21st Century Learning and Teaching
586.1K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Naivety'. Clear
Scooped by Gust MEES
Scoop.it!

Is it dumb to trust smart technology? | #AI #IoT #IoE #ArtificialIntelligence 

Is it dumb to trust smart technology? | #AI #IoT #IoE #ArtificialIntelligence  | 21st Century Learning and Teaching | Scoop.it
Did we learn nothing from Arthur C. Clarke's 1968 sci-fi epic, 2001: A Space Odyssey?

In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the spacecraft starts seriously glitching. The astronauts get worried, HAL gets paranoid -- yada, yada, yada -- HAL kills everyone on the ship.


Windows as a Service: What's it mean?
Microsoft's decision to unveil a subscription licensing model for Windows 10 for enterprises could be a
READ NOW
The moral of the story is that when lives depend on fully automated systems, it's a good idea to keep an eye on those systems anyway. (And if that's not the moral of the story, it should have been.)

How do you use something that's fully automatic, anyway? What is the responsibility of the "user"? Can we just hand over control to the bots?

Recent events in the news suggest that when it comes to using our automatic products and features, some people are doing it wrong.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Artificial+Intelligence

 

http://www.scoop.it/t/securite-pc-et-internet?q=iot

 

Gust MEES's insight:
Did we learn nothing from Arthur C. Clarke's 1968 sci-fi epic, 2001: A Space Odyssey?

In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the spacecraft starts seriously glitching. The astronauts get worried, HAL gets paranoid -- yada, yada, yada -- HAL kills everyone on the ship.


Windows as a Service: What's it mean?
Microsoft's decision to unveil a subscription licensing model for Windows 10 for enterprises could be a
READ NOW
The moral of the story is that when lives depend on fully automated systems, it's a good idea to keep an eye on those systems anyway. (And if that's not the moral of the story, it should have been.)

How do you use something that's fully automatic, anyway? What is the responsibility of the "user"? Can we just hand over control to the bots?

Recent events in the news suggest that when it comes to using our automatic products and features, some people are doing it wrong.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Artificial+Intelligence

 

http://www.scoop.it/t/securite-pc-et-internet?q=iot

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | 21st Century Learning and Teaching | Scoop.it

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Wie die Big Four die digitale Wirtschaft dominieren | Social Media | Big Data | Critical Thinking | Digital Business

Wie die Big Four die digitale Wirtschaft dominieren | Social Media | Big Data | Critical Thinking | Digital Business | 21st Century Learning and Teaching | Scoop.it
Die Big Four: Google, Facebook, Amazon, Apple. Die digitale Wirtschaft wird weltweit von großen US-amerikanischen Companies bestimmt - auch in Deutschland.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/social-media-and-its-influence


Gust MEES's insight:

Die Big Four: Google, Facebook, Amazon, Apple. Die digitale Wirtschaft wird weltweit von großen US-amerikanischen Companies bestimmt - auch in Deutschland.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/social-media-and-its-influence



No comment yet.
Scooped by Gust MEES
Scoop.it!

WHAT WE are worth on Social Media | Twitter to Surpass Yahoo in U.S. Display Ad Revenue

WHAT WE are worth on Social Media | Twitter to Surpass Yahoo in U.S. Display Ad Revenue | 21st Century Learning and Teaching | Scoop.it

WHAT WE are worth on Social Media!


Twitter is set to take Yahoo’s place as the third-largest seller of online display advertising in the U.S., according to eMarketer.


Learn more:


http://www.scoop.it/t/social-media-and-its-influence


Gust MEES's insight:

WHAT WE are worth on Social Media!


Twitter is set to take Yahoo’s place as the third-largest seller of online display advertising in the U.S., according to eMarketer.


Learn more:


http://www.scoop.it/t/social-media-and-its-influence



No comment yet.
Scooped by Gust MEES
Scoop.it!

ALERT!!! Firefox und Chrome verraten IP-Adressen trotz VPN

ALERT!!! Firefox und Chrome verraten IP-Adressen trotz VPN | 21st Century Learning and Teaching | Scoop.it
Viele Nutzer verschleiern ihre eigentliche IP-Adresse und damit ihren Standort, indem Sie über einen VPN-Server ins Internet gehen. Die WebRTC-Implementierungen von Mozilla Firefox und Google Chrome plaudern aber die Adresse aus.


