21st Century Learning and Teaching
586.7K views | +9 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD-Security', 'cybercrime'. Clear
Scooped by Gust MEES
Scoop.it!

Most BYOD businesses exposing data to cyber criminals

Most BYOD businesses exposing data to cyber criminals | 21st Century Learning and Teaching | Scoop.it
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber criminals by failing to implement effective BYOD strategies.
Gust MEES's insight:

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


Gust MEES's curator insight, July 18, 2013 4:34 AM

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Mobile crimeware and the global criminal marketplace-BYOD

Mobile crimeware and the global criminal marketplace-BYOD | 21st Century Learning and Teaching | Scoop.it
The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisti...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

Scooped by Gust MEES
Scoop.it!

Mobile Threat Report: Q1-2013 [pdf]

Gust MEES's insight:

 

A MUST read!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job