21st Century Learning and Teaching
586.7K views | +2 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cybercrime...', 'Professional Development'. Clear
Scooped by Gust MEES
Scoop.it!

Bitcoin: The virtual currency built on math, hope and hype

Bitcoin: The virtual currency built on math, hope and hype | 21st Century Learning and Teaching | Scoop.it
Bitcoin's sharp rise in value this year has many questioning whether the virtual currency is sustainable in the long term
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Bitcoin

 

No comment yet.
Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

Hacked WordPress Site Hosts Thousands of Links to Pharmacy Scams

Hacked WordPress Site Hosts Thousands of Links to Pharmacy Scams | 21st Century Learning and Teaching | Scoop.it
The issue of hacked WordPress sites continues to persist, as evidenced by one victimized URL being used to host links to thousands if not millions or billions of shady pharmaceutical sites without the knowledge of the owners.

 

===> And, the team recommended the common-sense step of upgrading WordPress and all plugins to their latest versions. <===

 

Gust MEES's insight:

 

===> And, the team recommended the common-sense step of upgrading WordPress and all plugins to their latest versions. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress

 

Gust MEES's curator insight, December 11, 2013 6:35 PM

 

===> And, the team recommended the common-sense step of upgrading WordPress and all plugins to their latest versions. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress

 

Scooped by Gust MEES
Scoop.it!

What happens after a data breach? [Infographic]

What happens after a data breach? [Infographic] | 21st Century Learning and Teaching | Scoop.it
High profile data breaches that expose customer information are in the news. This graphic shows how the thieves sell the info and make their money.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Scooped by Gust MEES
Scoop.it!

More than 800,000 accounts compromised in MacRumors Forums breach

More than 800,000 accounts compromised in MacRumors Forums breach | 21st Century Learning and Teaching | Scoop.it
About 860,000 members who post on the forums of popular Apple news website MacRumors are being asked to change their passwords after accounts were compromised in a hack.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=MacRumors+Forum

 

Scooped by Gust MEES
Scoop.it!

Cybersecurity: Where are the Biggest Threats?

Cybersecurity: Where are the Biggest Threats? | 21st Century Learning and Teaching | Scoop.it
Cyber Crime: Identifying the Sources of an Everyday Threat Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

Why cybercriminals want your personal data

Why cybercriminals want your personal data | 21st Century Learning and Teaching | Scoop.it
Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve.

 

To better understand this crime, it helps to understand what personal data is worth to an identity thief. The average identity thief doesn’t steal data to use for him or herself. In most cases, they take the personal information and sell it on the online black market. It can be surprising what an individual’s personal information is worth.

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.

 

Gust MEES's insight:

 

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime...

 

Gust MEES's curator insight, November 12, 2013 10:06 AM

 

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime...

 

Scooped by Gust MEES
Scoop.it!

Botnet Enlists Firefox Users to Hack Web Sites

Botnet Enlists Firefox Users to Hack Web Sites | 21st Century Learning and Teaching | Scoop.it


The botnet, dubbed “Advanced Power” by its operators, appears to have been quietly working since at least May 2013. It’s not clear yet how the initial infection is being spread, but the malware enslaves PCs in a botnet that conducts SQL injection attacks on virtually any Web sites visited by the victim.


Gust MEES's insight:

 

The botnet, dubbed “Advanced Power” by its operators, appears to have been quietly working since at least May 2013. It’s not clear yet how the initial infection is being spread, but the malware enslaves PCs in a botnet that conducts SQL injection attacks on virtually any Web sites visited by the victim.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Deepweb and Cybercrime [pdf]

Gust MEES's insight:

 

A MUST READ!!!

 

Gust MEES's curator insight, November 25, 2013 2:59 AM

 

A MUST READ!!!


Scooped by Gust MEES
Scoop.it!

FBI warns hacking spree on government agencies is a “widespread problem”

FBI warns hacking spree on government agencies is a “widespread problem” | 21st Century Learning and Teaching | Scoop.it

The FBI is warning that members of the Anonymous hacking collective have breached computers belonging to multiple government agencies and made off with sensitive information in a series of attacks that started almost a year ago, according to a published report.

 

 

 

Hack linked to man who said: "You have no idea how much we can f*ck with the US."

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Instagram Scam That Tricked 100,000 Users Into Giving Away Passwords

The Instagram Scam That Tricked 100,000 Users Into Giving Away Passwords | 21st Century Learning and Teaching | Scoop.it
An app called InstLike promised free likes and followers on Instagram, but asked users to provide their usernames and passwords, turning them into a botnet.

 

Moreover, a user would get 20 free Likes if he used the hashtag #instlike_com in his own photo captions. A search on Instagram reveals that more than 500,000 photos already contain that hashtag.

 

All these features made InstLike a sophisticated ecosystem that employed thousands of voluntary "zombie" accounts — but it depended on their naiveté and willingness to give up their passwords.

 

For Narang, who is experienced in the realm of social media-based scams, the sheer volume of people involved is scary.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Instagram

 

Scooped by Gust MEES
Scoop.it!

Instagram Users Compromise Their Own Accounts for Likes

Instagram Users Compromise Their Own Accounts for Likes | 21st Century Learning and Teaching | Scoop.it
Symantec Security Response has discovered many Instagram users have willingly shared their usernames and passwords to a bot-like app in order to increase likes and followers.   (image1_15.png)

 

Symantec Security Response has discovered many Instagram users have willingly shared their usernames and passwords to a bot-like app in order to increase likes and followers.

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Gust MEES's insight:

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Gust MEES's curator insight, November 13, 2013 11:13 AM

 

Symantec advises users never share account credentials to any third party applications or services. Third party applications or services that require access to your account or information should use the legitimate APIs and authorization protocols (OAuth 2.0, for instance).

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: Cybercrime Goes Mobile

With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...
Gust MEES's insight:

A MUST see and Mac users ===> OPEN YOUR EYES!!!

 

Read also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BBC-Public-WiFi-Security

 

https://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

 

Zhao KQiang's curator insight, March 27, 2014 6:48 AM

one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful