21st Century Learning and Teaching
586.8K views | +2 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: '2014', 'Learning IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

The programs with the most security vulnerabilities in 2014 | CyberSecurity

The programs with the most security vulnerabilities in 2014 | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.


Learn more on How-To protect (automatically):


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


Gust MEES's insight:
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.


Learn more on How-To protect (automatically):


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Most vulnerable operating systems and applications in 2014

Most vulnerable operating systems and applications in 2014 | 21st Century Learning and Teaching | Scoop.it

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.

#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.

To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):

  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:
.
.



Gust MEES's insight:

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched.IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Gust MEES's curator insight, February 22, 2015 7:08 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:


Scooped by Gust MEES
Scoop.it!

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity | 21st Century Learning and Teaching | Scoop.it
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Gust MEES's insight:
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity

Kaspersky Security Bulletin 2014/2015 – Statistik für das Jahr 2014 | Mac | Apple | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, December 10, 2014 1:29 PM

Im Jahr 2014 blockierten die Lösungen von Kaspersky Lab insgesamt 3.693.936 Infektionsversuche unter Mac OS X.

Die Experten von Kaspersky Lab entdeckten 1.499 neue Schadprogramme für Mac OS X, das sind 200 Schädlinge weniger als im entsprechenden Vorjahreszeitraum.


===> Jeder zweite Anwender von Apple-Produkten war einem Angriff ausgesetzt. <===


Im Laufe des Jahres war jeder Mac-OS-X-User durchschnittlich neunmal mit einer Cyberbedrohung für sein Betriebssystem konfrontiert.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | 21st Century Learning and Teaching | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

No comment yet.
Scooped by Gust MEES
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | 21st Century Learning and Teaching | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Gust MEES's insight:

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Octobre : le Mois européen de la cyber-sécurité - Cases

Octobre : le Mois européen de la cyber-sécurité -  Cases | 21st Century Learning and Teaching | Scoop.it
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  


Gust MEES's insight:
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de

développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  


No comment yet.
Scooped by Gust MEES
Scoop.it!

Public Private Partnerships in Network and Information Security Education — ENISA

Public Private Partnerships in Network and Information Security Education — ENISA | 21st Century Learning and Teaching | Scoop.it
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


Gust MEES's insight:
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Facing the future – making our online economy trustworthy, reliable and resilient | Cyber Security | EU | Europe

Facing the future – making our online economy trustworthy, reliable and resilient | Cyber Security | EU | Europe | 21st Century Learning and Teaching | Scoop.it

Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought | 21st Century Learning and Teaching | Scoop.it
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Scooped by Gust MEES
Scoop.it!

Evernote forum hacked, passwords could be exposed for some users

Evernote forum hacked, passwords could be exposed for some users | 21st Century Learning and Teaching | Scoop.it
Evernote's official discussion forum has suffered a security breach, which has allowed hackers to access user's profile information and password hashes.


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Has Been Hijacking the Botnets of Other Hackers

NSA Has Been Hijacking the Botnets of Other Hackers | 21st Century Learning and Teaching | Scoop.it
The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.
Gust MEES's insight:


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Gust MEES's curator insight, March 12, 2014 9:36 PM


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Scooped by Gust MEES
Scoop.it!

Emisoft Hacks Identity Theft Again | More Entry Points, More Tools, More Prevention | Part 2

Emisoft Hacks Identity Theft Again | More Entry Points, More Tools, More Prevention | Part 2 | 21st Century Learning and Teaching | Scoop.it
Extend your Anti-Malware knowledge base with Part Two of our series on Hacking Identity Theft, where Emsisoft gives you even more tools for malware prevention.
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

MacOS X, iOS und Linux gefährlicher als Windows | CyberSecurity | Awareness

MacOS X, iOS und Linux gefährlicher als Windows | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it
MacOS X, iOS und Linux waren im Jahr 2014 unsicherer als Windows. Ein Microsoft-Programm führt aber eine andere Top 10 an.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


Gust MEES's insight:
MacOS X, iOS und Linux waren im Jahr 2014 unsicherer als Windows. Ein Microsoft-Programm führt aber eine andere Top 10 an.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


No comment yet.
Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Scooped by Gust MEES
Scoop.it!

McAfee Threats Report | Q3-2014 | CyberSecurity | eSkills | eLeaderShip | Infographic

Gust MEES's insight:

McAfee Threats Report | Q3-2014 | #CyberSecurity | #eSkills | #eLeaderShip | #Infographic


No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

Gust MEES's insight:

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet of Things Conference - IoT World Forum 2014 - London M2M Barcelona UK

Internet of Things Conference - IoT World Forum 2014 - London M2M Barcelona UK | 21st Century Learning and Teaching | Scoop.it

Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Internet of Things Conference is the leading IoT World Forum 2014 as m2m conference in London Barcelona Europe UK as an IoT event and IoT exhibition, a global...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Carlos Rodrigues Cadre's curator insight, November 2, 2014 4:01 PM

adicionar a sua visão ...

Scooped by Gust MEES
Scoop.it!

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Gust MEES's insight:

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.
Scooped by Gust MEES
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

Gust MEES's insight:
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship | 21st Century Learning and Teaching | Scoop.it
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

H1 2014 Threat Report - F-Secure [Infographic]

H1 2014 Threat Report - F-Secure [Infographic] | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
Gust MEES's insight:

F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

National Cyber Security Awareness Month 2014 | Homeland Security

National Cyber Security Awareness Month 2014 | Homeland Security | 21st Century Learning and Teaching | Scoop.it
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity. Every Internet user has a role to play in securing cyberspace and ensuring the safety of ourselves, our families, and our communities online.


Learn more:


http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/


Gust MEES's insight:
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity. Every Internet user has a role to play in securing cyberspace and ensuring the safety of ourselves, our families, and our communities online.


Learn more:


http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | 21st Century Learning and Teaching | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's insight:


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 2014 11:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Scooped by Gust MEES
Scoop.it!

Emsisoft's Malwarelympics 2014 - Let the malware games begin!

Emsisoft's Malwarelympics 2014 - Let the malware games begin! | 21st Century Learning and Teaching | Scoop.it
Huge infographic: Which countries are most infected? Which malware spreads most? What are top malware categories? (It's not viruses!) What are the biggest botnets?
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=country