21st Century Tool...
Follow
Find tag "Cybersecurity"
72.2K views | +17 today
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit | 21st Century Tools for Teaching-People and Learners | Scoop.it
Share this news now.Share this news now.In a cybercrime ecosystem populated by commercially available WordPress brute-forcing and mass vulnerable WordPress installation scanning tools, cybercriminals continue actively capitalizing on the platform’s leading market share within the Content Management System’s market segment.


Successfully exploiting tens of thousands of installations on a daily basis, for the purpose of utilizing the legitimate infrastructure to achieve their fraudulent/malicious campaign objectives, the tactic is also largely driven by the over-supply of compromised/accounting data, usually embedded within sophisticated Web-based attack platforms like the ones we’ve profiled in the past.


We’ve recently intercepted a malicious campaign exclusively relying on rogue WordPress sites, ultimately serving client-side …Share this news now.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=WordPress-Security


more...
No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


more...
Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Scooped by Gust MEES
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | 21st Century Tools for Teaching-People and Learners | Scoop.it
OpenVPN - The Open Source VPN
Gust MEES's insight:

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

more...
Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | 21st Century Tools for Teaching-People and Learners | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | 21st Century Tools for Teaching-People and Learners | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Tools for Teaching-People and Learners | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments | 21st Century Tools for Teaching-People and Learners | Scoop.it
Imation’s portable USB desktops transform any computer into an IT-managed workstation, so workers can take all their data, applications and systems with them, securely and reliably.

 

 

 

 

 

Read more:

http://www.imation.com/en-EU/Mobile-Security/Mobile-Security-Products/Secure-Mobile-Workspace/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Video: The expanded threat landscape

Video: The expanded threat landscape | 21st Century Tools for Teaching-People and Learners | Scoop.it
SC Magazine has various news articles and information for IT security professionals.

 

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

How to create a BYOD policy

How to create a BYOD policy | 21st Century Tools for Teaching-People and Learners | Scoop.it
A BYOD policy can eliminate a lot of the problems associated with bring your own device programs. Learn best practices for creating a BYOD policy.

 

BYOD isn’t a synonym for “free for all.” Once an organization decides to let employees use their own mobile devices and PCs for work, it must put a BYOD policy in place to control this usage.

 

===> Requires Free Membership to View

 

 

more...
No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Malicious phone apps and how to avoid them

Malicious phone apps and how to avoid them | 21st Century Tools for Teaching-People and Learners | Scoop.it

Your phone goes everywhere with you. You keep it at your desk at work, near your bed when you sleep, and in your pocket during dinner. Many people use their phones for mobile banking, keeping in close touch with friends and family over Facebook and Twitter, and sending countless text messages about their daily lives. But do our phones deserve the trust we place in the security of all the information we're giving them?

 

If you choose your apps carefully and give out your personal information sparingly, you'll have no problem at all. But if you download everything and give out your name and address every time you can, you'll be making a huge mistake.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac users 'just as easily duped by cybercriminals' as Windows users

Mac users 'just as easily duped by cybercriminals' as Windows users | 21st Century Tools for Teaching-People and Learners | Scoop.it
In the face of new threats aimed at OS X, a security expert has warned that Mac users may be even more vulnerable than Windows users.

 

Because Windows users are more likely to be running up-to-date anti-virus programs, Graham Cluley of Sophos says that many Mac users are missing a "valuable safety net".

 

In the face of several new threats targeting Mac OS X that have been discovered in recent weeks, Mac users should make sure that they have some form of protection, Cluley said. However, keeping your computer safe from cybercriminals isn't just a case of having anti-virus programs installed - it's about making sensible choices as well.

 

As we have seen on the Windows platform, the majority of the attacks do not exploit any weakness in the operating system but instead take advantage of the bug in people's brains.

 

===> Mac users can be just as easily duped as their Windows cousins into making poor choices, and could end up infected as a result, Cluley told Macworld. <===

 

Use antivirus programs!

more...
No comment yet.