Zum Glück gibt es Abhilfe

In einer Demo zeigt Roesler, dass der öffentliche STUN-Server stun.services.mozilla.com dabei nicht nur die Adresse übermittelt, mit der man sozusagen am Ausgang des VPN-Tunnels zu sehen ist.. Er verrät auch die öffentliche Adresse, von der aus die VPN-Verbindung aufgebaut wurde. Wenn ein Webdienst solchen Code in seine Webseite einbaut, hat er ein weiteres Mittel, um trotz VPN herauszufinden, wo der Rechner des Benutzers steht.

Zum Glück gibt es Abhilfe: Für Chrome gibt es die Erweiterung WebRTC Block. In Firefox kann der Benutzer in about:config den Wert media.peerconnection.enabledeinfach auf False setzen.


Gust MEES's insight:
Viele Nutzer verschleiern ihre eigentliche IP-Adresse und damit ihren Standort, indem Sie über einen VPN-Server ins Internet gehen. Die WebRTC-Implementierungen von Mozilla Firefox und Google Chrome plaudern aber die Adresse aus.


Zum Glück gibt es Abhilfe

In einer Demo zeigt Roesler, dass der öffentliche STUN-Server stun.services.mozilla.com dabei nicht nur die Adresse übermittelt, mit der man sozusagen am Ausgang des VPN-Tunnels zu sehen ist.. Er verrät auch die öffentliche Adresse, von der aus die VPN-Verbindung aufgebaut wurde. Wenn ein Webdienst solchen Code in seine Webseite einbaut, hat er ein weiteres Mittel, um trotz VPN herauszufinden, wo der Rechner des Benutzers steht.

Zum Glück gibt es Abhilfe: Für Chrome gibt es die Erweiterung WebRTC Block. In Firefox kann der Benutzer in about:config den Wert media.peerconnection.enabledeinfach auf False setzen.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security | The Economic Impact Of Cybercrime [pdf]

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Maker Space | Soldering Safety [pdf]

Safety FIRST!!!


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=makerspace


Gust MEES's insight:

Safety FIRST!!!


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=makerspace



No comment yet.
Scooped by Gust MEES
Scoop.it!

How a hacked password can unlock a Tesla car

How a hacked password can unlock a Tesla car | 21st Century Learning and Teaching | Scoop.it
A luxury Tesla car, which (when maxed out with options and bells-and-whistles) is worth over $100,000.

You wouldn't really expect the only thing to prevent a thief from unlocking it to be a simple six character password would you?


Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

ALERT: Spam from an anti-virus company claiming to be a security patch? It's Zbot/Zeus malware...

ALERT: Spam from an anti-virus company claiming to be a security patch? It's Zbot/Zeus malware... | 21st Century Learning and Teaching | Scoop.it
A spam campaign that seems to originate from a whole raft of different security and anti-virus companies...

...is actually an effort to trick to into installing a new variant of Zbot/Zeus onto y...
Gust MEES's insight:

 

Be AWARE of the MALWARE!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

More than 800,000 accounts compromised in MacRumors Forums breach

More than 800,000 accounts compromised in MacRumors Forums breach | 21st Century Learning and Teaching | Scoop.it
About 860,000 members who post on the forums of popular Apple news website MacRumors are being asked to change their passwords after accounts were compromised in a hack.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=MacRumors+Forum

 

Scooped by Gust MEES
Scoop.it!

Instagram Users Compromise Their Own Accounts for Likes

Instagram Users Compromise Their Own Accounts for Likes | 21st Century Learning and Teaching | Scoop.it
Symantec Security Response has discovered many Instagram users have willingly shared their usernames and passwords to a bot-like app in order to increase likes and followers.   (image1_15.png)

 

Symantec Security Response has discovered many Instagram users have willingly shared their usernames and passwords to a bot-like app in order to increase likes and followers.

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Gust MEES's insight:

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Gust MEES's curator insight, November 13, 2013 11:13 AM

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

#University of Michigan's Union Ticket Office hacked ===> 33k data!!!

#University of Michigan's Union Ticket Office hacked ===> 33k data!!! | 21st Century Learning and Teaching | Scoop.it
Hackers accessed the credit card information of tens of thousands customers of the University of Michigans Union Ticket Office, the latest organization that has fallen victim to a breach affecting a thirdparty vendor.

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? 

 

The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According toa statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

Gust MEES's insight:

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According to a statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

 

 

Gust MEES's curator insight, June 17, 2013 4:50 PM

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According to a statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

 

Scooped by Gust MEES
Scoop.it!

Data breach at Washington State courts exposes info on 1 million people

Data breach at Washington State courts exposes info on 1 million people | 21st Century Learning and Teaching | Scoop.it
Attackers exploiting Adobe’s ColdFusion app server made off with 160,000 Social Security numbers, and gained access to the driver’s license numbers and names of up to 1 million people logged in the Washington State court system in a data breach...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Scooped by Gust MEES
Scoop.it!

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY | 21st Century Learning and Teaching | Scoop.it
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Password site ​LastPass warns of data breach | Naivety | eSkills | LEARNing2LEARN

Password site ​LastPass warns of data breach |  Naivety | eSkills | LEARNing2LEARN | 21st Century Learning and Teaching | Scoop.it
LastPass was successfully attacked last Friday. The company claims that your passwords should be safe. Nevertheless, they are requesting you to update your master passwords.


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

LastPass was successfully attacked last Friday. The company claims that your passwords should be safe. Nevertheless, they are requesting you to update your master passwords.


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Scooped by Gust MEES
Scoop.it!

IDIOTS

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!

Gust MEES's insight:

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!


No comment yet.
Scooped by Gust MEES
Scoop.it!

A Clever Way to Tell Which of Your Emails Are Being Tracked | Privacy

A Clever Way to Tell Which of Your Emails Are Being Tracked | Privacy | 21st Century Learning and Teaching | Scoop.it
A Chrome extension called Ugly Mail shows you who’s guilty of tracking your emails.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:

A Chrome extension called Ugly Mail shows you who’s guilty of tracking your emails.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.
Scooped by Gust MEES
Scoop.it!

Naivety - Wikipedia, the free encyclopedia

Naivety - Wikipedia, the free encyclopedia

Naïvety (or naivety, naïveté, etc.), is the state of being naïve-, having or showing a lack of experience, understanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naïve may be called a naif.

Learn more:


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Brain drain: Are we evolving stupidity?

Brain drain: Are we evolving stupidity? | 21st Century Learning and Teaching | Scoop.it

We've got smarter and smarter in the 20th century, but now there are signs that IQs have begun to fall in countries such as the UK and Australia.


Gust MEES: ONLY in these countries, I would wonder ;) waiting for more research in other countries!



Gust MEES's insight:

ONLY in these countries, I would wonder ;) waiting for more research in other countries!


No comment yet.
Scooped by Gust MEES
Scoop.it!

And the World Cup Security Centre's password is... | CyberSecurity

And the World Cup Security Centre's password is... | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Here's a behind-the-scenes photograph of the World Cup security centre in Brazil. Spot anything interesting?


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:
Here's a behind-the-scenes photograph of the World Cup security centre in Brazil. Spot anything interesting?


Learn more:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir?

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir? | 21st Century Learning and Teaching | Scoop.it

Utrecht, le 27 novembre 2013 - Selon une récente enquête de Kaspersky Lab, il existe de fortes probabilités qu’un nombre croissant d’utilisateurs Mac soient la proie de menaces d’Internet. La quantité des logiciels malveillants ciblant les Mac a augmenté de 50% au cours des douze derniers mois. Pourtant, plus d’un tiers (35%) de tous les utilisateurs Mac pensent à tort être protégés contre les menaces numériques.

Le nombre des propriétaires de Mac continue de progresser, et par conséquent l’intérêt des cybercriminels pour cette plate-forme s’amplifie lui aussi. Les virus informatiques, chevaux de Troie, astuces de phishing et autres menaces d’Internet visant cette plate-forme sont d’ores et déjà en circulation, en grands nombres qui plus est. Les utilisateurs sont ainsi tout aussi vulnérables que les utilisateurs de PC Windows.


Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, November 28, 2013 11:37 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

Gust MEES's curator insight, November 28, 2013 11:40 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

What happens after a data breach? [Infographic]

What happens after a data breach? [Infographic] | 21st Century Learning and Teaching | Scoop.it
High profile data breaches that expose customer information are in the news. This graphic shows how the thieves sell the info and make their money.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Scooped by Gust MEES
Scoop.it!

The Instagram Scam That Tricked 100,000 Users Into Giving Away Passwords

The Instagram Scam That Tricked 100,000 Users Into Giving Away Passwords | 21st Century Learning and Teaching | Scoop.it
An app called InstLike promised free likes and followers on Instagram, but asked users to provide their usernames and passwords, turning them into a botnet.

 

Moreover, a user would get 20 free Likes if he used the hashtag #instlike_com in his own photo captions. A search on Instagram reveals that more than 500,000 photos already contain that hashtag.

 

All these features made InstLike a sophisticated ecosystem that employed thousands of voluntary "zombie" accounts — but it depended on their naiveté and willingness to give up their passwords.

 

For Narang, who is experienced in the realm of social media-based scams, the sheer volume of people involved is scary.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Instagram

 

Scooped by Gust MEES
Scoop.it!

Verschlüsselung: Neue E-Mail-Dienste profitieren vom NSA-Skandal

Verschlüsselung: Neue E-Mail-Dienste profitieren vom NSA-Skandal | 21st Century Learning and Teaching | Scoop.it
Die Macher der alternativen Suchmaschinen Ixquick und Startpage wollen E-Mail-Dienste mit Verschlüsselung anbieten. Die Konkurrenz heißt Posteo oder AikQ. Von T. S. Nagel
Gust MEES's insight:

 

Die großflächige Überwachung des Internets durch Geheimdienste hat viele Netznutzer aufgeschreckt. Manch einer sucht nun nach Wegen, sich ein Stück Privatsphäre zurückzuholen – diskrete Suchmaschinen wie DuckDuckGo oderIxquick, die Nutzerdaten weder speichern noch vermarkten, verzeichnen stark gestiegene Zugriffszahlen. Die Ixquick-Macher wollen dieses Modell bald auch auf den E-Mail-Verkehr ausdehnen.

 

Eine Frage der Zeit wann die sich AUCH beugen müssen!!!

 

Learn more:

 

"The Americans justify everything with combatting terrorism," said the Luxembourg foreign minister, Jean Asselborn, who on Sunday described the latest allegations as disgusting. "The EU and its diplomats are not terrorists."

 

Documents seen by the German newspaper Spiegel suggest that not only were

 

===> bugs installed in the EU's offices in Washington <===,

 

but also that the building's computer network was infiltrated.

 

THIS is going TOO FAR!!!

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

 

 

 

Gust MEES's curator insight, July 2, 2013 4:53 PM

 

Die großflächige Überwachung des Internets durch Geheimdienste hat viele Netznutzer aufgeschreckt. Manch einer sucht nun nach Wegen, sich ein Stück Privatsphäre zurückzuholen – diskrete Suchmaschinen wie DuckDuckGo oderIxquick, die Nutzerdaten weder speichern noch vermarkten, verzeichnen stark gestiegene Zugriffszahlen. Die Ixquick-Macher wollen dieses Modell bald auch auf den E-Mail-Verkehr ausdehnen.

 

Eine Frage der Zeit wann die sich AUCH beugen müssen!!!

 

Learn more:

 

"The Americans justify everything with combatting terrorism," said the Luxembourg foreign minister, Jean Asselborn, who on Sunday described the latest allegations as disgusting. "The EU and its diplomats are not terrorists."

 

Documents seen by the German newspaper Spiegel suggest that not only were

 

===> bugs installed in the EU's offices in Washington <===,

 

but also that the building's computer network was infiltrated.

 

THIS is going TOO FAR!!!

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

 

Scooped by Gust MEES
Scoop.it!

Cloud Security Readiness Tool Results Show Overwhelming Lack of Maturity

Cloud Security Readiness Tool Results Show Overwhelming Lack of Maturity | 21st Century Learning and Teaching | Scoop.it
Since its launch in October 2012, 5,700 people have used the Microsoft Cloud Security Readiness Tool (CSRT). The tool asks 27 questions regarding the current state of an organisation’s security posture and cloud readiness.

 

 

The results have been anonymised and analysed, and the overarching conclusion is that ===> most organisations are relatively immature  

Gust MEES's insight:

 

The results have been anonymised and analysed, and the overarching conclusion is that ===> most organisations are relatively immature <=== across almost all control areas represented by the CSRT.

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

 

Gust MEES's curator insight, May 17, 2013 8:15 AM

 

The results have been anonymised and analysed, and the overarching conclusion is that ===> most organisations are relatively immature <=== across almost all control areas represented by the CSRT.

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/