Latest Social Media News
112.9K views | +3 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions!

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions! | Latest Social Media News | Scoop.it
. . Introduction In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is...

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | Latest Social Media News | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Insecure WordPress blogs unwittingly host Blackhole malware attack

Insecure WordPress blogs unwittingly host Blackhole malware attack | Latest Social Media News | Scoop.it
A major malware campaign has been spread via spam email and compromised self-hosted WordPress blogs, attempting to infect computers using the notorious Blackhole exploit kit.

 

 

Gust MEES: I will post more often about IT-Security and Cyber-Security in this section of 21st Century Learning and Teaching, as it is a MUST to know about it as Teachers, Educators, Instructors and Learners (Students) use Internet for e-Learning!!!

 

So read this careful please and be aware of the malware ;)

 

Check out also my FREE courses about basic IT-Security here, be prepared and think ===> Forewarned is Forearmed!  <===

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

 

In French (en français) :

 

http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/

 

http://gustmeesfr.wordpress.com/

 

Stay secure and think on your responsabilities while using "Bring Your Own Device" [BYOD], advice ;)

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Searching for images on Bing? Beware malicious Blackhat SEO poisoning

Searching for images on Bing? Beware malicious Blackhat SEO poisoning | Latest Social Media News | Scoop.it
Trust your search engine results? Read how image searches within Bing are being poisoned by attackers in order to drive web traffic to malicious sites.

 

Gust MEES

 

BTW: Never use a search engine (which ever one) without having installed special programs on your computer who give YOU advice if a website and/or image is trustful and/or infected!

 

Please read my FREE courses about basic IT-Security where YOu will find also these FREE programs which install in less than 5 minutes, YOU should to get best protection:

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Make yourself less vulnerable online (video)

Make yourself less vulnerable online (video) | Latest Social Media News | Scoop.it
Online security breaches are becoming increasingly common. But there are ways you can protect yourself. Read this blog post by Jen Haley on Security & Privacy.

 

Gust MEES: there is more even to consider, so check out please also my FREE courses (5 minutes ONLY...):

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

===> Don't have a good memory and being a "bad organizer"? Don't worry and check any Friday my specially created Hashtag on Twitter #FSCD where I remeber YOU what to take care about ;) Stay tuned... <===

 

Read more:

http://news.cnet.com/8301-1009_3-57495084-83/make-yourself-less-vulnerable-online-video/?part=rss&amp;amp;subj=news&amp;amp;tag=2547-1_3-0-20

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Latest Social Media News | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


===> NOBODY is perfect! A security by 100% doesn’t exist! <===

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD