Wir unterstützen Kunden durch ein Schulungsangebot zur Förderung des Sicherheitsbewusstseins und unter Beteiligung ihrer Sicherheits- und Personalabteilungen beim Aufbau einer Cybersicherheitskultur.
Learn more / En savoir plus / Mehr erfahren:
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
Current selected tags: 'Cybersecurity', 'eCitizen'. Clear
Scoop.it!
Wir unterstützen Kunden durch ein Schulungsangebot zur Förderung des Sicherheitsbewusstseins und unter Beteiligung ihrer Sicherheits- und Personalabteilungen beim Aufbau einer Cybersicherheitskultur.
Learn more / En savoir plus / Mehr erfahren:
No comment yet.
Sign up to comment
Scoop.it!
Backup A MUST With ALL The Malware AND Especially Ransomware Around! NOT sure if YOU followed OR if YOU are conscientious about WHAT is going around actually on the internet concerning "Malware" and "CyberSecurity", BUT YOU SHOULD!!! THIS is a Wake-UP Call take it serious please! That is called ALSO <===> Proactive THINKing <===> eSkills
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE
Gust MEES's insight:
Backup A MUST With ALL The Malware AND Especially Ransomware Around! NOT sure if YOU followed OR if YOU are conscientious about WHAT is going around actually on the internet concerning "Malware" and "CyberSecurity", BUT YOU SHOULD!!! THIS is a Wake-UP Call take it serious please! That is called ALSO <===> Proactive THINKing <===> eSkills
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE
Scoop.it!
Most of us have things on the web that we want to keep safe. One of the best ways to keep those things secure is to make sure that you have set strong passwords!
Learn more / En savoir plus / Mehr erfahren:
https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
Gust MEES's insight:
Most of us have things on the web that we want to keep safe. One of the best ways to keep those things secure is to make sure that you have set strong passwords!
Learn more / En savoir plus / Mehr erfahren:
https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
Fernando de la Cruz Naranjo Grisales's curator insight,
March 25, 2016 3:01 PM
Most of us have things on the web that we want to keep safe. One of the best ways to keep those things secure is to make sure that you have set strong passwords!
Learn more / En savoir plus / Mehr erfahren:
https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
Scoop.it!
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2016 - Save the date! . . . Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2016 will… [Gust MEES] I am participating since its START each year and YOU!???
Gust MEES's insight:
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2016 - Save the date! . . . Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2016 will… [Gust MEES] I am participating since its START each year and YOU!???
Scoop.it!
CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…
Gust MEES's insight:
CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…
Scoop.it!
All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer. Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION - http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION
Gust MEES's insight:
All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer. Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION - http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION
Scoop.it!
Für die fünfte Edition der Seniorenmesse Top50+ hatten sich wieder viele Senioren am 03. und 04. Oktober im Casino 2000 in Mondorf eingefunden. Reges Interesse fand die Live Hacking Demo on stage, die von Michael Hamm, Sicherheitsexperte bei CIRCL- Computer Incident Response Center Luxembourg, durchgeführt wurde. Anhand von konkreten Beispielen demonstrierte er, wie Cyberkriminelle vorgehen um Passwörter knacken.
Gust MEES's insight:
Für die fünfte Edition der Seniorenmesse Top50+ hatten sich wieder viele Senioren am 03. und 04. Oktober im Casino 2000 in Mondorf eingefunden. Reges Interesse fand die Live Hacking Demo on stage, die von Michael Hamm, Sicherheitsexperte bei CIRCL- Computer Incident Response Center Luxembourg, durchgeführt wurde. Anhand von konkreten Beispielen demonstrierte er, wie Cyberkriminelle vorgehen um Passwörter knacken.
Scoop.it!
If you want to be considered an individual and not just a data point, then it's in your interest to protect your privacy." "The information that's contained on your wearable ... is worth ten times that of a credit card on a black market."Gary Davis Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things - http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things
Gust MEES's insight:
If you want to be considered an individual and not just a data point, then it's in your interest to protect your privacy." "The information that's contained on your wearable ... is worth ten times that of a credit card on a black market."Gary Davis Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things - http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things
STELnetwork #STEL's curator insight,
October 7, 2015 8:36 PM
#mdis #stel #technology #sg50 #stelnetwork #since1956 #education #cybersecurity
Scoop.it!
We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious. It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage. Learn more: https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Gust MEES's insight:
We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious. It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage. Learn more: https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Scoop.it!
