TEFL & Ed Tech
Follow
Find tag "Cybersecurity"
19.0K views | +0 today
TEFL & Ed Tech
English language, linguistics, teaching resources, teaching tips, educational technology, foreign language learning
Curated by Evdokia Roka
Your new post is loading...
Your new post is loading...
Rescooped by Evdokia Roka from ICT Security-Sécurité PC et Internet
Scoop.it!

Tip of the week: How to protect yourself from cryptoware

Tip of the week: How to protect yourself from cryptoware | TEFL & Ed Tech | Scoop.it

What do you do if your files are encrypted but Kaspersky Internet Security is not installed? Use our free utilities and regain access to your files:

RakhniDecryptorXoristDecryptorRectorDecryptor
Via Gust MEES
more...
Gust MEES's curator insight, October 4, 11:21 AM

What do you do if your files are encrypted but Kaspersky Internet Security is not installed? Use our free utilities and regain access to your files:


Pierre-André Fontaine's curator insight, October 4, 1:44 PM

ajouter votre point de vue ...

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

How hackers use Wi-Fi to steal your passwords

How hackers use Wi-Fi to steal your passwords | TEFL & Ed Tech | Scoop.it
Using Wi-Fi hotspots they set up, hackers can obtain your passwords and gain access to your sensitive information. Here’s how it works what you can do to prevent it.

Via Gust MEES
more...
Gust MEES's curator insight, January 21, 12:20 PM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Julia da Silva's curator insight, January 21, 1:32 PM

Check this out .

Scott Lewis's curator insight, January 22, 2:24 PM

I have said for a long time that WiFi Hotspots are not a secure place to do anything online that you would not want exposed to the general public. This being online banking, online shopping, viewing your corporate email account, etc. being just a few. 

 

With free online tools available on the Internet, it has become very easy for an attacker to view the information that you are entering into your computer from a free Wifi hotspot. These WiFi hotspots may be very handy, but not very secure.

 

The article above will show you a couple of ways that you can protect you and your computer if you travel frequently and use these hotspots. I want you to stay protected. 

 

Stay safe out there!

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

Which is the most popular antivirus software?

Which is the most popular antivirus software? | TEFL & Ed Tech | Scoop.it
Using a data set consisting of 120,000 data points, researchers from OPSWAT estimate that Avast is the market share leader in the antivirus software market.

 

Gust MEES:

 

1.) IT-Security, Internet-Safety, Online-Safety, Cyber-Security are a need and a MUST for 21st Century Teaching and Learning! That's why this article is mentioned in this Topic!!!

 

2.) other companies not mentioned should perhaps make more efforts on "Social Media" and get more "social" as well to be present on main PC Magazines + Mac Magazines for a better marketing of their products! Critical Thinking, sorry ;) Learn that the customer doesn't need to go to you, but that YOU should go to the customer ;)

 

Read more:

http://www.zdnet.com/blog/security/which-is-the-most-popular-antivirus-software/12608

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

New site offers a whole new approach to online safety | eSchool News

New site offers a whole new approach to online safety | eSchool News | TEFL & Ed Tech | Scoop.it
While schools are right in teaching students about the dangers that exist online, a new website aims to promote the benefits of internet use—as well as bridge the generational gap in online use and knowledge between youth and their teachers and...

 

Gust MEES: A very good approach which I agree too, but the need of learning IT-Security is still there and a MUST!

 

Critical-Thinking: Existing problems don't go away with a makeup ;) Internet will not look more sexy after that, sorry...

 

Protect your computer and you protect ALSO the community on Internet, check my free courses to learn more:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

 

 

-  http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

 

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from Social Media and its influence
Scoop.it!

How to improve your Twitter security and privacy

How to improve your Twitter security and privacy | TEFL & Ed Tech | Scoop.it
We don't lump Twitter in the same privacy bracket as, say, Facebook. But like any social network, Twitter is vulnerable to oversharing, data leakage and unintended consequences. We take a look at T...

Via Gust MEES
more...
Gust MEES's curator insight, August 30, 5:41 AM

We don't lump Twitter in the same privacy bracket as, say, Facebook. But like any social network, Twitter is vulnerable to oversharing, data leakage and unintended consequences. We take a look at T...


Pamela Perry King's curator insight, December 3, 10:34 AM

Don't share your toothbrush!

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

For BYOD Best Practices, Secure Data, Not Devices

For BYOD Best Practices, Secure Data, Not Devices | TEFL & Ed Tech | Scoop.it

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

 

Read more, very interesting...:

http://trap.it/KpeRhS

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

Five IT security threats and how to combat them

Five IT security threats and how to combat them | TEFL & Ed Tech | Scoop.it

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the heat.

 

Organizations traditionally have had only two options to address identity and access management:

 

1. Internal excessive privilege - System Administrators with complete access to servers and data can pose a tremendous internal threat if they turn against the company. Similarly, everyone from admins up to executives poses a threat to security and data if they maintain excessive access rights after changing positions or taking on different roles.

 

2. Third party access - Giving partners and other third parties appropriate access to data is no longer cut and dried. Data stored in the cloud may be located across the country or overseas—or sit on physical servers owned by one vendor, but housed in facilities owned by any number of data centers. Employees of these third parties often have direct access to unencrypted data, or they may retain copies of both encrypted or unencrypted data.

 

3. Hacktivism - Politically motivated hacking is on the rise. Members of various groups assert that much of their success comes not from their technical expertise, but from having found easy targets. While an organization may not have control over whether or not it is attacked, effective identity and access management strategies and technologies, and basic employee security training, will reduce the chances that attacks will succeed.

 

4. Social engineering - Social engineering is the age-old technique of using lies, deception and manipulation to gain sufficient knowledge to dupe an unwary employee or company. Using public social channels to detail every aspect of your upcoming “unplugged” vacation trip may be just what a scammer needs to put an attack in motion.

 

5. Internal negligence - Negligence typically is an offense committed by management when “they should have known better.” Most successful data security breaches have some element of managerial negligence associated with them, such as simply forgetting to check log reports for clearly suspicious patterns.

 

Gust MEES: A MUST READ for Education and Business!

 

Read more:

http://www.net-security.org/secworld.php?id=13084&utm_source=dlvr.it&utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.