21st Century Tool...
Follow
Find tag "TrendMicro"
78.3K views | +1 today
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | 21st Century Tools for Teaching-People and Learners | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Gust MEES's insight:

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

more...
Gianfranco D'Aversa's curator insight, December 28, 2012 12:01 PM
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybercrime goes mobile

Cybercrime goes mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings.

 

Gust MEES: watch the video who explains in detail; very well explained...

http://www.net-security.org/secworld.php?id=13015

 

 

Check out also the available security tools :

http://www.scoop.it/t/ict-security-tools?q=mobile

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | 21st Century Tools for Teaching-People and Learners | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

more...
No comment yet.