21st Century Learning and Teaching
586.8K views | +1 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Android', 'Mobile-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT | 21st Century Learning and Teaching | Scoop.it
Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.
Gust MEES's insight:

Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Apache Cordova Vulnerability: 10% of Android Banking Apps Vulnerable

Apache Cordova Vulnerability: 10% of Android Banking Apps Vulnerable | 21st Century Learning and Teaching | Scoop.it
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Gust MEES's insight:

The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | 21st Century Learning and Teaching | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's insight:

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&et_rid=454853272&linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Une belle faille de sécurité Android concerne un milliard de terminaux

Une belle faille de sécurité Android concerne un milliard de terminaux | 21st Century Learning and Teaching | Scoop.it

Le mécanisme de mise à jour d’Android souffre d’une importante faille de sécurité. Selon une étude menée à l’université de l’Indiana et chez Microsoft Research, plusieurs vulnérabilités critiques existent au sein du système de permissions gérant les nombreuses versions de l’OS mobile.


En faisant croire qu'elle avait jusque-là tous les droits, une application malveillante pourrait, après la mise à jour, accéder à toutes les données personnelles.


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


Gust MEES's insight:


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android | 21st Century Learning and Teaching | Scoop.it

F-Secure Labs Mobile Threat Report for Q4 2013 is out and it’s clear that the most popular smartphone operating system is also the leading target for online criminals.

94% of all mobile malware the F-Secure Response Labs analyzed in Q4  targets Google’s Android platform.

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is: The more current, the better.

Gust MEES's insight:

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is:

 

===> The more current, the better. <===

 

No comment yet.