Many users don't take steps to protect themselves and their data on their smartphones and tablets.
When it comes to keeping their mobile devices safe and secure, consumers are playing a game of cat-and-mouse with cybercriminals.
Although most users are aware that mobile devices can be hacked, just as desktops or laptops can, many still don't take steps to protect themselves and the data on their smartphones and tablets, according to a study released Wednesday at the CTIA conference in Las Vegas.
Laut einer Studie von NQ Mobile hat sich die Anzahl der Malware 2012 gegenüber 2011 verdreifacht. Im vergangenen Jahr gab es über 65.000 Schadprogramme.
With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...
one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful
Sheryl Sandberg confirms Facebook's commitment to keeping people safe online with support for the joint declaration today between the European Commission and US Department of Homeland Security.
=============================================
Gust MEES
Check out ALSO
My curation about "World efforts for a more secure Internet":
Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.
A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.
Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.
===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===
Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future.
The pilot stage of the program will begin with eight (ISC)2 chapters around the world and be rolled out across the organization in early 2013. It is specifically designed to attract more young people to the information security field, whether they are still in secondary school, recently graduated from university or new to the workforce.
It is open to aspiring and active cyber security professionals age 35 and under who are looking for ways to bolster their careers and deepen their connections to the professional community.
The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).
After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under ½ of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.
Organizations that do not invest in security education for their employees put themselves at risk.
Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!
Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:
National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene” . Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.
Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.
The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.
Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)
Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):
“BYOD is top of mind for myriad organisations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organisations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”
In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations. For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.
Gust MEES: a MUST read for anyone who uses "Bring Your Own Device" (Hashtag for Twitter =#BYOD):
Bring your own device (BYOD) has become increasingly more prevalent in businesses with over 71% of companies planning, tolerating or supporting its infiltration into normal corporate work practices, according to an infograph published by Matrix 42. According to the below infograph the most common devices being utilised by employees via BYOD for work are laptops, PDA’s, mobile devices, and tablet computers.
Simon Loughran one of Certification Europe’s leading ISO 27001 – Information Security Management Systems auditors published a paper called ‘Security and Mobile Devices’ on this topic recently. The paper identified one of the largest risk associated with the usage of BYOD devices such as mobile devices is inherent with their portability and that is precisely the intended functionality. Advanced technological changes allow people to work outside the corporate networks on wireless and remote connectivity, which in turn facilitates easily accessible and shareable company information. This creates a new risk area for companies as it has moved outside of the established security perimeter that has been so meticulously developed.
The solution is to develop subsequent selected security controls around the mobile devices and BYOD devices which are as stringent as those employed around company devices.
The Matrix 42 infograph was developed after the company completed a survey of 600 enterprise IT professionals and was published via Visual.ly.
Mozilla releases Firefox 14 and encrypts Google searches by default
Adds improved mouse recognition in games By Lawrence Latif Tue Jul 17 2012, 16:00
SOFTWARE DEVELOPER Mozilla has released Firefox 14 for desktop operating systems. Mozilla's Firefox web browser has received its six-week update with Firefox 14 automatically encrypting Google searches and supporting the Pointer Lock API. Mozilla has also included support for fullscreen mode in Mac OS X 10.7.
Mozilla said it encrypts Google search data by default, adding that users can now easily verify the identity of a web site by clicking on an icon to the left of the URL. According to Mozilla, the addition of search encryption is particularly handy for those using Firefox on wireless connections.
Gust MEES: I will include in the future also updates for your browsers as for e-Learning IT-Security is a MUST!!! So, update your browsers, please. Check out also my free courses about IT-Security to be sure that your devices for e-Learning are updated:
Bring-Your-Own-Device (BYOD) schemes have become increasingly prevalent in most businesses worldwide, as employees look to use their own personal devices in a business context. When asked if employees valued certain devices over others, 89 per cent of those surveyed claimed this was the case.
“Rather than fight against the tide, organizations should embrace the use of these devices and work alongside staff to ensure that comprehensive IT policies and best practice guidelines are put in place to assist and inform employees about how their devices should be used. End-point protection for these devices is also crucial if businesses want to safeguard employees against an ever-changing, increasingly sophisticated threat landscape.”
Why (And How) Teachers Should Start Learning and Teaching Cyber-Security . What should get be taught and learned more in the 21st Century while using ICT?
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
Gust MEES's insight:
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
===============================================
There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.
What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
===============================================
There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.
What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.
Researchers uncover faulty encryption in apps available in Google's Play Market.
Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found.
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.
Gust MEES
Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!
Die Internetseite www.handysektor.de ist ein werbefreies Informationsangebot für Jugendliche. Die sichere Nutzung von WLAN, Mobiltelefon, Notebook, Game Konsole, Bluetooth steht dabei im Vordergrund.
Coalfire recently conducted a survey on the BYOD to work trend. The findings reveal many companies are not discussing mobile device cybersecurity issues with their employees and lack policies to protect sensitive company data.
The survey was conducted last month among 400 individuals in a variety of industries across North America that do not work in IT departments.
“The BYOD trend is not slowing down, and while it has many benefits, it’s also introducing a number of new security risks that may be foreign to many companies,” said Rick Dakin, CEO and chief security strategist with Coalfire.
===> “The results of this survey demonstrate that companies must do much more to protect their critical infrastructure as employees work from their own mobile devices, such as tablets and smartphones, in the workplace. Companies need to have security and education policies in place that protect company data on personal devices.” <===
One-quarter of the 30,156 websites tested in the second quarter by Zscaler’s Zulu service, which tests the security of websites, were malicious, according to Zscaler’s second quarter 2012 State of the Web report.
The State of the Web report found that users are slow to update browser plug-ins and attackers know it, as witnessed by the Flashback Trojan, which infected over 650,000 Macs leveraging a Java vulnerability. However, the situation is improving. In the second quarter, 35% of installed Adobe Shockwave plug-ins were outdated, down from 52% in the fourth quarter of 2011.
Adobe Acrobat was the worst in terms of updating, with close to 62% of plug-ins being outdated in the second quarter, followed by Adobe Shockwave with 38%, Microsoft Outlook with 5.7%, and Adobe Flash with 4.3%.
===> “Outdated plug-ins are vulnerable to exploitation, and the bad guys know that”, Geide observed. <===
Gust MEES: "Learning to Learn" ===> While using e-Learning we use mostly Internet and so we have also to learn the basics of IT-Security!
Check also my FREE courses about basic knowledge of IT-Security:
In 21st Century we need not ONLY talking about Internet-Safety, Online-Safety and IT-Security, but we need to secure our computers and ANY other related device connecting to Internet, such as also our smartphones! I will present you now a tutorial on How-To create best protection (as on March 2012) for your computer and this with mostly FREE tools and FREE Online Services…
Also will I provide you a worksheet which helps you planning your weekly tasks!
In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER! So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!
As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!
It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!
Symantec helps consumers and organizations secure and manage their information-driven world.
However, IT departments tasked with keeping company networks and sensitive data safe are still struggling to get a handle on mobility. According to the same survey, mobility ranks as the leading IT risk among organizations, that includes being perceived as more risky than virtualization and even public cloud computing.
===> Device loss, data breach and mobile malware are some of the chief concerns. And these concerns are not unfounded. For the 12 month period leading up to the survey, the average cost of enterprise losses associated with mobility was $429,000. <===
To help enterprises take full advantage of mobility while also mitigating the very real risks associated with it, Symantec has built the strongest mobile security and management product portfolio available. Today, we announced significant updates to this portfolio that enhance our already industry-leading capabilities in mobile device management, mobile application management and mobile threat protection.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.
Learn more:
- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security
- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security