Better teaching, more learning
22.6K views | +0 today
Follow
Better teaching, more learning
Your new post is loading...
Your new post is loading...
Rescooped by Gianfranco D'Aversa from ICT Security-Sécurité PC et Internet
Scoop.it!

An Introduction to Cyber Intelligence - The State of Security

An Introduction to Cyber Intelligence - The State of Security | Better teaching, more learning | Scoop.it
This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer at Utica College, I teach graduate students in the M.S.

 

The first is the definition of intelligence:

The product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations.The activities that result in the product.The organizations engaged in such activities.


Via Gust MEES
more...
Gust MEES's curator insight, January 18, 2014 3:33 PM

 

A MUST READ!!!

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Data breaches in higher education

Data breaches in higher education | Better teaching, more learning | Scoop.it

TeamSHATTER reports on data breaches in the higher education vertical throughout the United States.

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.


Via Gust MEES
more...
Gust MEES's curator insight, March 18, 2013 4:29 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

 

Gust MEES's curator insight, March 18, 2013 4:35 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | Better teaching, more learning | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Cyber-Hygiene: ICT Hygiene for Population, Education and Business | Better teaching, more learning | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for Internet's future! . ===> "Nothing in life is to be feared. It is only to be...

Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Better teaching, more learning | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 11:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 11:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 11:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Hacked Sites – An Open Door To Malwares

Hacked Sites – An Open Door To Malwares | Better teaching, more learning | Scoop.it

Compromised websites have been an attractive target for cyber-criminals. These websites distribute different malwares designed to steal valuable information from the victim’s machine. McAfee has recently encountered a compromised website which distributes malicious .jar file and Fake AV.

 


Via Gust MEES
Gianfranco D'Aversa's insight:

Compromised websites have been an attractive target for cyber-criminals. These websites distribute different malwares designed to steal valuable information from the victim’s machine. McAfee has recently encountered a compromised website which distributes malicious .jar file and Fake AV.

more...
Gust MEES's curator insight, December 24, 2012 7:55 PM

 

As with e-Learning, m-Learning and BYOD (Bring Your Own Device) every one is visiting websites, so this should be of interest to anyone! Especially Education, Teachers, Educators, Instructors, Professors SHOULD be aware of this and accept the fact that Learning and Teaching basics of Cyber-Security in 21st Century is a MUST!

 

                 ===> Be AWARE of the MALWARE! <===


Check also my other FREE courses here:


-http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Better teaching, more learning | Scoop.it

Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gianfranco D'Aversa's insight:
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

more...
Gust MEES's curator insight, December 23, 2012 4:09 PM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Elementary Internet Safety Instruction

Elementary Internet Safety Instruction | Better teaching, more learning | Scoop.it

 

Gust MEES:

 

Don't forget that in the 21st Century "Internet-Safety alone" isn't enough anymore, learn also basics of IT-Security / Cyber-Security. Protect your children by learning these easy steps to follow:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/   ( en français )

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

                            ===> Be aware of the malware! <===

 

 


Via EdTechSandyK, Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

#Learning basics of #cybersecurity: Information-October 2012 Global Threats

#Learning basics of #cybersecurity: Information-October 2012 Global Threats | Better teaching, more learning | Scoop.it

We determined the cyber criminal activity across the globe in this map that features a roundup of securityrelated news in the October issue of SC Magazine.

 

Read more, a MUST:

http://www.scmagazine.com/october-2012-global-threats/slideshow/965/#0

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Keep Your Children Safe Online

Keep Your Children Safe Online | Better teaching, more learning | Scoop.it

Online gaming used to be an activity confined to dimly lit arcades, but it can now be enjoyed by anyone and everyone.

A MUST read for parents and teachers:

http://about-threats.trendmicro.com/ebooks/keep-your-children-safe-online/#/1/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Encryption on your HD: How to Break Into a Windows PC, easy without...

Encryption on your HD: How to Break Into a Windows PC, easy without... | Better teaching, more learning | Scoop.it

If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinster plan—you have quite a few options.

 

Gust MEES: Encryption of your HD is a MUST!

 

Read more why...:

http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets | Better teaching, more learning | Scoop.it
My classroom is ‘ungraded.’  Want to know one of the biggest mis-perceptions out there?  That grades equal learning.   I didn’t realize it until someone blatantly insinuated that my students were j...

 

 

 

 

 

 

 

Interesting read...:

http://inquiryblog.wordpress.com/2012/10/07/know-them-know-their-learning/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

How to Be always Secured on Facebook [Infographic]

How to Be always Secured on Facebook [Infographic] | Better teaching, more learning | Scoop.it

Infographics on Facebook Security Guide to stay away from Spam and Hacking in Social Networking world with Facebook Spamming Apps with Implementing Security...

 

Read more, a MUST:

http://allinfographics.org/how-to-be-always-secured-on-facebook-a-to-z-security-guide/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

MacRumors fears user database was hacked

MacRumors fears user database was hacked | Better teaching, more learning | Scoop.it
Subscribers to the MacRumors user forums have been advised to change their passwords because of a suspected data breach after the site was hacked.

 

Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.

 


Via Gust MEES
more...
Gust MEES's curator insight, November 13, 2013 2:28 PM


Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, November 13, 2013 2:32 PM

 

Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Malware attack recovery costs an average of $3,000 per day

Malware attack recovery costs an average of $3,000 per day | Better teaching, more learning | Scoop.it
Organizations citing cybersecurity costs as an impediment to implementing a layered defense should rethink their priorities: Denial of service (DDoS) and malware infection recovery costs range into the thousands of dollars – per day.

