21st Century Learning and Teaching
586.8K views | +8 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Awareness', 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

BSIFB - Informationen - Mit sicheren Passwörtern private Daten schützen | #BSI #CyberSecurity #Awareness #Passwords

BSIFB - Informationen - Mit sicheren Passwörtern private Daten schützen | #BSI #CyberSecurity #Awareness #Passwords | 21st Century Learning and Teaching | Scoop.it

Mit sicheren Passwörtern private Daten schützen


Jedes Jahr erinnert der 1. Februar als "Ändere dein Passwort"-Tag Bürgerinnen und Bürger daran, ihre Passwörter zu wechseln. Passwörter sind aus dem digitalen Zeitalter nicht wegzudenken: Mit ihnen schützen wir Accounts für E-Mails und Online-Shops, Zugänge zum Online-Banking und zu sozialen Netzwerken, das eigene Smartphone und das WLAN zuhause.

 

Umso wichtiger ist es, all die dort hinterlegten privaten Daten mit sicheren Passwörtern vor dem Zugriff durch Dritte zu schützen – und sich diese Passwörter gut merken zu können.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Passwords

 

Gust MEES's insight:

Mit sicheren Passwörtern private Daten schützen


Jedes Jahr erinnert der 1. Februar als "Ändere dein Passwort"-Tag Bürgerinnen und Bürger daran, ihre Passwörter zu wechseln. Passwörter sind aus dem digitalen Zeitalter nicht wegzudenken: Mit ihnen schützen wir Accounts für E-Mails und Online-Shops, Zugänge zum Online-Banking und zu sozialen Netzwerken, das eigene Smartphone und das WLAN zuhause.

 

Umso wichtiger ist es, all die dort hinterlegten privaten Daten mit sicheren Passwörtern vor dem Zugriff durch Dritte zu schützen – und sich diese Passwörter gut merken zu können.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Passwords

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to secure your Raspberry Pi | #MakerED #Coding #CyberSecurity #IoT #InternetOfThings #Awareness

How to secure your Raspberry Pi | #MakerED #Coding #CyberSecurity #IoT #InternetOfThings #Awareness | 21st Century Learning and Teaching | Scoop.it
7 considerations to make when securing your Raspberry Pi.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Raspberry+PI

 

Gust MEES's insight:
7 considerations to make when securing your Raspberry Pi.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Raspberry+PI

 

Heather Mills's curator insight, March 20, 2017 10:23 PM

Maker: Raspberry Pi

Scooped by Gust MEES
Scoop.it!

Botnets - Schneier on Security | #CyberSecurity #CyberAttacks #DDoS

Botnets - Schneier on Security | #CyberSecurity #CyberAttacks #DDoS | 21st Century Learning and Teaching | Scoop.it
Botnets
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down.

But now the problem is getting worse, thanks to a flood of cheap webcams, digital video recorders, and other gadgets in the "Internet of things." Because these devices typically have little or no security, hackers can take them over with little effort. And that makes it easier than ever to build huge botnets that take down much more than one site at a time.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

Gust MEES's insight:
Botnets
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down.

But now the problem is getting worse, thanks to a flood of cheap webcams, digital video recorders, and other gadgets in the "Internet of things." Because these devices typically have little or no security, hackers can take them over with little effort. And that makes it easier than ever to build huge botnets that take down much more than one site at a time.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness 

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness  | 21st Century Learning and Teaching | Scoop.it
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Use Public Wifi? Here’s Why Snooping On You is Way Easier Than You Think | #VPN #Privacy #CyberSecurity 

Use Public Wifi? Here’s Why Snooping On You is Way Easier Than You Think | #VPN #Privacy #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Hacking is so easy these days, even non-hackers can do it. Some kinds of hacking, that is. Like public wifi, for example. To spy on people's Internet browsing while they're sipping a cup of brew, you don't need to be a pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Gust MEES's insight:
Hacking is so easy these days, even non-hackers can do it. Some kinds of hacking, that is. Like public wifi, for example. To spy on people's Internet browsing while they're sipping a cup of brew, you don't need to be a pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

World Backup Day: Paragon-Backup-Software kostenlos

World Backup Day: Paragon-Backup-Software kostenlos | 21st Century Learning and Teaching | Scoop.it
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

Gust MEES's insight:
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

 

Fernando de la Cruz Naranjo Grisales's curator insight, April 2, 2016 7:06 AM
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

 

Scooped by Gust MEES
Scoop.it!

