21st Century Learning and Teaching
586.7K views | +6 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Learning basics of Cybersecurity'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Small Biz Cyber Planner 2.0 | FCC.gov

FCC Small Biz Cyber Planner 2.0 | FCC.gov | 21st Century Learning and Teaching | Scoop.it

 

Information technology and high-speed Internet are great enablers of small business success, but with the benefits comes the need to guard against growing cyber threats. As larger companies take steps to secure their systems, less secure small businesses are easier targets for cyber criminals. In October 2012, the FCC re-launched Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. Use this tool to create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns.

 

 

==================================================

 

Gust MEES

 

A MUST for Education and Business! Especially for "Bring Your Own Device" (BYOD)

 

==================================================

Gust MEES's curator insight, December 20, 2012 3:23 PM

A MUST also for Education, very easy to generate and which gives YOU the necessary knowledge to have a good Cyber-Security, please read it and test it!

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

A short history of Christmas malware

A short history of Christmas malware | 21st Century Learning and Teaching | Scoop.it
Graham Cluley jumps in his TARDIS, and takes us on a trip through time to see Christmas-related malware from 1987 to present.
Gust MEES's curator insight, December 23, 2012 8:30 AM

 

                      ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Malware never dies

Malware never dies | 21st Century Learning and Teaching | Scoop.it
2012 saw some of the biggest malware discoveries in the history of information security. AlienVault has crafted this unique slideshow that proves modern malware never dies, it just morphs and reappears.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Securing a tablet for web browsing in six easy steps

Securing a tablet for web browsing in six easy steps | 21st Century Learning and Teaching | Scoop.it
Taking your tablet online can make you vulnerable to an assortment of internet dangers, including identity theft and hackers. This is especially true if you’re taking advantage of a public hotspot ...

====================================================

Gust MEES

Please read also my FREE course here:

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

====================================================
Gust MEES's insight:

Please read also my FREE course here:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Macs hit by new wave of money-stealing malware 

Macs hit by new wave of money-stealing malware  | 21st Century Learning and Teaching | Scoop.it
Apple users who think they're immune to malware and other bugs need to pay attention: A new Trojan is infecting Apple computers in order to obtain victims' phone numbers and rob them via unexpected premium SMS charges.

The Trojan, which masks itself as downloadable software, presents victims with a legitimate-looking installation wizard that asks for their phone number in order to verify or authenticate the install.

Read more:
http://www.nbcnews.com/technology/technolog/macs-hit-new-wave-money-stealing-malware-1C7563684
Gust MEES's insight:

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity

No comment yet.
Scooped by Gust MEES
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | 21st Century Learning and Teaching | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&amp;utm_source=twitter&amp;utm_medium=social
Gust MEES's insight:

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Gust MEES's curator insight, December 12, 2012 7:10 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

Scooped by Gust MEES
Scoop.it!

2012 McAfee 12 Scams of the Holidays

2012 McAfee 12 Scams of the Holidays | 21st Century Learning and Teaching | Scoop.it
============> Be aware of the Malware! <============

BEST protection against Malware is still having BEST protection on YOUR computer(s) AND Smartphone(s)!

Check my FREE courses here:

- Cyber-Security Practice: Learn it in one week

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Gust MEES's insight:

 

============> Be aware of the Malware! <============

 

BEST protection against Malware is still having BEST protection on YOUR computer(s) AND Smartphone(s)!

 

Check my FREE courses here:

 

- Cyber-Security Practice: Learn it in one week

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day | 21st Century Learning and Teaching | Scoop.it

Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012.

 

===> The report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. <===

 

Overall, Kaspersky Lab detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

 

At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.

 

===> Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. <===

 

This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2352

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Huge GPU cluster makes password hacking a breeze

Huge GPU cluster makes password hacking a breeze | 21st Century Learning and Teaching | Scoop.it
Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task.

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=14077

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Clueless officials hamper cybersecurity law-making

Clueless officials hamper cybersecurity law-making | 21st Century Learning and Teaching | Scoop.it
Governments need to know what problems the cybersecurity legislation is meant to address, or they will face public backlash over the possible intrusions to their personal rights.

 

Read more, a MUST:

http://www.zdnet.com/clueless-officials-hamper-cybersecurity-law-making-7000008140/?s_cid=e550

 

No comment yet.
Rescooped by Gust MEES from Time to Learn
Scoop.it!

