21st Century Learning and Teaching
586.7K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: '2014', 'IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

MacOS X, iOS und Linux gefährlicher als Windows | CyberSecurity | Awareness

MacOS X, iOS und Linux gefährlicher als Windows | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it
MacOS X, iOS und Linux waren im Jahr 2014 unsicherer als Windows. Ein Microsoft-Programm führt aber eine andere Top 10 an.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


Gust MEES's insight:
MacOS X, iOS und Linux waren im Jahr 2014 unsicherer als Windows. Ein Microsoft-Programm führt aber eine andere Top 10 an.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic on Data Breaches in the US in 2014 | CyberSecurity

Infographic on Data Breaches in the US in 2014 | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
The 27001 Academy has produced an informative infographic that illustrates key details of the nearly 800 reported data breaches in the U.S. that occurred in 2014 - up about 20% from 2013.

Surprisingly, despite the sharp increase in the number of breaches seen last year, the actual number of records that were compromised was down more than


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
The 27001 Academy has produced an informative infographic that illustrates key details of the nearly 800 reported data breaches in the U.S. that occurred in 2014 - up about 20% from 2013.

Surprisingly, despite the sharp increase in the number of breaches seen last year, the actual number of records that were compromised was down more than


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
Scoop.it!

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity | 21st Century Learning and Teaching | Scoop.it
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Gust MEES's insight:
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, December 10, 2014 1:29 PM

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

Gust MEES's insight:

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet of Things Conference - IoT World Forum 2014 - London M2M Barcelona UK

Internet of Things Conference - IoT World Forum 2014 - London M2M Barcelona UK | 21st Century Learning and Teaching | Scoop.it

Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Carlos Rodrigues Cadre's curator insight, November 2, 2014 4:01 PM

adicionar a sua visão ...

Scooped by Gust MEES
Scoop.it!

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Gust MEES's insight:

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.
Scooped by Gust MEES
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

Gust MEES's insight:
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship | 21st Century Learning and Teaching | Scoop.it
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

H1 2014 Threat Report - F-Secure [Infographic]

H1 2014 Threat Report - F-Secure [Infographic] | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
Gust MEES's insight:

F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee | 21st Century Learning and Teaching | Scoop.it
Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …
Gust MEES's insight:

Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …

No comment yet.
Scooped by Gust MEES
Scoop.it!

National Cyber Security Awareness Month 2014 | Homeland Security

National Cyber Security Awareness Month 2014 | Homeland Security | 21st Century Learning and Teaching | Scoop.it
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity. Every Internet user has a role to play in securing cyberspace and ensuring the safety of ourselves, our families, and our communities online.


Learn more:


http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/


Gust MEES's insight:
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity. Every Internet user has a role to play in securing cyberspace and ensuring the safety of ourselves, our families, and our communities online.


Learn more:


http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/


No comment yet.
Scooped by Gust MEES
Scoop.it!

European Cyber Security Month 2014 – get involved! — ENISA

European Cyber Security Month 2014 – get involved! — ENISA | 21st Century Learning and Teaching | Scoop.it
The European Cyber Security Month (ECSM) 2014 team is inviting public and private sector organisations interested in Network and Information Security to get involved in this year’s activities.
Gust MEES's insight:


The European Cyber Security Month (ECSM) 2014 team is inviting public and private sector organisations interested in Network and Information Security to get involved in this year’s activities.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Most vulnerable operating systems and applications in 2014

Most vulnerable operating systems and applications in 2014 | 21st Century Learning and Teaching | Scoop.it

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.

#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.

To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):

  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:
.
.



Gust MEES's insight:

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched.IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Gust MEES's curator insight, February 22, 2015 7:08 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:


Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Scooped by Gust MEES
Scoop.it!

McAfee Threats Report | Q3-2014 | CyberSecurity | eSkills | eLeaderShip | Infographic

Gust MEES's insight:

McAfee Threats Report | Q3-2014 | #CyberSecurity | #eSkills | #eLeaderShip | #Infographic


No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2014 | CyberSecurity | Predictions 2015 | EDUcation

Kaspersky Security Bulletin 2014 | CyberSecurity | Predictions 2015 | EDUcation | 21st Century Learning and Teaching | Scoop.it
Mac Attacks: OS X botnets

Despite efforts by Apple to lock down the Mac operating system, we continue to see malicious software being pushed via torrents and pirated software packages. The increasing popularity of Mac OS X devices is turning heads in the criminal world, making it more appealing to develop malware for this platform.