Brian KREBS @briankrebs (Twitter) A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user. I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums. Learn more: https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/ https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Gust MEES's insight:
Brian KREBS @briankrebs (Twitter) A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user. I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums. Learn more: https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/ https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Scoop.it!
Sicherheitsforscher warnen Nutzer von Android- und iOS-Apps vor der Verwendung unsicherer Passwörter. Viele der getesteten Apps verfügen über keinen Schutz vor Wörterbuch-Attacken. Viele App-Entwickler haben ihre Hausaufgaben nicht gemacht: Rund 53 der beliebtesten Android- und iOS-Apps bieten nach Angaben von Sicherheits-Forschern der Universität Cambridge keinen Schutz vor Brute-Force-Angriffen. Insgesamt seien diese Apps vermutlich 600 Millionen Mal heruntergeladen worden. Mehr erfahren / Learn more:
Gust MEES's insight:
Sicherheitsforscher warnen Nutzer von Android- und iOS-Apps vor der Verwendung unsicherer Passwörter. Viele der getesteten Apps verfügen über keinen Schutz vor Wörterbuch-Attacken. Viele App-Entwickler haben ihre Hausaufgaben nicht gemacht: Rund 53 der beliebtesten Android- und iOS-Apps bieten nach Angaben von Sicherheits-Forschern der Universität Cambridge keinen Schutz vor Brute-Force-Angriffen. Insgesamt seien diese Apps vermutlich 600 Millionen Mal heruntergeladen worden. Mehr erfahren / Learn more:
Scoop.it!
Protect yourself from rogue DNS servers. FREE online Router-Security-Checker.
Gust MEES's insight:
Protect yourself from rogue DNS servers. FREE online Router-Security-Checker.
Scoop.it!
Are you a parent wondering how to block pornography on your child's internet and mobile devices? Our free digital parenting guide explains what is involved. It is estimated that there are over 4 million pornography sites, that 25% of searches on search engines are pornography related, 30% of all internet traffic is pornography and the percentage of internet users who view pornography is estimated at 42%. (source: Internet filter review) If that last statistic of 42% seems high to you, a survey by Cosmopolitan Magazine of 4,000 men found that 30% watched porn daily and 71% of men 18-34 watch it at least once a month. In a 2014 survey by the Oxford Union in the UK, 71.8% of all students said they view porn; 91% of men vs 51% of women. In February 9, 2014 the Irish Mirror reported that Ireland’s internet porn use has increased 77%since 2010. The reality is that it is very easy for our kids to be exposed to it. However, if you want to block pornography it is becoming increasingly difficult and complicated. It is no longer as simple as installing some anti porn software on your PC or installing a porn filter on your PC because kids now access the internet predominantly on mobile devices and also via gaming consoles.
Gust MEES's insight:
Are you a parent wondering how to block pornography on your child's internet and mobile devices? Our free digital parenting guide explains what is involved. It is estimated that there are over 4 million pornography sites, that 25% of searches on search engines are pornography related, 30% of all internet traffic is pornography and the percentage of internet users who view pornography is estimated at 42%. (source: Internet filter review) If that last statistic of 42% seems high to you, a survey by Cosmopolitan Magazine of 4,000 men found that 30% watched porn daily and 71% of men 18-34 watch it at least once a month. In a 2014 survey by the Oxford Union in the UK, 71.8% of all students said they view porn; 91% of men vs 51% of women. In February 9, 2014 the Irish Mirror reported that Ireland’s internet porn use has increased 77%since 2010. The reality is that it is very easy for our kids to be exposed to it. However, if you want to block pornography it is becoming increasingly difficult and complicated. It is no longer as simple as installing some anti porn software on your PC or installing a porn filter on your PC because kids now access the internet predominantly on mobile devices and also via gaming consoles. |
Scoop.it!
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing
Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing
Scoop.it!
Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/
Gust MEES's insight:
Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/
Fernando de la Cruz Naranjo Grisales's curator insight,
March 25, 2016 3:01 PM
Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/
Scoop.it!
Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots.
Learn more / En savoir plus / Mehr erfahren::
http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Gust MEES's insight:
Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots.
Learn more / En savoir plus / Mehr erfahren::
http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Pam Huff's curator insight,
March 20, 2016 10:36 AM
Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots.
Learn more / En savoir plus / Mehr erfahren::
http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Frederic GOUTH's curator insight,
March 20, 2016 3:01 PM
Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots.
