21st Century Learning and Teaching
586.1K views | +4 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Malware'. Clear
Scooped by Gust MEES
Scoop.it!

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

New Rombertik malware attacks hard drives, wipes MBR if detected | ICT | eSkills | CyberSecurity

New Rombertik malware attacks hard drives, wipes MBR if detected | ICT | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
The game of cat-and-mouse between malware authors and security white hats may have entered a new phase this week, thanks to an aggressive new malware system that doesn’t just attempt to obfuscate its own operation — it aggressively scans for clues that others are monitoring its actions. If it detects that it’s operating within a Virtual Machine, the malware, dubbed Rombertik, will go nuclear and attempt to overwrite the master boot record of the local hard drive.

Cisco’s threat response team has detailed the operation of Rombertik, and the malware’s obfuscation and attack vectors are unique. Once installed, it’s a fairly standard data sniffer that grabs indiscriminately from the information available on an infected PC. What sets Rombertik apart is the way it checks to see if it’s running in a VM-provided sandbox, and the actions it takes if it finds itself in such a mode.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Rombertik


Gust MEES's insight:

The game of cat-and-mouse between malware authors and security white hats may have entered a new phase this week, thanks to an aggressive new malware system that doesn’t just attempt to obfuscate its own operation — it aggressively scans for clues that others are monitoring its actions. If it detects that it’s operating within a Virtual Machine, the malware, dubbed Rombertik, will go nuclear and attempt to overwrite the master boot record of the local hard drive.


Cisco’s threat response team has detailed the operation of Rombertik, and the malware’s obfuscation and attack vectors are unique. Once installed, it’s a fairly standard data sniffer that grabs indiscriminately from the information available on an infected PC. What sets Rombertik apart is the way it checks to see if it’s running in a VM-provided sandbox, and the actions it takes if it finds itself in such a mode.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Rombertik


No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware-Fakten Deutschland- und weltweit | CyberSecurity | Digital CitizenShip | eSkills

Malware-Fakten Deutschland- und weltweit | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Das Vergleichsportal Netzsieger.de hat Infografiken mit Malware-Fakten veröffentlicht. Demnach ist jeder dritte Computer weltweit mit Malware infiziert. In Deutschland sieht es nicht viel besser aus.


Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


Gust MEES's insight:
Das Vergleichsportal Netzsieger.de hat Infografiken mit Malware-Fakten veröffentlicht. Demnach ist jeder dritte Computer weltweit mit Malware infiziert. In Deutschland sieht es nicht viel besser aus.


Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


No comment yet.
Scooped by Gust MEES
Scoop.it!

There's no way of knowing if the NSA's spyware is on your hard drive

There's no way of knowing if the NSA's spyware is on your hard drive | 21st Century Learning and Teaching | Scoop.it
Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Equation-Group


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Equation-Group


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

100k+ WordPress websites compromised by SoakSoak malware | CyberSecurity

100k+ WordPress websites compromised by SoakSoak malware | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware.

The discovery was made on Sunday, when Google blacklisted over compromised 11,000 domains. After poking around a bit, the researchers discovered that most of the affected hosts are running WordPress.



Sucuri researchers are urging site administrators to check whether their sites have been compromised with this or other malware via their free website malware and security scanner.


Gust MEES's insight:

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware.

The discovery was made on Sunday, when Google blacklisted over compromised 11,000 domains. After poking around a bit, the researchers discovered that most of the affected hosts are running WordPress.



Sucuri researchers are urging site administrators to check whether their sites have been compromised with this or other malware via their free website malware and security scanner.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

Gust MEES's insight:

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers target Apple Mac OS X with 25 malware variants

Hackers target Apple Mac OS X with 25 malware variants | 21st Century Learning and Teaching | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 2014 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

And the Gold Medal Goes to: Finland, the country with the lowest malware infection rates.

And the Gold Medal Goes to: Finland, the country with the lowest malware infection rates. | 21st Century Learning and Teaching | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.


Each week you’ll hear from Microsoft security experts who share insights and report on research and our collaborative work internally and with industry and governments around the world to build more secure software and services; to advance the IT ecosystem; and collective efforts to build a safer, more trusted Internet for everyone.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=country


Scooped by Gust MEES
Scoop.it!

Qu'est-ce qu'un Malware ? [pdf]

Gust MEES's insight:


En savoir plus :


http://gustmeesfr.wordpress.com/


No comment yet.
Scooped by Gust MEES
Scoop.it!

SANS: IT Information Security Awareness Training

SANS: IT Information Security Awareness Training | 21st Century Learning and Teaching | Scoop.it
The SANS Securing The Human Program provides IT/information security awareness training to address everything your organization needs to secure your employees, contractors, IT staff, and management.


"Wow! This is the first security awareness document that our users really like! Thank you, SANS"


That note came from the CISO of an 8,000 employee organization. OUCH! is the world's leading, free security awareness newsletter designed for the common computer user. Published every month and in multiple languages, each edition is carefully researched and developed by the SANS Securing The Human team, SANS instructor subject matter experts and team members of the community.