The increasing popularity of #MacOS X devices makes it more appealing to the #criminal world to develop #malware
Tweet
The closed-by-default ecosystem makes it harder for this malware to successfully take hold of the platform, but there remains a subsection of users who'll gladly disable Mac OS X security measures – especially people who use pirated software. This means that those looking to hijack OS X systems for a variety of reasons know that they simply need to bundle their malware with desirable software (probably in the form of a key generator) to enjoy widespread success.


Due to widespread beliefs about the security of the OS X platform, these systems are also unlikely to have an antimalware solution installed that will flag the infection so once the malware is installed, so it's likely to go unnoticed for a very long time.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
The closed-by-default ecosystem makes it harder for this malware to successfully take hold of the platform, but there remains a subsection of users who'll gladly disable Mac OS X security measures – especially people who use pirated software. This means that those looking to hijack OS X systems for a variety of reasons know that they simply need to bundle their malware with desirable software (probably in the form of a key generator) to enjoy widespread success.


Due to widespread beliefs about the security of the OS X platform, these systems are also unlikely to have an antimalware solution installed that will flag the infection so once the malware is installed, so it's likely to go unnoticed for a very long time.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


No comment yet.
Scooped by Gust MEES
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | 21st Century Learning and Teaching | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

No comment yet.
Scooped by Gust MEES
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | 21st Century Learning and Teaching | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Gust MEES's insight:

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Octobre : le Mois européen de la cyber-sécurité - Cases

Octobre : le Mois européen de la cyber-sécurité -  Cases | 21st Century Learning and Teaching | Scoop.it
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  


Gust MEES's insight:
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de

développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  


No comment yet.
Scooped by Gust MEES
Scoop.it!

Public Private Partnerships in Network and Information Security Education — ENISA

Public Private Partnerships in Network and Information Security Education — ENISA | 21st Century Learning and Teaching | Scoop.it
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


Gust MEES's insight:
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Facing the future – making our online economy trustworthy, reliable and resilient | Cyber Security | EU | Europe

Facing the future – making our online economy trustworthy, reliable and resilient | Cyber Security | EU | Europe | 21st Century Learning and Teaching | Scoop.it

Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Expert international cybercrime taskforce is launched to tackle online crime | Europol

Expert international cybercrime taskforce is launched to tackle online crime | Europol | 21st Century Learning and Teaching | Scoop.it
1 September 2014

Today the Joint Cybercrime Action Taskforce (J-CAT) is launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3) at Europol, the J-CAT, which is being piloted for six months, will coordinate international investigations with partners working side-by-side to take action against key cybercrime threats and top targets, such as underground forums and malware, including banking Trojans.  The J-CAT will be led by Andy Archibald, Deputy Director of the National Cyber Crime Unit from the UK’s National Crime Agency (NCA).


The J-CAT was initiated by Europol's EC3, the EU Cybercrime Taskforce, the FBI and the NCA, and the J-CAT comprises a team composed of Cyber Liaison Officers from committed and closely involved Member States, non-EU law enforcement partners and EC3. Key contributors to the intelligence pool will be the EU Member States via EC3, and other law enforcement cooperation partners. Thus far, Austria, Canada, Germany, France, Italy, the Netherlands, Spain, the UK and the US are part of the J-CAT. Australia and Colombia have also committed to the initiative.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Gust MEES's insight:

Expert international cybercrime taskforce is launched to tackle online crime | Europol


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Pauline Kershaw's curator insight, September 4, 2014 4:26 AM

The Internet has introduced a whole new range of criminal activity and therefore the police are having to develop ways to combat this. Read this story to see how this is being done.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought | 21st Century Learning and Teaching | Scoop.it
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Scooped by Gust MEES
Scoop.it!

Evernote forum hacked, passwords could be exposed for some users

Evernote forum hacked, passwords could be exposed for some users | 21st Century Learning and Teaching | Scoop.it
Evernote's official discussion forum has suffered a security breach, which has allowed hackers to access user's profile information and password hashes.


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


No comment yet.