Se protéger des dangers d’Internet : support de formation

Se protéger des dangers d’Internet : support de formation | 21st Century Learning and Teaching | Scoop.it

Se protéger des dangers d’Internet, c’est le titre d’un dossier de présentation de l’Université de Limoges diffusée en janvier 2012 (54 pages, en pdf), support de formation sur cette thématique qui donne des clés de compréhension, sur Internet, sur les menaces, pour comprendre et s’adapter. Des conseils pratiques et techniques sont délivrés.

 

Cette présentation est proposée par Xavier Montagutelli (responsable de la Sécurité des Systèmes d’Informations au Service Commun Informatique de l’Université de Limoges).

 

=============================================

 

Gust MEES

 

Lien de téléchargement du PDF: http://www.unilim.fr/sci/IMG/pdf/dangers-internet-2.pdf

 

Mes propres cours en français :

 

http://gustmeesfr.wordpress.com/

 

Mes cours gratuits en anglais :

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

=============================================

 


Via Frédéric DEBAILLEUL
No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online | 21st Century Learning and Teaching | Scoop.it
Au même titre que les années passées, les appareils connectés et en particulier les tablettes et les smartphones, seront sûrement dans de nombreuses (...)
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile security: Defending your devices

Mobile security: Defending your devices | 21st Century Learning and Teaching | Scoop.it

===> The days when IT security was solely focused on desktop PCs are long gone. <===

 

Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Android botnet abuses people's phones for SMS spam

Android botnet abuses people's phones for SMS spam | 21st Century Learning and Teaching | Scoop.it
Security vendor Cloudmark says it is the first time they've detected a botnet that abuses other people's phones to send spam
No comment yet.
Scooped by Gust MEES
Scoop.it!

Safeguarding Your Digital Life: How to Stay Safe in 2013

Safeguarding Your Digital Life: How to Stay Safe in 2013 | 21st Century Learning and Teaching | Scoop.it

As 2012 draws to an end, it's fair to say it's been a very busy year for cybercriminals! So what have we learnt from the past year and what do we need to be wary of in 2013 to ensure that both our data and our wallet remain protected?

Despite common beliefs, one thing we have learnt in 2012 is that Apple definitely isn't immune from malware. Over the past year we have seen a significant rise in the number of attacks targeting MacOS X computers - the most notable being the "Flashfake/Flashback" Trojan.

Appearing late in 2011, the Trojan became really popular in 2012 with estimations that it infected nearly 700,000 Macs, making it the biggest MacOS X infection to-date. Exploiting a vulnerability in Java, the malware occurs when victims visit infected websites, allowing the Trojan to be downloaded directly onto their computers. Infected users can then have their computers watched and controlled remotely by hackers, leaving them vulnerable to data theft and fraud.

It's no surprise that Macs have become key targets for attack. Apple products are popular with many influential politicians and prominent businessmen; therefore the information stored on these devices is particularly sensitive and valuable to cybercriminals.

====================================================

===> So Mac users be warned - this threat is only going to continue to grow! <===

====================================================

Nobody is perfect! "Apple's slogan was =>'Think Different' SO DO SO + get protected ;) #Learning basics of #Cybersecurity

Gust MEES's insight:

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity

 

Read alos my FREE courses here:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Digital Universe - Insafe

Digital Universe - Insafe | 21st Century Learning and Teaching | Scoop.it
European Schoolnet (host organisation of Insafe), together with Liberty Global, has today launched an animation aimed at educating parents on children's safety online: The Digital Universe of Your Children. View it here…

Gust MEES's insight:

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century! Check out also my FREE courses:

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

=============> BE AWARE OF THE MALWARE <============
Gust MEES's curator insight, December 13, 2012 9:05 AM

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century!

 

Check out also my FREE courses:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

                ===> BE AWARE OF THE MALWARE <===

 

 

Scooped by Gust MEES
Scoop.it!

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware | 21st Century Learning and Teaching | Scoop.it
Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The bug, which can be used to gai...
Here's what the researchers found they could access:

TV settings and channel lists
SecureStorage accounts
Widgets and their configurations
History of USB movies
ID
Firmware
Whole partitions
USB drives attached to the TV


Gust MEES's insight:

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable! Protect YOUR computer(s) and Smartphone(s):

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/
Gust MEES's insight:

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable!