Each issue focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization. OUCH! is distributed under the Creative Commons BY-NC-ND 3.0 license. You are encouraged to distribute OUCH! within your organization or share with family and friends, the only limitation is you cannot modify nor sell OUCH!.



Gust MEES's insight:


Bookmark THIS GREAT resource and LEARN from it!


Learn more:


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Browser als Wächter: Google blockiert Malware-Downloads

Browser als Wächter: Google blockiert Malware-Downloads | 21st Century Learning and Teaching | Scoop.it
Google hat angekündigt, dass Chrome künftig Downloads von browserverändernder Malware automatisch blockieren soll. Wer die Funktion schon ausprobieren will, muss die aktuellste Fassung von Chrome
Gust MEES's insight:

 

Im aktuellen Canary-Build von Chrome werden automatisch bekannte Malware-Programme blockiert. Der Anwender sieht dann am unteren Fensterrand einen Hinweis, dass Google den Download verhindert hat.

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Gust MEES's insight:
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Tony Guzman's curator insight, December 9, 2015 3:32 PM

This "new" malware may present a significant challenge to IT teams in the coming months.

Scooped by Gust MEES
Scoop.it!

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills | 21st Century Learning and Teaching | Scoop.it
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Gust MEES's insight:
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Gust MEES's curator insight, April 27, 2015 8:35 AM
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Destroying your hard drive is the only way to stop this super-advanced malware

Destroying your hard drive is the only way to stop this super-advanced malware | 21st Century Learning and Teaching | Scoop.it

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Free Website Malware and Security Online Scanner | Sucuri Security | CyberSecurity

Free Website Malware and Security Online Scanner | Sucuri Security | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Web site security monitoring and malware removal


Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.


Learn more:


http://www.scoop.it/t/ict-security-tools




Gust MEES's insight:
Web site security monitoring and malware removal


Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.


Learn more:


http://www.scoop.it/t/ict-security-tools



No comment yet.
Scooped by Gust MEES
Scoop.it!

The evolution of OS X malware.

The evolution of OS X malware. | 21st Century Learning and Teaching | Scoop.it
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about security, which means there are plenty of opportunities – for those blackhatters who are willing to put in the work.


Third: professional espionage groups have really taken to exploiting OS X. Many APT attacks in the last few years acquired Mac-modules, for example CaretoIcefog, and the targeted attacks against Uyghur activists. Yes, here we’re talking pinpointed –exclusive as opposed to mass – attacks, aimed at specially chosen victims; this is why they don’t figure in the top-20. Not that they are any less dangerous; especially if your data may be interesting to intelligence agencies.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about secu


Gust MEES's curator insight, September 29, 2014 9:38 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Quran Coaching's curator insight, October 1, 2014 3:22 AM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Scooped by Gust MEES
Scoop.it!

H1 2014 Threat Report - F-Secure [Infographic]

H1 2014 Threat Report - F-Secure [Infographic] | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
Gust MEES's insight:

F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Wordpress Sites Seeing Increased Malware, Brute Force Attacks This Week

Wordpress Sites Seeing Increased Malware, Brute Force Attacks This Week | 21st Century Learning and Teaching | Scoop.it
A glut of Wordpress sites have fallen victim to both malware infections and a series of brute force attacks that have making the rounds over the past several
Gust MEES's insight:

A glut of Wordpress sites have fallen victim to both malware infections and a series of brute force attacks that have making the rounds over the past several...


Gust MEES's curator insight, July 24, 2014 9:49 AM

A glut of Wordpress sites have fallen victim to both malware infections and a series of brute force attacks that have making the rounds over the past several

Scooped by Gust MEES
Scoop.it!

Was ist Schadsoftware (Malware)? [pdf]

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Malware


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

WHAT Is Malware? [pdf]

Gust MEES's insight:


Learn more:


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Scooped by Gust MEES
Scoop.it!

What is Malware? -Part two

What is Malware? -Part two | 21st Century Learning and Teaching | Scoop.it

You turn on your computer and a message appears to tell you to update your Adobe Reader or iTunes or any software you have installed on your computer. You can’t be bothered right now, so click the option to remind you later – it’s a habit with these irritating messages, right? Then you have just opened yourself up to cybercriminals the world over.

 

Congratulations!

 

No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring. Until you take the time to click ‘Update’, you are vulnerable to attack. Your apathy is what the hackers are counting on.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

With Chrome malware on the rise, Google adds automatic blocking of malicious downloads to latest browser build

With Chrome malware on the rise, Google adds automatic blocking of malicious downloads to latest browser build | 21st Century Learning and Teaching | Scoop.it
Google today announced Chrome is getting automatic download blocking for malware the company detects. The feature has already been added to the latest build of Chrome Canary.

Chrome ...
Gust MEES's insight:

 

Chrome will soon automatically block downloads and let you know in a message at the bottom of your screen. You will be able to “Dismiss” the message, although it’s not clear if you will be able to stop the block...

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

 

 

 

Gust MEES's curator insight, October 31, 2013 9:35 AM

 

Chrome will soon automatically block downloads and let you know in a message at the bottom of your screen. You will be able to “Dismiss” the message, although it’s not clear if you will be able to stop the block...

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/