21st Century Learning and Teaching
586.7K views | +11 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'cybercrime', 'eSkills'. Clear
Scooped by Gust MEES
Scoop.it!

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness 

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness  | 21st Century Learning and Teaching | Scoop.it
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.
Gust MEES's insight:

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Willem Kuypers's curator insight, January 21, 2015 2:54 AM

Le vidéo vaut la peine. Nous allons entrer dans la histoire comme la génération qui a inventé internet. Mais selon le spécialiste, nous avons créé un monstre. 

Dimonekene Ditutala's curator insight, January 21, 2015 8:33 AM

A nice and very important trends analysis.

Polly A. Sheppard's curator insight, January 23, 2015 6:00 PM

This really gives you something to think about!

Scooped by Gust MEES
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | 21st Century Learning and Teaching | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Gust MEES's insight:

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.

Scooped by Gust MEES
Scoop.it!

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
“There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


Gust MEES's insight:
There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


Gust MEES's insight:
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime: What does it mean? | ICT | CyberSecurity

Cybercrime: What does it mean? | ICT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

|Explore different types of cybercrime with this collection of animated videos.

Gust MEES's insight:

Explore different types of cybercrime with this collection of animated videos.


Scooped by Gust MEES
Scoop.it!

Biggest ever Tor raid hits 410 underground sites; 17 arrested

Biggest ever Tor raid hits 410 underground sites; 17 arrested | 21st Century Learning and Teaching | Scoop.it
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.