Learn more / En savoir plus / Mehr erfahren::
http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Fernando de la Cruz Naranjo Grisales's curator insight,
March 23, 2016 8:24 AM
Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots.
Learn more / En savoir plus / Mehr erfahren::
http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Scoop.it!
Two authors WHO have collaborated already since looong (see below links, please) on Global-Collaboration and learning together about ICT and everything around it, Cyber Security, Privacy , Digital CitiZenship are trying to show YOU, dear readers, THE possibilities on THE How-To to integrate Physical EDUcation within ICT and Social Media... You will find as well links to software chosen by renowned Universities...
Gust MEES's insight:
Two authors WHO have collaborated already since looong (see below links, please) on Global-Collaboration and learning together about ICT and everything around it, Cyber Security, Privacy , Digital CitiZenship are trying to show YOU, dear readers, THE possibilities on THE How-To to integrate Physical EDUcation within ICT and Social Media... You will find as well links to software chosen by renowned Universities...
Scoop.it!
Bee Secure a créé un site web dédié spécialement aux seniors, afin de les informer et les conseiller quant à une utilisation plus maîtrisée d'internet. Learn more / Mehr erfahren / En savoir plus :
Gust MEES's insight:
Bee Secure a créé un site web dédié spécialement aux seniors, afin de les informer et les conseiller quant à une utilisation plus maîtrisée d'internet. Learn more / Mehr erfahren / En savoir plus :
Scoop.it!
On your own network, you get to set the security rules. You can make sure your router has a decent password; you can keep everything patched; you can run security software on all your devices; and so on. But once you’re on the road, whether it’s free Wi-Fi at the coffee shop or the business network in the airport lounge, you don’t have the same control. Learn more: http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Gust MEES's insight:
On your own network, you get to set the security rules. You can make sure your router has a decent password; you can keep everything patched; you can run security software on all your devices; and so on. But once you’re on the road, whether it’s free Wi-Fi at the coffee shop or the business network in the airport lounge, you don’t have the same control. Learn more: http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
Olivier Baggiano's curator insight,
October 21, 2015 5:16 AM
If you care about your fundamental right to privacy, you should look into using VPN. Especially relevant in this era of metadata collection ....
Scoop.it!
Investing in a good VPN is one of the smartest steps you can take toward improving your online privacy. We'll show you how to do it right. Learn more: https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/ http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN
Gust MEES's insight:
Investing in a good VPN is one of the smartest steps you can take toward improving your online privacy. We'll show you how to do it right. Learn more: https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/ http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN
Scoop.it!
October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. Learn more: https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Gust MEES's insight:
October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. Learn more: https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
Wendy Zaruba's curator insight,
October 2, 2015 8:48 AM
October is National Cyber Security Awareness Month in the US. Great article, what do you know or what part do you play in Cyber Security?
Scoop.it!
BEESECURE-Internet Survivalguide 2015 [pdf] | Luxembourg | ICT . Learn more: . https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/ . .
Gust MEES's insight:
BEESECURE-Internet Survivalguide 2015 [pdf] | Luxembourg | ICT . Learn more: . https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/ . .
Scoop.it!
Online-Shopping ist eine einfache und bequeme Angelegenheit, aber sind Sie sich der Risiken bewusst? Erfahren Sie, welche Maßnahmen seriöse Händler ergreifen, um Ihre Zahlungsdaten gegen Diebstahl zu schützen.
Gust MEES's insight:
Online-Shopping ist eine einfache und bequeme Angelegenheit, aber sind Sie sich der Risiken bewusst? Erfahren Sie, welche Maßnahmen seriöse Händler ergreifen, um Ihre Zahlungsdaten gegen Diebstahl zu schützen.
Scoop.it!
Hackers aren't attacking your company's computers, they're trying to trick your employees. Find out how and what you can do to avoid getting hacked.... Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing - http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing
Gust MEES's insight:
Hackers aren't attacking your company's computers, they're trying to trick your employees. Find out how and what you can do to avoid getting hacked.... Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing - http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing
Scoop.it!
SAFER INTERNET DAY 2016: PLAY YOUR PART FOR A BETTER INTERNET!
Gust MEES's insight:
SAFER INTERNET DAY 2016: PLAY YOUR PART FOR A BETTER INTERNET!
|
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2015/07/19/learning-path-for-professional-21st-century-learning-by-ict-practice/