21st Century Learning and Teaching
586.3K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cloud-Security', 'Learning basics of Cybersecurity'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index | 21st Century Learning and Teaching | Scoop.it
Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Infographic: Security and the Cloud 2012

Infographic: Security and the Cloud 2012 | 21st Century Learning and Teaching | Scoop.it
CloudPassage provides this infographic reflecting the answers of IT pros to its survey about cloud uses and security issues.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, May 1, 2013 11:52 AM

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

Scooped by Gust MEES
Scoop.it!

Google Docs hijacked by Trojan.APT.Seinup malware

Google Docs hijacked by Trojan.APT.Seinup malware | 21st Century Learning and Teaching | Scoop.it
FireEye spots crooks using old tricks to avoid detection

 

A cyber attack that uses Google Docs to avoid detection in order to steal information has been spotted in the wild.

 

Security firm FireEye reported uncovering the campaign, warning that the crooks are using advanced malware to mount a targeted spear phishing campaign designed to steal corporate and personal data from a variety of victims.

 

FireEye researcher Chong Rong Hwa wrote: "The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN [Association of Southeast Asian Nations]. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."

 

Gust MEES's insight:

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Gust MEES's curator insight, June 23, 2013 10:28 AM

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Jason Toy's curator insight, June 23, 2013 11:04 AM

Interesting read. Looks like FireEye's sandboxing techniques paid off in this regard.

Scooped by Gust MEES
Scoop.it!

The 9 Top Threats Facing Cloud Computing

The 9 Top Threats Facing Cloud Computing | 21st Century Learning and Teaching | Scoop.it
The Cloud Security Alliances's latest survey of cloud security threats show a rising fear of cybercriminals topping the list.

 

 

 

 

 

 

 

 

 

 

 

The Notorious Nine: Cloud Computing Top Threats in 2013

 

- Data Breaches

 

- Data Loss

 

- Account Hijacking

 

- Insecure APIs

 

- Denial of Service

 

- Malicious Insiders

 

- Abuse of Cloud Services

 

- Insufficient Due DiligenceShared

 

- Technology Issues

 

Gust MEES's insight:

 

===> The weakest link in a security chain ist still and will still be the human!!! <===

 

 

Gust MEES's curator insight, March 4, 2013 12:29 PM

===> The weakest link in a security chain ist still and will still be the human!!! <===