Via Gust MEES
more...
Gust MEES's curator insight, March 15, 2013 9:37 PM

 

A MUST read...

 

Gust MEES's curator insight, March 15, 2013 9:41 PM

 

==> Malware attack recovery costs an average of $3,000 per day <==

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Webmasters help for hacked sites – Google

Webmasters help for hacked sites – Google | Better teaching, more learning | Scoop.it

Unfortunately, it’s likely your site was hacked.Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner. For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions. 

In this first step, we explain how and why hacks happen, and review options for recovery.

 

Read further in the article...

 


Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Better teaching, more learning | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 11:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 11:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 11:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Determining What Calls Home - Learning about Privacy / Security

Determining What Calls Home - Learning about Privacy / Security | Better teaching, more learning | Scoop.it
I've done some thinking about computer security and privacy over the past while.  It's been precipitated by conversations with Gust Mees.  It's good thinking. We're all in the same boat.  Just thin...

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 1:33 PM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!

 

Gust MEES's curator insight, February 3, 2013 1:38 PM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Gust MEES's curator insight, February 3, 2013 1:39 PM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Top 12 Security Slideshows of 2012

Top 12 Security Slideshows of 2012 | Better teaching, more learning | Scoop.it

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.


Via Gust MEES
Gianfranco D'Aversa's insight:

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

more...
Gust MEES's curator insight, December 24, 2012 3:21 PM

 

                 ===> Be AWARE of the MALWARE! <===

Check also my other FREE courses here:

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Learning basics of IT-Security: A day in the life of IT security

Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...

 

=============================================

 

Gust MEES

Read also my FREE courses here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

=============================================

 


Via Gust MEES
more...
Melf's curator insight, April 18, 2014 2:13 PM

Here you see some facts about how companies lack in security.

Some points like file sharing and getting worms are a really big issue. If there is no protection against that the company may be in danger. If all people have about 3 devices and they arent protected, you cant stop this.

Melf's curator insight, April 25, 2014 2:02 PM

I think that people should pay more attention to this because there are more victims every day. Not only persons but also companies could get trouble with not paying attention to your data.

Melf's curator insight, April 25, 2014 2:07 PM

Im very afraid of losing data myself. I saw a commercial once that someone took over the identity of another person. I hope that people pay more attention and try to be more safe in the future.

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

The Role of Cryptography - Part 1

The topic delves into Cryptography in some detail. It is taken from one of the 5 day courses created by InfoSec Skills - CISMP - "The Certificate in Informat...


Via Frederic GOUTH, Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

InternetSafety for Kids & Families

InternetSafety for Kids & Families | Better teaching, more learning | Scoop.it

In an age when everyone can author or share information to a mass audience almost instantly, it is more critical than ever to develop and sharpen our ability to discern the credible from the implausible things we see online.


There are many purveyors of false or biased information on the Internet – a company seductively advertising the effectiveness of its weight loss product, a politically-motivated organization hoping to persuade you to vote for their cause, a hacker attempting to fool you into clicking on something that infects your computer with malicious software.


Thankfully, among the mounds of information we find online, there is also the credible and the safe. It’s a good habit to have and teach others how to figure out which is which. I believe the skill to do this is made up of 2 basic things: information literacy and information security.

==========================================

 

Gust MEES

 

Concerning "Information Security", please read my FREE courses here (easy to follow):

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/  (Secure surfing-Part1)

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/   (Secure surfing-Part2)

 

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

===========================================

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

3 easy steps to a more secure iPhone or iPad

3 easy steps to a more secure iPhone or iPad | Better teaching, more learning | Scoop.it

Apple's iOS has several weak spots that can instill a false sense of security -- unless you take these steps to fix them... Read more, a MUST:

http://www.infoworld.com/d/mobile-technology/3-easy-steps-more-secure-iphone-or-ipad-204930

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

"Education is the way to reduce cyber risks" | eLearning

"Education is the way to reduce cyber risks" | eLearning | Better teaching, more learning | Scoop.it

October is the European Cyber Security Month. The goal is to raise awareness about cyber risks. Among all internet users, children are one of the most vulnerable groups. Phil Banyard, Reader in Psychology at Nottingham Trent University has been researching on how schools in UK deal with those risks.

 

Read more, a MUST:

http://elearningeuropa.info/en/news/quoteducation-way-reduce-cyber-risksquot

 


Via Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

E-Safety – the role for educators

E-Safety – the role for educators | Better teaching, more learning | Scoop.it

The Network Information Security in Education, 2012 report by the European Network and Information Security Agency outlines the role educators can play in teaching positive and responsible online behaviour to students.

 

The report stresses the importance of not making assumptions about children’s knowledge on e-Safety issues due to the many misconceptions which exist about appropriate use of the Internet. Issues which educators are likely to be aware of, such as keeping passwords secure and not downloading copyright material, may be viewed quite differently by students. Many teenagers share passwords with each other as a sign of true friendship and many see internet content as public property and download music, videos and images without a thought of the legal issues of copyright.


Via Gust MEES
more...
Gianfranco D'Aversa's comment, September 26, 2012 2:37 PM
Ok Gust! I'm sorry for the mistake.
Gianfranco D'Aversa's comment, September 26, 2012 2:38 PM
Ok Gust. I'm sorry for the mistake :(
Gust MEES's comment, September 26, 2012 5:18 PM
Hi Gianfranco, no problem. It happens also sometimes to me, don't worry ;) When I make a typo error I am always happy when somebody else reports it to me... Have a great day :)