compaTIC
Follow
Find tag "IT-Security"
5.1K views | +0 today
compaTIC
Un lugar para compartir temas de Educación y Nuevas Tecnologías
Your new post is loading...
Your new post is loading...
Rescooped by Graciela Morales from 21st Century Learning and Teaching
Scoop.it!

Mobile Phone Safety For Kids

Mobile Phone Safety For Kids | compaTIC | Scoop.it

We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/06/mobile-phone-safety-for-kids/

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Graciela Morales from 21st Century Learning and Teaching
Scoop.it!

Critical Security Fixes from Adobe, Microsoft

Critical Security Fixes from Adobe, Microsoft | compaTIC | Scoop.it

Adobe and Microsoft each issued security updates today to fix critical vulnerabilities in their software. Adobe’s fixes include a patch for a Flash Player flaw that is actively being exploited to break into Windows computers. Microsoft’s Patch Tuesday release includes nine patch bundles — more than half of them rated critical — addressing at least 27 security holes in Windows and related software.

 

Nevertheless, the underlying vulnerability being targeted exists in Windows, Mac and Linux versions of the software. Windows and Mac users can grab the latest version (v. 11.3.300.271) via the Flash Player download center.

 

Be sure to uncheck the “free” software scans that Adobe loves to bundle with updates, such as McAfee‘s obnoxious Security Scan Plus, if you don’t want it. Linux users should update to v. 11.2.202.238, and Chrome users want to be at v. 11.3.330.270 (normally Chrome auto-updates Flash, but recently it’s been sluggish to do so: my Chrome installation is still at v. 11.3.31.225. I will update this post in a bit with the direct links to the Flash Player downloads.

 

Read more, a MUST for any "OS":

 

http://krebsonsecurity.com/2012/08/critical-security-fixes-from-adobe-microsoft/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Graciela Morales from 21st Century Learning and Teaching
Scoop.it!

Mobile Devices: The Gateway for Hackers to Your Digital Identity

Mobile Devices: The Gateway for Hackers to Your Digital Identity | compaTIC | Scoop.it

While it is widely understood that mobile devices are more than just phones – they are a lifeline to the outside world, entertainment platform, GPS system, little black book and a shopping and banking tool – it’s lesser known that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone.


Hackers can use your mobile device as an access point to data that have historically been exclusively stored to your laptop or desktop, such as social network and bank accounts. One of the most harmful (and popular) mobile threats has to do with apps. Installing apps from unknown or untrusted sources like apps outside the official Google Play Market could allow hackers to steal sensitive and private information stored on your mobile device including passwords, photos, contacts and location data.

 

=============================================

 

Gust MEES

 

Critical Thinking: "While it is widely understood that mobile devices are more than just phones", really!?? Most people still think that it is ONLY a phone, but in reality it is a mini computer with phone capabilities! And any computer is vulnerable and at risk!!!

 

Check out also:

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Especially check the video under this topic "Ever thought about that your smartphone is also a computer with phone capabilities?" to understand!

 

=============================================

 

Read more, a MUST:

http://blogs.mcafee.com/consumer/mobile-devices-the-gateway-for-hackers-to-your-digital-identity?utm_source=twitterfeed&utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Graciela Morales from 21st Century Learning and Teaching
Scoop.it!

10 BYOT / BYOD Back to School Basics

10 BYOT / BYOD Back to School Basics | compaTIC | Scoop.it

Gone are the days where students sit neatly in rows all prepared with the same back to school supplies ready to consume instruction. As the 2012/13 school year approaches, one thing is clear. One-size-fits-all is out and personalization is in. This doesn’t only apply to the classroom instruction, it also applies to the mobile devices your students choose to use for learning.

 

===> Today student choice = personalization. The teacher sets the learning goals, but students choose their own tools or learning. <===

 

Gust MEES: Don't forget about IT-Security and be aware of the malware! "Nobody is Perfect!", so ALL "OS" are vulnerable and especially smartphones and any other device connecting to Internet also! And there are also a lot of Apps around who are malicious...

 

===> Take care and as teacher and educator take your ===> responsibilities <=== to educate your learners of the dangers of Internet and How-To protect best! <===

 

In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER!

 

So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!

 

As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!

 

It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!

 

Check also:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

  

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

  

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

  

- http://www.scoop.it/t/ict-security-tools

  

- http://www.scoop.it/t/securite-pc-et-internet

 

 

                         ===> Be aware of the malware! <===

 


Via Gust MEES
more...
EdTechSandyK's comment, August 3, 2012 12:13 PM
When I rescooped your post, I did not realize I was erasing someone else's comments. I thought I was just cleaning up extra-text that had been auto-inserted at some point. I was also concerned that there was a malware warning included in what I thought was auto-generated text; I did not want to keep links with the post that might spread malware.

I am still learning about the ins and outs of ScoopIt; it is unfortunate that you jumped immediately to the conclusion that I was censoring you because that was not my intention. Per your request, I will remove the re-scoop post my topic, since I now understand the comments were inserted by a user but do not want to share links that might include malware. Thank you for contacting me. I apologize for my unintended offense.
Gust MEES's comment, August 3, 2012 12:18 PM
Hi Sandy,

OK, everything alright now. My apologies for having reacted also that way, but when it is about Censorship of my own text...

Concerning "malware", You don't have to fear about my links, just have a look at my profile on the bottom of my free IT-Security courses (links above in the text) and You will understand that they are secure ;)

Have a great day,
Gust
Gust MEES's comment, August 3, 2012 12:25 PM
Hi Sandy,

It is important that learners get told how to protect their BYOD-Devices and to know also about the dangers with it. So that's why I included thta special text with links. When now someone makes a rescoop of your "rescooped" censored #scoopit then it would:

1.) Not include my original text with advice and links
2.) Other people who will "rescoop" from your #scoopit will also not get that important knoledge

Have a great day,
Gust