21st Century Learning and Teaching
586.3K views | +12 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'ICT', 'IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Most vulnerable operating systems and applications in 2014

Most vulnerable operating systems and applications in 2014 | 21st Century Learning and Teaching | Scoop.it

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.

#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.

To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):

  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:
.
.



Gust MEES's insight:

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched.IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Gust MEES's curator insight, February 22, 2015 7:08 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:


Scooped by Gust MEES
Scoop.it!

Cybercrime: What does it mean? | ICT | CyberSecurity

Cybercrime: What does it mean? | ICT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

|Explore different types of cybercrime with this collection of animated videos.

Gust MEES's insight:

Explore different types of cybercrime with this collection of animated videos.


Scooped by Gust MEES
Scoop.it!

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills | 21st Century Learning and Teaching | Scoop.it

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Gust MEES's insight:

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, December 10, 2014 1:29 PM

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

Use of Cookies | What are “cookies”? | Privacy | eSkills | ICT

Use of Cookies | What are “cookies”? | Privacy | eSkills | ICT | 21st Century Learning and Teaching | Scoop.it

“Cookies” (also known as HTTP cookies, web cookies or browser cookies) are simply small pieces of data, which are stored as text files on your computer, whenever you visit certain websites. Their typical purpose is to help sites remember particular actions you may have done there in the past. For example, cookies may track when you have logged into a site, visited certain pages or clicked certain buttons.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Cookie+information



Gust MEES's insight:

“Cookies” (also known as HTTP cookies, web cookies or browser cookies) are simply small pieces of data, which are stored as text files on your computer, whenever you visit certain websites. Their typical purpose is to help sites remember particular actions you may have done there in the past. For example, cookies may track when you have logged into a site, visited certain pages or clicked certain buttons.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Cookie+information




No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2014 | CyberSecurity | Predictions 2015 | EDUcation

Kaspersky Security Bulletin 2014 | CyberSecurity | Predictions 2015 | EDUcation | 21st Century Learning and Teaching | Scoop.it
Mac Attacks: OS X botnets

Despite efforts by Apple to lock down the Mac operating system, we continue to see malicious software being pushed via torrents and pirated software packages. The increasing popularity of Mac OS X devices is turning heads in the criminal world, making it more appealing to develop malware for this platform.

The increasing popularity of #MacOS X devices makes it more appealing to the #criminal world to develop #malware
Tweet
The closed-by-default ecosystem makes it harder for this malware to successfully take hold of the platform, but there remains a subsection of users who'll gladly disable Mac OS X security measures – especially people who use pirated software. This means that those looking to hijack OS X systems for a variety of reasons know that they simply need to bundle their malware with desirable software (probably in the form of a key generator) to enjoy widespread success.


Due to widespread beliefs about the security of the OS X platform, these systems are also unlikely to have an antimalware solution installed that will flag the infection so once the malware is installed, so it's likely to go unnoticed for a very long time.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
The closed-by-default ecosystem makes it harder for this malware to successfully take hold of the platform, but there remains a subsection of users who'll gladly disable Mac OS X security measures – especially people who use pirated software. This means that those looking to hijack OS X systems for a variety of reasons know that they simply need to bundle their malware with desirable software (probably in the form of a key generator) to enjoy widespread success.


Due to widespread beliefs about the security of the OS X platform, these systems are also unlikely to have an antimalware solution installed that will flag the infection so once the malware is installed, so it's likely to go unnoticed for a very long time.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Use a VPN

How to Use a VPN | 21st Century Learning and Teaching | Scoop.it
Plus, troubleshooting “file in use” messages.


Q. If I get a VPN (a virtual private network), will it protect the computer against malicious software?

A. A VPN encrypts the data that you send and receive over your Internet connection to protect it from snoopers looking to steal passwords and other information. If you use public wireless networks, using a VPN helps keep personal information private.

Learn more:

.

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

Gust MEES's insight:
Plus, troubleshooting “file in use” messages.


Q. If I get a VPN (a virtual private network), will it protect the computer against malicious software?

A. A VPN encrypts the data that you send and receive over your Internet connection to protect it from snoopers looking to steal passwords and other information. If you use public wireless networks, using a VPN helps keep personal information private.

Learn more:

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Biggest ever Tor raid hits 410 underground sites; 17 arrested

Biggest ever Tor raid hits 410 underground sites; 17 arrested | 21st Century Learning and Teaching | Scoop.it
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why the Security of USB Is Fundamentally Broken

Why the Security of USB Is Fundamentally Broken | 21st Century Learning and Teaching | Scoop.it

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. 


Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work.