2 GByte Gratisspeicher für Google Drive sichern | Safer Internet Day 2016 | #SID2016

2 GByte Gratisspeicher für Google Drive sichern | Safer Internet Day 2016 | #SID2016 | 21st Century Learning and Teaching | Scoop.it
Google spendiert zur Feier des Safer Internet Day 2016 allen Nutzern für die Absolvierung eines Sicherheitschecks 2 GByte zusätzlichen Cloud-Speicher auf Google Drive.





Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2016/01/18/sid2016-safer-internet-day-2016-participation/


Gust MEES's insight:
Google spendiert zur Feier des Safer Internet Day 2016 allen Nutzern für die Absolvierung eines Sicherheitschecks 2 GByte zusätzlichen Cloud-Speicher auf Google Drive.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2016/01/18/sid2016-safer-internet-day-2016-participation/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers are coming for your home — here's how to protect yourself | Internet of Things | IoT | CyberSecurity

Hackers are coming for your home — here's how to protect yourself | Internet of Things | IoT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it



You may want to think twice before you install that security camera.






Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

You may want to think twice before you install that security camera.




Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Täglich mehr als 255.000 neue PC-Schädlinge | ICT | eSkills | EDUcation

Täglich mehr als 255.000 neue PC-Schädlinge | ICT | eSkills | EDUcation | 21st Century Learning and Teaching | Scoop.it
Pro Tag erscheint eine Viertelmillion neuer Schädlinge, warnt PandaLabs. Außerdem meldet das Unternehmen, dass weltweit jeder dritte PC infiziert ist.




Mehr erfahren WIE man sich schützt:


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


Gust MEES's insight:

Pro Tag erscheint eine Viertelmillion neuer Schädlinge, warnt PandaLabs. Außerdem meldet das Unternehmen, dass weltweit jeder dritte PC infiziert ist.


Mehr erfahren WIE man sich schützt:


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/




No comment yet.
Scooped by Gust MEES
Scoop.it!

THE INTERNET OF EVERYTHING: 2015 | Internet Of Things | ICT Evolution

THE INTERNET OF EVERYTHING: 2015 | Internet Of Things | ICT Evolution | 21st Century Learning and Teaching | Scoop.it
The way we access the internet has changed rapidly over the past few years, transitioning from desktops to mobile devices.

Now, the internet is expanding again — coming to all of the everyday devices found in our homes, businesses, and cities.

BI Intelligence has created a slideshow highlighting the most important ways the Internet of Everything market will develop, the benefits newly connected devices will offer consumers and businesses, and the potential barriers that could inhibit growth. 


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:
The way we access the internet has changed rapidly over the past few years, transitioning from desktops to mobile devices.

Now, the internet is expanding again — coming to all of the everyday devices found in our homes, businesses, and cities.

BI Intelligence has created a slideshow highlighting the most important ways the Internet of Everything market will develop, the benefits newly connected devices will offer consumers and businesses, and the potential barriers that could inhibit growth. 


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


información digital- Nubia Cadena's curator insight, February 27, 2015 11:34 PM

añada su visión ...

Tony Guzman's curator insight, March 2, 2015 3:33 PM

This article shares on how the Internet, and the way we connect to it, is changing in 2015. Any surprises?

Scooped by Gust MEES
Scoop.it!

Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers | Cyber Security

Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers | Cyber Security | 21st Century Learning and Teaching | Scoop.it
Hackers are exploiting a security flaw in Microsoft PowerPoint to attack computer systems


Fortunately, the attack requires user interaction the attack requires user interaction, so you would have to consent to open the file containing an infected OLE object. So if you tried to download a PowerPoint file from the web, a display prompt would ask for download permission. Consent prompts are fairly common, however, so users might not even realize they're granting permission to an infected file.


As for now, Microsoft suggests users avoid opening any PowerPoint files from an untrusted source.


Gust MEES's insight:

As for now, Microsoft suggests users avoid opening any PowerPoint files from an untrusted source.

Roger Smith's curator insight, October 25, 2014 6:22 AM

Zero exploits are one of the most destructive way for hackers to gain access to computers and smart devices. 

Scooped by Gust MEES
Scoop.it!

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
DIY stalker device uniquely IDs people by tracking radio signals they emit.


The research pair first envisioned Snoopy more than two years ago to underscore how much data could be gathered by a collection of devices that are within the capability and budget of a die-hard hobbyist.


With a price tag of under $200 for the Snoopy spying node and $1,650 for the optional flying drone, the resulting proof-of-concept is even more instructive in the post-Snowden world that has since emerged.


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


Gust MEES's insight:


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Security awareness training: Why it matters

Security awareness training: Why it matters | 21st Century Learning and Teaching | Scoop.it

Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including Procter & Gamble, European Central Bank, Deutsche Telecom and Bayer.

What you want is a change in behavior of individuals and a cultural change in the company as a whole. To achieve this goal, you must repeatedly confront employees with possible threats and show them best practices.


Also, the role of the managers is crucial. It is important to train trainers in their role and be sure that they practice good behavior on a day-to-day basis. Safety is not about knowledge in most cases, but it is all about “awareness” in the true sense of the word.


You only reach a higher level of awareness if safety is an issue that repeatedly is discussed and addressed.



Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Video Cybersecurity Awareness Month - YouTube | #ModernEDU #DigitalCitiZENship #ICT

Cybersecurity video produced in october 2013 by ISSA France Chapter in support of the European Cybersecurity Awareness Month. This crowd funded program, called CitiZENSec, goes beyond awareness for just employees and educates the general public.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

https://gustmees.wordpress.com/?s=cybersecurity

 

Gust MEES's insight:
Cybersecurity video produced in october 2013 by ISSA France Chapter in support of the European Cybersecurity Awareness Month. This crowd funded program, called CitiZENSec, goes beyond awareness for just employees and educates the general public.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

https://gustmees.wordpress.com/?s=cybersecurity

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Training | Security Awareness | Kaspersky Lab DE | #DigitalCitiZENship #eSkills #ICT

Wir unterstützen Kunden durch ein Schulungsangebot zur Förderung des Sicherheitsbewusstseins und unter Beteiligung ihrer Sicherheits- und Personalabteilungen beim Aufbau einer Cybersicherheitskultur.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2015/07/19/learning-path-for-professional-21st-century-learning-by-ict-practice/

 

Gust MEES's insight:
Wir unterstützen Kunden durch ein Schulungsangebot zur Förderung des Sicherheitsbewusstseins und unter Beteiligung ihrer Sicherheits- und Personalabteilungen beim Aufbau einer Cybersicherheitskultur.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2015/07/19/learning-path-for-professional-21st-century-learning-by-ict-practice/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity 

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

#Backup A MUST With ALL The #Malware AND Especially #Ransomware Around! | #CyberSecurity #eSkills #Awareness

#Backup A MUST With ALL The #Malware AND Especially #Ransomware Around! | #CyberSecurity #eSkills #Awareness | 21st Century Learning and Teaching | Scoop.it

Backup A MUST With ALL The Malware AND Especially Ransomware Around! NOT sure if YOU followed OR if YOU are conscientious about WHAT is going around actually on the internet concerning "Malware" and "CyberSecurity", BUT YOU SHOULD!!! THIS is a Wake-UP Call take it serious please! That is called ALSO <===> Proactive THINKing <===> eSkills

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

Gust MEES's insight:

