21st Century Learning and Teaching
586.7K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Mobile-Security', 'mLearning'. Clear
Scooped by Gust MEES
Scoop.it!

Mobile botnets detected since 2010 [pdf] | MobileSecurity | CyberSecurity

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Your Mobile Device Is a Hack Waiting to Happen: Pros

Your Mobile Device Is a Hack Waiting to Happen: Pros | 21st Century Learning and Teaching | Scoop.it
Many users don't take steps to protect themselves and their data on their smartphones and tablets.

 

When it comes to keeping their mobile devices safe and secure, consumers are playing a game of cat-and-mouse with cybercriminals.

 

Although most users are aware that mobile devices can be hacked, just as desktops or laptops can, many still don't take steps to protect themselves and the data on their smartphones and tablets, according to a study released Wednesday at the CTIA conference in Las Vegas.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Les Français et leur mobile : la sécurité des données personnelles [Infographic]

Les Français et leur mobile : la sécurité des données personnelles [Infographic] | 21st Century Learning and Teaching | Scoop.it
Norton by Symantec a publié hier une étude concernant les usages des Français en matière de téléphones mobiles.Les Français et leur mobile ; une relation fusionnelle- 33%
No comment yet.
Scooped by Gust MEES
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | 21st Century Learning and Teaching | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.


===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===


Gust MEES's insight:

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobile Schadsoftware verursachte 10 Millionen Dollar Schaden

Mobile Schadsoftware verursachte 10 Millionen Dollar Schaden | 21st Century Learning and Teaching | Scoop.it
Lookout, ein Hersteller für Sicherheits-Tools für mobile Geräte, hat in einer aufwändigen Studie herausgefunden, dass alleine durch eine Schädlingsfamilie rund 10 Millionen Dollar Schaden entstanden ist.

 

Mehr erfahren:

http://www.pcwelt.de/news/Studie-Mobile-Schadsoftware-verursachte-10-Millionen-Dollar-Schaden-6553565.html?r=261529428405648&amp;amp;lid=194844

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Dangers of Jailbreaking and Rooting Mobile Devices

Dangers of Jailbreaking and Rooting Mobile Devices | 21st Century Learning and Teaching | Scoop.it

What is "jailbreaking" and "rooting"?

iOS: Jailbreaking is the process of modifying iOS system kernels to allow file system read and write access. Most jailbreaking tools (and exploits) remove the limitations and security features built by the manufacturer Apple (the "jail") through the use of custom kernels, which make unauthorized modifications to the operating system. Almost all jailbreaking tools allow users to run code not approved and signed by Apple. This allows users to install additional applications, extensions and patches without the control of Apple’s App Store.

 

Android: Rooting is the process of gaining administrative or privileged access for the Android OS. As the Android OS is based on the Linux Kernel, rooting a device is analogous to gaining access to administrative, root user-equivalent, permissions on Linux. Unlike iOS, rooting is (usually) not required to run applications outside from the Android Market. Some carriers control this through operating system settings or device firmware. Rooting also enables the user to completely remove and replace the device's operating system.

 

Read more:

http://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!

 

Gust MEES's curator insight, June 26, 2013 7:17 AM

 

Check it out and beware of the malware!!!


Scooped by Gust MEES
Scoop.it!

Mobile Security – Android vs. iOS [Infographic]

Mobile Security – Android vs. iOS [Infographic] | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android | 21st Century Learning and Teaching | Scoop.it

F-Secure Labs Mobile Threat Report for Q4 2013 is out and it’s clear that the most popular smartphone operating system is also the leading target for online criminals.

94% of all mobile malware the F-Secure Response Labs analyzed in Q4  targets Google’s Android platform.

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is: The more current, the better.

Gust MEES's insight:

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is:

 

===> The more current, the better. <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: Cybercrime Goes Mobile

With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...
Gust MEES's insight:

A MUST see and Mac users ===> OPEN YOUR EYES!!!

 

Read also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BBC-Public-WiFi-Security

 

https://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

 

Zhao KQiang's curator insight, March 27, 2014 6:48 AM

one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&amp;amp;et_rid=454853272&amp;amp;linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

veracode-mobile-security-ebook.pdf

VERACODE: Mobile Security for the Rest of Us!
Get Our Fun New E-book

Join Joe IT and his blissfully unaware mobile device user Joe Worker as they navigate together the perils of BYOD. It’s a whimsical look at a serious subject and readers walk away with Ten Tips to secure their device.

 

Gust MEES: A MUST READ!       

 

Read more about VERACODE here:

http://www.veracode.com/

 

No comment yet.