 

Protect YOUR computer(s) and Smartphone(s):

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Thybo Lingier's curator insight, December 31, 2013 9:51 AM

Company name: Samsung
Economic activity segment: Technology

Use of ICT: New technolgy combined with the internet and several other options. For example connecting your television with Facebook or Youtube

Objectives: Customer Satisfaction and Innovation

Scooped by Gust MEES
Scoop.it!

Updates: Alerte aux failles critiques pour IE, Chrome, Flash et Java | Silicon

Updates: Alerte aux failles critiques pour IE, Chrome, Flash et Java | Silicon | 21st Century Learning and Teaching | Scoop.it
Chrome 23, Internet Explorer 9 et 10, Flash 11.x, Java SE 6 et 7. Tous se voient proposer des mises à jour corrigeant des failles de sécurité critiques.

===> UPDATE asap!!! <===
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

That square QR barcode on the poster? Check it's not a sticker

That square QR barcode on the poster? Check it's not a sticker | 21st Century Learning and Teaching | Scoop.it

Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites.

 

Sian John, UK security strategist at Symantec, said: “There has been an explosion in the number of QR codes over the last couple of years, and cybercriminals are taking full advantage. Because QR codes just look like pictures it’s extremely difficult to tell if they’re genuine or malicious, making it easy to dupe passers-by into scanning codes that may lead to an infected site, or perhaps a phishing site.

 

===========================================

 

Gust MEES

 

Please check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=QR-Reader-App

 

===========================================

 

Read more:

http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Goodbye, 123456: Blackberry bans weak passwords

Goodbye, 123456: Blackberry bans weak passwords | 21st Century Learning and Teaching | Scoop.it
Blackberry has always had a reputation for taking particular care when it comes to security.

 

 

 

 

Read more, a good practice example:

http://www.infosecurity-magazine.com/view/29740/goodbye-123456-blackberry-bans-weak-passwords/?utm_source=twitterfeed&amp;amp;utm_medium=twitter

 

Shahabaz Sayyad's comment, March 24, 2013 9:07 AM
nice
Jocyl Garcia's curator insight, May 17, 2013 8:45 AM

not evrythng dat u wanted and worked hard for always meant to be yours

 

Scooped by Gust MEES
Scoop.it!

Sophos Security Threat Report 2013 - the safest and riskiest countries revealed

Sophos Security Threat Report 2013 - the safest and riskiest countries revealed | 21st Century Learning and Teaching | Scoop.it
Download the free Sophos Security Threat Report, looking back over 2012 and exploring what security threats and trends we will all be facing tomorrow.

 

 

 

 

 

 

Read more, a MUST:

http://nakedsecurity.sophos.com/2012/12/04/sophos-security-threat-report/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Teens: Step Up to the Microsoft Safer Online Challenge

Teens: Step Up to the Microsoft Safer Online Challenge | 21st Century Learning and Teaching | Scoop.it

Calling all young people between the ages of 13 and 18*: Do you sing, act, write, or otherwise create? Get those creative juices flowing; put your “mad (artistic) skillz” to work, and help promote a positive message about life online.

 

Today, Microsoft is launching its first-ever Safer Online Teen Challenge. Teens are encouraged to submit creative works that champion one of many key messages ===> about being smarter and more secure on the Internet. <===

 

Works must be submitted by April 12, 2013, and our hundreds of thousands of thoughtful and learned Facebook fans will help select winners in five inspired categories: song, story/cartoon, skit/presentation, survey, and video.

 

                    ===> BE SMART and START! ;) <===

 

============================================

 

Gust MEES

 

Share this, please, with your school and give your students the possibility to take part in a challenge! They love challenges as their creativity will get involved ;)

 

============================================

 

Read more, a MUST:

http://blogs.technet.com/b/trustworthycomputing/archive/2012/11/13/teens-step-up-to-the-microsoft-safer-online-challenge.aspx

 

 

Gust MEES's insight:

Teachers help your students for a BETTER and more secure Internet! WE are ALL responsible of the future of Internet!

 

Some help here:

 

Check my cartoons 2 get an idea about what is possible ;)

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

https://gustmees.wordpress.com/2012/05/28/not-only-rights-but-also-responsibility/

 

http://www.scoop.it/t/21st-century-tools-for-teaching-people-and-learners?tag=Cartoons

 

Check out also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=comics...

 

http://www.scoop.it/t/21st-century-tools-for-teaching-people-and-learners?tag=Comics

 

No comment yet.