language provides memory safety guarantees through a combination of compile-time checks that enforce object lifetime/ownership and runtime checks which ensures that every memory access is valid.



Given the memory safety bugs in C and C++ which constitutes about 70% of all high severity security vulnerabilities in Android, the idea to switch to a memory-safe language like Rust is to prevent such from happening in the first instance.

Albeit, Google would not have to rewrite all of its existing C and C++ code into the underlying OS, but rather to focus its memory-safe language efforts on new or recently modified code with higher likelihood of memory bugs.

Some other efforts at Memory Safety with Rust Language



Microsoft has been working on new ‘memory safe’ programming language, which internally is referred to as “Safe Infrastructure Programming” based on Rust language.

The experiment with the Rust language is in a bid to improve its software, under Project Verona initiative, as Rust programming language is better than the C/C++ languages commonly used to write micro-controller firmware.

Google turns to Rust Language to prevent Android Memory Safety bugs

Microsoft has released a preview of its own build of OpenJDK, known as Microsoft Build of OpenJDK, an open source and freely available, long-term support distribution of Java.

Microsoft Build of OpenJDK binaries of Java 11 is available for download on Windows, Linux, and MacOS, with Microsoft publishing an early access binary for Java 16, which is the latest version of standard Java, for Windows on Arm. With Builds for Java 11 based on OpenJDK source code, and follows the same build scripts employed in the Eclipse Adoptium project, formerly AdoptOpenJDK.

Azure cloud users can also try the build via Azure Cloud Shell, albeit Microsoft’s binaries have passed the Java Technology Compatibility Kit (TCK) for Java 11.

What you need to know about Microsoft Build of OpenJDK



Microsoft Build of OpenJDK is to serve as a simple drop-in replacement for other OpenJDK distribution in the Java ecosystem. And the company has pledged to support Java 11 until at least 2024.



Also, Microsoft will offer support for Java 8 binaries from Eclipse Adoptium on Azure-managed services, with Java 8 offered as a target runtime option. While OpenJDK binaries for Java 17 will be due for release by the end of the year. Microsoft is a huge contributor to OpenJDK, with more than 50 patches for OpenJDK, covering areas such as garbage collection fixes, MacOS packaging, build and infrastructure.

Microsoft Build of OpenJDK binaries may come with backported fixes and enhancements deemed important to users. Though some of the fixes may not have been formally backported upstream and signposted in OpenJDK release notes.

Open competition with Oracle in the Java distribution space



The move has been seen by analysts as a serious competition for Oracle in the Java space, as Java is one of the most popular programming languages today, used for almost everything from enterprise applications to robots.

Microsoft is increasingly experiencing growth in its customer use of Java across the company’s cloud services and development tools, haven deployed more than 500,000 JVMs internally, excluding Azure services and customer workloads. Indeed, Microsoft Build of OpenJDK would set up the company to compete with Oracle in the Java space.

Microsoft Build of OpenJDK to compete with Oracle in the Java space

Cybercriminals are increasingly targeting professionals on LinkedIn with weaponized job offers via a new spear-phishing campaign in an attempt to infect targeted victims with a backdoor trojan known as "more_eggs."

According to cybersecurity firm eSentire's Threat Response Unit (TRU), the phishing lures follows a malicious ZIP archive file that has the same name as that of the victim's job titles taken from their LinkedIn profile. And once the fake job offer is opened, the victim has unwittingly initiated the stealthy installation of the fileless backdoor.

The backdoor upon execution can download additional malicious plugins and provide hands-on access to the victim’s computer and the threat group behind more_eggs, Golden Chickens, are known to sell the backdoor under a malware-as-a-service(MaaS) arrangement to other cybercriminals.

How More_Eggs Attacks are targeted at Professionals on LinkedIn



The TRU team analysis shows that the targets were professionals working in the healthcare technology industry, which upon downloading and executing the alleged job file, the victim unwittingly executed VenomLNK, an initial stage of more_eggs.



VenomLNK enables the malware’s plugin loader, TerraLoader, which then hijacks legitimate Windows processes, cmstp and regsvr32 by abusing Windows Management Instrumentation. With TerraLoader initiated, which is a decoy word document presented to the victim, designed to impersonate a legitimate employment application; but it serves no functional purpose in the infection.

Then, TerraLoader will install msxsl in the victim’s roaming profile and loads the payload, TerraPreter, which is an ActiveX control (.ocx file) downloaded from Amazon Web Services, as TerraPreter begins to beacon to a Command & Control server (C2) via the rogue copy of msxsl.

This signals that the more_eggs backdoor is ready for the threat group’s customer to gain access and carry out their malicious activities, whether it is to infect the victim with additional malware, such as ransomware, or getting a foothold into the victim’s network so as to exfiltrate data.

Risks posed by More_Eggs Backdoor to Organizations and Professionals



The threat actors went after employees of the healthcare technology sector with fake job offers, and cleverly using the job title listed on their LinkedIn profiles, in communications to the employees. They also used malicious email attachments which if the target clicked on the attachment, they'll get their system infected with more_eggs.

While the TRU team don't know for certainty what the end game is for this campaign, but what is clear is that this current activity mirrors an eerily similar campaign which was reported in the U.S. retail, entertainment and pharmaceutical companies in February 2019, where online shopping, were targeted.

Coincidentally, the hacking group, Evilnum is also known to spearphish employees of companies they are targeting by enclosing malicious zip files, which upon execution, gets the employees hit with the more_eggs backdoor, along with other malware.

New spear-phishing campaign targeting professionals on LinkedIn

Ubuntu is a popular Linux distribution based on Debian, released in three editions, namely: Server, Desktop, and Core, with all editions capable of running on PC or a virtual machine.

While Ubuntu 21.04 is the latest version of the distro, and third version to receive a codename with the letter “H”, with the earlier version, Ubuntu 5.04 which was released in 2005 codenamed “Hoary Hedgehog”, and followed by Ubuntu 8.04 LTS “Hardy Heron” in 2008. And the codename for Ubuntu 21.04 was revealed as “Hirsute Hippo“ which is a rather humongous name.

The Beta version of Ubuntu 21.04 Hirsute Hippo arrived on April 1, 2021, and the final freeze milestone is expected on April 15, with the final stable version to be made available on April 22, 2021.

What's new in Ubuntu 21.04 Hirsute Hippo Beta?



Unlike previous Ubuntu releases that came with tons of core and visual changes, Ubuntu 21.04 Hirsute Hippo Beta is rather straightforward, with the absence of GNOME 40 as a disappointment to many users, albeit it does come with GNOME 40 apps.



Ubuntu 21.04 Hirsute Hippo Beta features Wayland as the default session, whch is a replacement for X.org’s windowing system, with such advantages as support for emerging HDR technology and significantly easier to maintain. Also, Ubuntu 21.04 comes with the ability to change the power profile mode with Pipewire support.

Additionally, it brings a new set of preloaded wallpapers and there are other flavors like Xubuntu, Lubuntu, Kubuntu, Ubuntu MATE, and Xubuntu versions.

How to Update to Ubuntu 21.04 Hirsute Hippo Beta



If you wish to update from older Ubuntu versions to Ubuntu 21.04 Hirsute Hippo Beta, check the Updates section and in the Notify me of a new Ubuntu version dropdown, select the For any new version option and close the app.

But note that Ubuntu is distributed on three types of images, with the Desktop image allowing you to try Ubuntu without changing your PC at all, and at your option to install it permanently later. However, you will need at least 1024MiB of RAM to install Ubuntu from this image.

And the second type, which is the server install image allows you to install Ubuntu permanently on a computer for use as a server, but it does not install a graphical user interface.

Therefore, the 64-bit PC (AMD64) desktop image should be prefered if you have a computer based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). And the 64-bit PC (AMD64) server install image is prefered if you have a computer based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2).

If you need help in burning these images to disk, you can refer to the Image Burning Guide.

Ubuntu 21.04 Hirsute Hippo Beta features and how to update your system

The Windows Background Intelligent Transfer Service (BITS) was introduced with Windows XP to simplify the downloading and uploading of large files; with applications using BITS to deliver updates for minimal usage disruption.

While the BITS service runs in a service host process and able to schedule transfers to happen at any time, but such files and data are stored in a local database. And like many such technologies, BITS can also be used by malicious applications to create files that are downloaded or uploaded in the context of the service host process.

According to researchers at FireEye, there is a previously unknown mechanism that shows the hackers made use of BITS to launch their backdoor.

How Hackers leverages on BITS to infiltrate Windows systems



Hackers use malicious applications to create BITS jobs and files which are downloaded or uploaded in the context of the service host process to evade firewalls that could block such malicious or unknown processes, and to obscure which application requested the transfer.



As BITS transfers can also be scheduled, it enables the attackers to schedule the attacks to occur at specific times without relying on long-running processes or the task scheduler. Also, BITS transfers are asynchronous, which results in a situation whereby the application that created a job may not be running when the requested transfer is complete.

This scenario is remedied when BITS jobs are created with a user-specified notification command, which executes after the job completes or in case of errors. Then, the notification commands associated with BITS jobs can specify the executable or command to run.

But attackers can also utilize this feature as a method for maintaining persistence of their malicious applications, since the command data is stored in a database instead of traditional registry locations, it can be overlooked by forensic investigators or tools that attempt to identify persistence executables and commands.

How to secure your Windows machine against such infiltration



This new exploit is perhaps another reminder of how even useful tools like BITS can be repurposed by hackers to their own advantage.

Therefore, the researchers have made available a Python utility known as BitsParser that aims to parse BITS database files and extract job and file information for additional analysis to aid incident response and forensic investigations.

Hackers leverages on the Windows Background Intelligent Transfer Service