Gust MEES's insight:

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!? | 21st Century Learning and Teaching | Scoop.it
. . WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!? . To understand the impact of Cyber-Security, Cyber-Crime, Cyber-Attacks, Spam, on a global view it is importan...
Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/category/often-asked-questions/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to keep your business safe – the one checklist all SMBs should have [Infographic]

How to keep your business safe – the one checklist all SMBs should have [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, June 24, 2013 11:04 AM

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Microsoft Patch Tuesday - seven bulletins, four critical, three RCEs, and even a fix for Macs

Microsoft Patch Tuesday - seven bulletins, four critical, three RCEs, and even a fix for Macs | 21st Century Learning and Teaching | Scoop.it
Microsoft's March 2013 Patch Tuesday is out.

There are seven bulletins this month, dealing with twenty documented vulnerabilities.

Paul Ducklin helps you choose where to start...
Gust MEES's insight:

 

                                  ===> Update asap!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.


Gust MEES's insight:

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google Provides Tips And Case Studies On How To Fix Hacked Sites | CyberSecurity | CyberHygiene

Google Provides Tips And Case Studies On How To Fix Hacked Sites | CyberSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it

Today Google provided some tips, complete with case studies, on how to fix hacked sites. After speaking with two webmasters who resolved some complicated hacked site issues, Google decided to share their stories to help other site owners who may be trying to fix similar problems.


Google will also be using these stories, and other feedback sent in from webmasters, to continue to improve its documentation on fixing hacked sites.


Gust MEES's insight:

Today Google provided some tips, complete with case studies, on how to fix hacked sites. After speaking with two webmasters who resolved some complicated hacked site issues, Google decided to share their stories to help other site owners who may be trying to fix similar problems.


Google will also be using these stories, and other feedback sent in from webmasters, to continue to improve its documentation on fixing hacked sites.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity | 21st Century Learning and Teaching | Scoop.it
A LOOK BACK AT 25 CYBER THREATS

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 

Gust MEES's insight:
A LOOK BACK AT 25 CYBER THREATS

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Let's Encrypt : Liberté, fraternité, sécurité (TLS) - Cases | ICT | EDUcation

Let's Encrypt : Liberté, fraternité, sécurité (TLS) -  Cases | ICT | EDUcation | 21st Century Learning and Teaching | Scoop.it
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


Gust MEES's insight:
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip | 21st Century Learning and Teaching | Scoop.it

Software sollte generell immer auf dem neuesten Stand sein. Manche Programme sind aber besonders gefährdet – Virenbefall und Hacker-Angriffe drohen. Aktualisieren Sie sie schnellstmöglich!


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Gust MEES's insight:

Software sollte generell immer auf dem neuesten Stand sein. Manche Programme sind aber besonders gefährdet – Virenbefall und Hacker-Angriffe drohen. Aktualisieren Sie sie schnellstmöglich!


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



No comment yet.
Scooped by Gust MEES
Scoop.it!

Information security training for new employees | CyberSecurity | EDUcation

This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
Gust MEES's insight:
This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
elisajames's comment, December 5, 2014 2:57 AM
thanks for this sharing its really informative
Scooped by Gust MEES
Scoop.it!

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.




1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Gust MEES's insight:
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.


1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Elizabeth Milovidov's curator insight, December 1, 2014 9:24 AM

Is your phone secure?  Read these 10 tips for guidance.

Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security | 21st Century Learning and Teaching | Scoop.it
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Via Frederic GOUTH
Gust MEES's insight:
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.


===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Gust MEES's insight:
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.


===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Skills needed in the 21st Century from Educators, Teachers, Students... by Gust MEES

Skills needed in the 21st Century from Educators, Teachers, Students... by Gust MEES | 21st Century Learning and Teaching | Scoop.it
TOUCH this image to discover its story. Image tagging powered by ThingLink


Learn more:



Gust MEES's insight:

Learn more:



smadar yona's curator insight, March 28, 2014 2:22 AM

מאוד מעניין

געו בקישורים על המילים מימין

objectplace's curator insight, May 13, 2014 10:44 AM

thinglink here

Scooped by Gust MEES
Scoop.it!

Free first aid kit for computer viruses

Free first aid kit for computer viruses | 21st Century Learning and Teaching | Scoop.it
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malw...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW! | 21st Century Learning and Teaching | Scoop.it
. . . ICT Awareness: What YOU SHOULD KNOW! . Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones...) as well as I blog a lot about it and i...

 

 

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Gust MEES's insight:

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Learn more:

 

http://gustmees.wordpress.com

 

Gust MEES's curator insight, June 23, 2013 12:48 PM

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Learn more:

 

http://gustmees.wordpress.com

 

ANGEL UWIMANA's comment, July 24, 2013 11:25 AM
by knowing what is cybersecurity, also using ICT in awareness of right and responsibilities will be an easy way.