21st Century Learning and Teaching
586.8K views | +8 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'English', 'cybercrime'. Clear
Scooped by Gust MEES
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Gust MEES's insight:
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness 

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness  | 21st Century Learning and Teaching | Scoop.it
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity 

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum 

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum  | 21st Century Learning and Teaching | Scoop.it
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Gust MEES's insight:
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


Gust MEES's insight:
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


No comment yet.
Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Scooped by Gust MEES
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | 21st Century Learning and Teaching | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Biggest ever Tor raid hits 410 underground sites; 17 arrested

Biggest ever Tor raid hits 410 underground sites; 17 arrested | 21st Century Learning and Teaching | Scoop.it
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why cyber criminals are winning: The secret weapon of the black hats

Why cyber criminals are winning: The secret weapon of the black hats | 21st Century Learning and Teaching | Scoop.it
Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...
Gust MEES's insight:

Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Education: Remove The Limits

Cyber Security Education: Remove The Limits | 21st Century Learning and Teaching | Scoop.it
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen | 21st Century Learning and Teaching | Scoop.it
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Twitter Chat | The Economic Impact Of Cybercrime

Twitter Chat | The Economic Impact Of Cybercrime | 21st Century Learning and Teaching | Scoop.it
.   . Twitter Chat | The Economic Impact Of Cybercrime .   On Thursday, September 4th there will be #SecChat who will explore the  The Economic Impact Of Cybercrime and is an hour-long Tw...


Join as ===> lurkers <=== to learn from the experts!


Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security | The Economic Impact Of Cybercrime [pdf]

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates 

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates  | 21st Century Learning and Teaching | Scoop.it

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

Gust MEES's insight:

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

Gust MEES's insight:

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic | 21st Century Learning and Teaching | Scoop.it
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
“There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


Gust MEES's insight:
There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


No comment yet.
Scooped by Gust MEES
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.
Gust MEES's insight:

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Willem Kuypers's curator insight, January 21, 2015 2:54 AM

Le vidéo vaut la peine. Nous allons entrer dans la histoire comme la génération qui a inventé internet. Mais selon le spécialiste, nous avons créé un monstre. 

Dimonekene Ditutala's curator insight, January 21, 2015 8:33 AM

A nice and very important trends analysis.

Polly A. Sheppard's curator insight, January 23, 2015 6:00 PM

This really gives you something to think about!

Scooped by Gust MEES
Scoop.it!

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms".


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms".

No comment yet.
Scooped by Gust MEES
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | 21st Century Learning and Teaching | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Gust MEES's insight:

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.

Scooped by Gust MEES
Scoop.it!

Who Costs the Company More? Employees or Cybercriminals?

Who Costs the Company More? Employees or Cybercriminals? | 21st Century Learning and Teaching | Scoop.it
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why you’re not as secure as you think you are

Why you’re not as secure as you think you are | 21st Century Learning and Teaching | Scoop.it
There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time and time again, we see these companies fail to effectively protect sensitive customer data.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


No comment yet.
Scooped by Gust MEES
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee | 21st Century Learning and Teaching | Scoop.it
Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …
Gust MEES's insight:

Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …

No comment yet.