21st Century Learning and Teaching
586.8K views | +20 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Privacy', 'mLearning'. Clear
Scooped by Gust MEES
Scoop.it!

Facebook's Android app leaks your mobile number, Symantec discovers

Facebook's Android app leaks your mobile number, Symantec discovers | 21st Century Learning and Teaching | Scoop.it
A discovery about Facebook's official Android app once again puts into question if the social network's developers truly *get* security and privacy.

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge:


Gust MEES's insight:

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge...


Gust MEES's curator insight, June 29, 2013 7:45 AM

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge...


AnnC's curator insight, June 30, 2013 9:35 PM

Beware Andriod users!  Will a vpn protect your info?

Scooped by Gust MEES
Scoop.it!

How much data privacy can you expect to have?

How much data privacy can you expect to have? | 21st Century Learning and Teaching | Scoop.it
Experts say that the social media technology and the ability for companies to harness our personal information is moving faster than the laws in place to protect our privacy.
Gust MEES's insight:

Privacy matters and it should ALSO get taught in schools!

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Privacy

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Privacy

 

Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Curious Case of Internet Privacy

The Curious Case of Internet Privacy | 21st Century Learning and Teaching | Scoop.it
Free services in exchange for personal information. That's the "privacy bargain" we all strike on the Web. It could be the worst deal ever.

 

technology review, published by MIT

 

A MUST read...:

http://www.technologyreview.com/news/428045/the-curious-case-of-internet-privacy/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Identity: Yes, that’s your security perimeter being reinvented

Identity: Yes, that’s your security perimeter being reinvented | 21st Century Learning and Teaching | Scoop.it
Clouds, mobile devices and distributed applications are smashing traditional enterprise security boundaries and identity is poised to help redefine a...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | 21st Century Learning and Teaching | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.


For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


Gust MEES's insight:

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:06 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Scooped by Gust MEES
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | 21st Century Learning and Teaching | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.
Gust MEES's insight:

A MUST have Infographic to understand the risks!!!

SHOULD be pinned in any schools!

 

Gust MEES's curator insight, February 4, 2013 8:32 AM

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Scooped by Gust MEES
Scoop.it!

Do You Know What Data Your Mobile App Discloses?

Do You Know What Data Your Mobile App Discloses? | 21st Century Learning and Teaching | Scoop.it
Using the Trend Micro mobile app reputation, we found out that several popular Android apps are susceptible to data leakage.

 

Gust MEES: a MUST READ for people who are using "Bring Your Own Device" (Hashtag on Twitter is #BYOD)!

 

 

 

 

Read more:

http://blog.trendmicro.com/do-you-know-what-data-your-mobile-app-discloses/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Q&A: What BYOD means for IT

Q&A: What BYOD means for IT | 21st Century Learning and Teaching | Scoop.it
ZDNet editor in chief Larry Dignan and TechRepublic editor in chief Jason Hiner answer user questions about the BYOD phenomenon in IT.

 

Read more...

 

No comment yet.