21st Century Learning and Teaching
586.3K views | +9 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD-Risks', 'Learning basics of Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

Byod : un risque et une opportunité en même temps

Byod : un risque et une opportunité en même temps | 21st Century Learning and Teaching | Scoop.it
De plus en plus d’employés emmènent leurs appareils au travail et se connectent sur le réseau de l’entreprise.
Gust MEES's insight:

 

Learn more:

 

https://www.cases.lu/fr/byod-un-risque-et-une-opportunite-en-meme-temps.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | 21st Century Learning and Teaching | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD

Infographic: The High Cost of BYOD | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=BYOD

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic]

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Fast 33 Millionen Android-Geräte sind mit Malware infiziert

Fast 33 Millionen Android-Geräte sind mit Malware infiziert | 21st Century Learning and Teaching | Scoop.it
Laut einer Studie von NQ Mobile hat sich die Anzahl der Malware 2012 gegenüber 2011 verdreifacht. Im vergangenen Jahr gab es über 65.000 Schadprogramme.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD | 21st Century Learning and Teaching | Scoop.it
Mobile service provider NQ Mobile today released a study of malware covering 2012, using data gathered from the company's Security Labs.

 

NQ’s data indicates that Android is a big risk for malware, but iOS has also recently come under fire for free apps that leak more personal data than on other platforms. Overall, mobile security is likely to be a growing concern, and one that could potentially become more complicated as the pace of improvements to mobile tech increases and our usage of those devices grows higher still.

 

===> For now, common sense is probably the best defense against security threats, but a more unified Android platform would help to limit malware problems as well as significantly improve developers’ lives. <===

 

Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

U.K. data watchdog warns on BYOD risks

U.K. data watchdog warns on BYOD risks | 21st Century Learning and Teaching | Scoop.it
Bringing your own device to work may be beneficial to the worker, but what about when personal citizen data gets loaded on to such devices? British authorities are firing off the warning flares.

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Gust MEES's insight:

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.ico.gov.uk/news/latest_news/2013/~/media/documents/library/Data_Protection/Practical_application/ico_bring_your_own_device_byod_guidance.ashx

 

Mike Hodges Eirias's curator insight, May 8, 2013 3:56 AM

So you don't have to be a big business to be affected by the DPA!

Scooped by Gust MEES
Scoop.it!

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes | 21st Century Learning and Teaching | Scoop.it
Is BYOD a blessing or a curse?, asks Emma Byrne (@SciWriBy) Enthusiasts of the Bring Your Own Device (BYOD) trend are quick to point out the benefits for tomorrow’s business. Meanwhile, detractors warn of the increased costs and security headaches.
Gust MEES's insight:

A MUST read!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | 21st Century Learning and Teaching | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD And Security: The Biggest Threat Of All

A new survey has found rising interest in mobile device management platforms to address mobile security threats. Still, few IT professionals indicate a real deployment of the platforms.

 

The survey found that 34 percent of respondents considered mobile devices a serious threat to business, and 55 percent said they were thinking more about the security of corporate smartphones and tablets than they did last year.

Despite the attention given to mobile malware and attacks targeting device owners, the biggest threat to enterprises are lost and stolen devices, according to most security experts.

 

===> The survey found that 10 percent of respondents experienced data leaks following the loss or theft of mobile devices. <===

 

Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked EA Server Used to Host Apple Phishing Page

Hacked EA Server Used to Host Apple Phishing Page | 21st Century Learning and Teaching | Scoop.it
Apple phishing scams are not uncommon, but phishing pages hosted on the website of a major company are certainly worth looking at. Experts have found ...


“The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network.”

The problem with phishing pages hosted on the web servers of reputable companies is that it’s less likely that they’ll be flagged. Furthermore, some users might be tricked into thinking that the pages are legit considering that they’re on a trusted domain.

In this case, the attackers could have made up a story about a collaboration between EA and Apple and that would have truly made the phish efficient.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | 21st Century Learning and Teaching | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===


Gust MEES's insight:

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Think Tank: BYOD security: policy, control, containment, and management

Security Think Tank: BYOD security: policy, control, containment, and management | 21st Century Learning and Teaching | Scoop.it
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

EdTech "vs." IT

EdTech "vs." IT | 21st Century Learning and Teaching | Scoop.it

Unfortunately, the "EdTech vs. IT" mindset is all too prevalent in many organizations.  Operational IT looks down disdainfully on their users from an ivory tower, viewing them as "threats" to be carefully controlled and monitored. 

 

Teachers view the IT department as a bunch of out of touch control freaks who hinder rather than facilitate their work. As a former teacher, I have seen it from both sides.

This sad situation is wrong on many levels. 

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Gust MEES's insight:

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Make IT-Admin's life easier (and the relationship with...) by Learning and Teaching the basics of Cyber-Security, check below!

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

Education and Security:

 

https://gustmees.wordpress.com/2013/04/22/i-got-interviewed-feeling-honored/

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

4 Big Concerns About BYOD In Schools

4 Big Concerns About BYOD In Schools | 21st Century Learning and Teaching | Scoop.it
There are a few snags that can get in the way of implementing BYOD in schools and are worth knowing about before setting out on a BYOD path.

 

   

 

 

 

1. Security

2. Safety

3. Affordability

4. Networking and Compatibility

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic]

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic] | 21st Century Learning and Teaching | Scoop.it
There has always been at least some sort of disconnect between how things like mobile learning are taught in a classroom and how things work in the 'real world'.
Gust MEES's insight:

Real World!???

 

There is STILL some skill to add to that list ===> Cyber-Security skills!!! As students need to get knowledge who is tailored to the Real-World, this skill is very important!!! When having Cyber-Security skills, their employer doesn't have to invest in special training, which saves him big money!

 

And in times where Economy doesn't look that good worldwide, this is certainly a bonus point to find a new job!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Check it out and find other related infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | 21st Century Learning and Teaching | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.


===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===


Gust MEES's insight:

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Scooped by Gust MEES
Scoop.it!

BYOD and the Consumerization of IT

BYOD and the Consumerization of IT | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.
Gust MEES's insight:

Lots of videos from THE experts, a MUST check out!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD is increasing IT frustration and loss of control

BYOD is increasing IT frustration and loss of control | 21st Century Learning and Teaching | Scoop.it

BYOD is creating new challenges for IT. The top two sources of frustration were onboarding and then supporting the increasing number and variety of personal devices, far outranking even security concerns.

 

The survey also found that IT is increasingly losing control of mobility budgets as departments assume greater responsibility for mobile initiatives. The number of enterprises in which IT manages the mobility spend has dropped to 48 percent, down from 53 percent in 2011. Forty (40) percent of companies' mobility budgets are now managed by non-IT departments.

 

Scooped by Gust MEES
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | 21st Century Learning and Teaching | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Gust MEES's insight:

 

Check out also my #curation here:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security

 

No comment yet.