Better teaching, ...
Follow
Find tag "Learning basics of Cyber-Security"
21.1K views | +0 today
Better teaching, more learning
Your new post is loading...
Your new post is loading...
Rescooped by Gianfranco D'Aversa from ICT Security-Sécurité PC et Internet
Scoop.it!

An Introduction to Cyber Intelligence - The State of Security

An Introduction to Cyber Intelligence - The State of Security | Better teaching, more learning | Scoop.it
This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer at Utica College, I teach graduate students in the M.S.

 

The first is the definition of intelligence:

The product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations.The activities that result in the product.The organizations engaged in such activities.


Via Gust MEES
more...
Gust MEES's curator insight, January 18, 2014 10:33 AM

 

A MUST READ!!!

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

XSS Flaw in WordPress Plugin Allows Injection of Malicious Code

XSS Flaw in WordPress Plugin Allows Injection of Malicious Code | Better teaching, more learning | Scoop.it
A security vulnerability in the WP Banners Lite plugin for WordPress sites allows an attacker to inject malicious html or javascript code.

Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Malware attack recovery costs an average of $3,000 per day

Malware attack recovery costs an average of $3,000 per day | Better teaching, more learning | Scoop.it
Organizations citing cybersecurity costs as an impediment to implementing a layered defense should rethink their priorities: Denial of service (DDoS) and malware infection recovery costs range into the thousands of dollars – per day.

Via Gust MEES
more...
Gust MEES's curator insight, March 15, 2013 5:37 PM

 

A MUST read...

 

Gust MEES's curator insight, March 15, 2013 5:41 PM

 

==> Malware attack recovery costs an average of $3,000 per day <==

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Webmasters help for hacked sites – Google

Webmasters help for hacked sites – Google | Better teaching, more learning | Scoop.it

Unfortunately, it’s likely your site was hacked.Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner. For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions. 

In this first step, we explain how and why hacks happen, and review options for recovery.

 

Read further in the article...

 


Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from UpTo12-Learning
Scoop.it!

eSafetyKit

eSafetyKit | Better teaching, more learning | Scoop.it
Safer internet/eSafety

Via Gust MEES
more...
Philippe Trebaul's curator insight, February 27, 2013 3:02 PM
eSafetyKit

Safer Internet / eSafety


eSafetyKit via @knolinfos http://sco.lt/...

Gust MEES's curator insight, February 27, 2013 3:35 PM

Check it out and teach the kids!

 

Schreib-Lounge's curator insight, February 28, 2013 1:54 AM

esaftey-Kit in diversen Sprachen: Franzöisch, Flämisch, Spanisch ...

Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Better teaching, more learning | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 6:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Hacked Sites – An Open Door To Malwares

Hacked Sites – An Open Door To Malwares | Better teaching, more learning | Scoop.it

Compromised websites have been an attractive target for cyber-criminals. These websites distribute different malwares designed to steal valuable information from the victim’s machine. McAfee has recently encountered a compromised website which distributes malicious .jar file and Fake AV.

 


Via Gust MEES
Gianfranco D'Aversa's insight:

Compromised websites have been an attractive target for cyber-criminals. These websites distribute different malwares designed to steal valuable information from the victim’s machine. McAfee has recently encountered a compromised website which distributes malicious .jar file and Fake AV.

more...
Gust MEES's curator insight, December 24, 2012 2:55 PM

 

As with e-Learning, m-Learning and BYOD (Bring Your Own Device) every one is visiting websites, so this should be of interest to anyone! Especially Education, Teachers, Educators, Instructors, Professors SHOULD be aware of this and accept the fact that Learning and Teaching basics of Cyber-Security in 21st Century is a MUST!

 

                 ===> Be AWARE of the MALWARE! <===


Check also my other FREE courses here:


-http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Better teaching, more learning | Scoop.it

Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gianfranco D'Aversa's insight:
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

more...
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Elementary Internet Safety Instruction

Elementary Internet Safety Instruction | Better teaching, more learning | Scoop.it

 

Gust MEES:

 

Don't forget that in the 21st Century "Internet-Safety alone" isn't enough anymore, learn also basics of IT-Security / Cyber-Security. Protect your children by learning these easy steps to follow:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/   ( en français )

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

                            ===> Be aware of the malware! <===

 

 


Via EdTechSandyK, Gust MEES
more...
No comment yet.
Rescooped by Gianfranco D'Aversa from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

MacRumors fears user database was hacked

MacRumors fears user database was hacked | Better teaching, more learning | Scoop.it
Subscribers to the MacRumors user forums have been advised to change their passwords because of a suspected data breach after the site was hacked.

 

Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.

 


Via Gust MEES
more...
Gust MEES's curator insight, November 13, 2013 9:28 AM


Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, November 13, 2013 9:32 AM

 

Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Data breaches in higher education

Data breaches in higher education | Better teaching, more learning | Scoop.it

TeamSHATTER reports on data breaches in the higher education vertical throughout the United States.

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.


Via Gust MEES
more...
Gust MEES's curator insight, March 18, 2013 12:29 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

 

Gust MEES's curator insight, March 18, 2013 12:35 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | Better teaching, more learning | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Cyber-Hygiene: ICT Hygiene for Population, Education and Business | Better teaching, more learning | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for Internet's future! . ===> "Nothing in life is to be feared. It is only to be...

Via Gust MEES
more...
Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Better teaching, more learning | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 6:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Determining What Calls Home - Learning about Privacy / Security

Determining What Calls Home - Learning about Privacy / Security | Better teaching, more learning | Scoop.it
I've done some thinking about computer security and privacy over the past while.  It's been precipitated by conversations with Gust Mees.  It's good thinking. We're all in the same boat.  Just thin...

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 8:33 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!

 

Gust MEES's curator insight, February 3, 2013 8:38 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Gust MEES's curator insight, February 3, 2013 8:39 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Rescooped by Gianfranco D'Aversa from 21st Century Learning and Teaching
Scoop.it!

Top 12 Security Slideshows of 2012

Top 12 Security Slideshows of 2012 | Better teaching, more learning | Scoop.it

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.


Via Gust MEES
Gianfranco D'Aversa's insight:

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

more...
Gust MEES's curator insight, December 24, 2012 10:21 AM

 

                 ===> Be AWARE of the MALWARE! <===

Check also my other FREE courses here:

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Rescooped by Gianfranco D'Aversa from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Better teaching, more learning | Scoop.it

Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
more...
No comment yet.