Backup A MUST With ALL The Malware AND Especially Ransomware Around! NOT sure if YOU followed OR if YOU are conscientious about WHAT is going around actually on the internet concerning "Malware" and "CyberSecurity", BUT YOU SHOULD!!! THIS is a Wake-UP Call take it serious please! That is called ALSO <===> Proactive THINKing <===> eSkills

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is a VPN, and why should you be using one? | Graham Cluley | #Privacy #CyberSecurity #WiFi #ICT #eSkills

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Gust MEES's insight:

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Pam Huff's curator insight, March 20, 2016 10:36 AM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Frederic GOUTH's curator insight, March 20, 2016 3:01 PM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Fernando de la Cruz Naranjo Grisales's curator insight, March 23, 2016 8:24 AM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Scooped by Gust MEES
Scoop.it!

In the New Wild West, a Computer May Be More Dangerous Than a Gun | ICT | CyberSecurity | Awareness

In the New Wild West, a Computer May Be More Dangerous Than a Gun | ICT | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious.


It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious.


It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT | 21st Century Learning and Teaching | Scoop.it
Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.
Gust MEES's insight:

Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.


No comment yet.
Scooped by Gust MEES
Scoop.it!

How Will The World Look In The Near Future Because Of ICT | OUR New Habits | Awareness For CyberSecurity

How Will The World Look In The Near Future Because Of ICT | OUR New Habits | Awareness For CyberSecurity | 21st Century Learning and Teaching | Scoop.it

WE are living in a very quick changing world as the internet opens NEW possibilities, NOT ONLY for searching and publishing. WE are talking actually a lot about the ===> Internet of Things, Internet of Everything <=== whereby a lot of people have it already at home without knowing WHAT it actually is! So, does ALSO EDUcation which need to adapt to it as the internet is a common right for anyone.


EDUcation is STILL looking on the How-To to implement it for LEARNing and TEACHing and (like usual…) struggling and behind that evolution, an evolution that is NOT temporary but will certainly go much further when one is watching on each day (thanks to the internet) the NEW discoveries, new technology, new materials based on Nano-Technology. WHAT was true YESTERDAY isn’t anymore TODAY! 


Therefore it is important, actually a MUST, that in EDUcation the students, learners, will get prepared for the (not so anymore unknown) near future, they MUST get prepared for ===> LEARNing-To-LEARN <===, to be able to adapt their knowledge by daily routines, they will become ===> Life-Long-LEARNing <=== persons!

Gust MEES's insight:

WE are living in a very quick changing world as the internet opens NEW possibilities, NOT ONLY for searching and publishing. WE are talking actually a lot about the ===> Internet of Things, Internet of Everything <=== whereby a lot of people have it already at home without knowing WHAT it actually is! So, does ALSO EDUcation which need to adapt to it as the internet is a common right for anyone.


EDUcation is STILL looking on the How-To to implement it for LEARNing and TEACHing and (like usual…) struggling and behind that evolution, an evolution that is NOT temporary but will certainly go much further when one is watching on each day (thanks to the internet) the NEW discoveries, new technology, new materials based on Nano-Technology. WHAT was true YESTERDAY isn’t anymore TODAY! 


Therefore it is important, actually a MUST, that in EDUcation the students, learners, will get prepared for the (not so anymore unknown) near future, they MUST get prepared for ===> LEARNing-To-LEARN <===, to be able to adapt their knowledge by daily routines, they will become ===> Life-Long-LEARNing <=== persons!


No comment yet.
Scooped by Gust MEES
Scoop.it!

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.


Gust MEES's insight:

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is Browser Hijacking? | Cyber Security

What is Browser Hijacking? | Cyber Security | 21st Century Learning and Teaching | Scoop.it

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Gust MEES's insight:

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Roger Smith's curator insight, October 13, 2014 7:03 PM

Another sneaky way that the bad guys get ya!

mbeva's curator insight, October 14, 2014 7:21 AM

hack!!!!

Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.