C21 learning: ide...
Follow
Find tag "BYOD"
1.9K views | +0 today
C21 learning: ideas and tools for teachers
Curated by Jean Jacoby, Teaching Consultant (Online), Massey University
Curated by Jean Jacoby
Your new post is loading...
Your new post is loading...
Rescooped by Jean Jacoby from 21st Century Learning and Teaching
Scoop.it!

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses | C21 learning: ideas and tools for teachers | Scoop.it

Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware. The (sad) winner is Android/Plankton.B!tr, with a record prevalence of 4.42% (note: prevalence is the number of new hits in a given time frame divided by the number of fortigates reporting during that same interval of time).

 

This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…

 

===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===

 

 


Via Gust MEES
more...
Gust MEES's curator insight, July 31, 2013 3:22 PM

 

This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…

 

===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===

 
Rescooped by Jean Jacoby from 21st Century Tools for Teaching-People and Learners
Scoop.it!

The Innovative Educator: Considering BYOT / BYOD next year?

The Innovative Educator: Considering BYOT / BYOD next year? | C21 learning: ideas and tools for teachers | Scoop.it

Considering BYOT / BYOD next year? Get started with this sample policy & answers to FAQs

 

One of the best ways to prepare students to be prepared for the world is to help them use the tools of their world responsibly. Allowing students to bring their own devices is a terrific way to do just that, but even though some schools may have the wireless capacity and infrastructure, the admins / teachers may want to have a policy in place.

 

Below is the policy shared with me by Tim Clark who serves as the Coordinator of Instructional Technology for Forsyth County, GA Schools.

 

Read more:

http://theinnovativeeducator.blogspot.com/2012/05/considering-byot-byod-next-year-get.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jean Jacoby from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | C21 learning: ideas and tools for teachers | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


===> NOBODY is perfect! A security by 100% doesn’t exist! <===

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD