WEBOLUTION!
Follow
Find tag "Cybersecurity"
5.1K views | +0 today
WEBOLUTION!
1960 to 2030, connected to internet!
Curated by Jimi Paradise
Your new post is loading...
Your new post is loading...
Rescooped by Jimi Paradise from E-Learning-Inclusivo (Mashup)
Scoop.it!

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic]

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic] | WEBOLUTION! | Scoop.it

Via Gust MEES, juandoming
more...
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Urgent action is needed in order to combat emerging cyber-attack trends — ENISA

Urgent action is needed in order to combat emerging cyber-attack trends — ENISA | WEBOLUTION! | Scoop.it
EU cyber security agency, ENISA, has today issued an information Flash Note, ‘Cyber attacks – a new edge for old weapons’ that analyses and tracks recent cyber attacks.

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 


Via Gust MEES
more...
Gust MEES's curator insight, April 5, 2013 8:53 AM

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 

Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, April 5, 2013 8:56 AM

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 

Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Jimi Paradise from 21st Century Learning and Teaching
Scoop.it!

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says | WEBOLUTION! | Scoop.it
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch?

It's time to rip Java out of your browser for better securi...

Via Gust MEES
more...
Gust MEES's curator insight, January 19, 2013 9:46 AM

A MUST follow instructions!!!

 

Gust MEES's curator insight, January 20, 2013 6:05 AM

===> A MUST follow instructions!!! <===

 

 

Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...

 

Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Java-vulnerabilities

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

Rescooped by Jimi Paradise from Social Media and its influence
Scoop.it!

Twitter user passwords reset after accounts breached

Twitter user passwords reset after accounts breached | WEBOLUTION! | Scoop.it
Many Twitter users are being warned to change their password after an unknown bug or hack has seen left some accounts with deleted tweets or scam-links posted to their feeds.

 

Is it a bird? Is it a plane? No, it's a password reset message from Twitter, and you should probably do what it says.

 

Read more, a MUST:

http://www.zdnet.com/twitter-user-passwords-reset-after-accounts-breached-7000007108/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

10 Spooky Cyberattacks in 2012 [INFOGRAPHIC]

10 Spooky Cyberattacks in 2012 [INFOGRAPHIC] | WEBOLUTION! | Scoop.it
With big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there's a good chance you have fallen victim to a security breach this year.

 

It’s been a chilling year so far for web and mobile security. Cybercriminals continue to think of clever and sneaky ways to strip millions of consumers of credit card information and personal data, thanks largely in part to malicious links, phishing scams and password hacks.

 

The team at cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. And with big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there’s a good chance you or someone you know has fallen victim to a security breach.

 

Read more, a MUST:

http://mashable.com/2012/10/18/cyber-attacks-201/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Apple and Amazon Hacks: How to Minimize Your Risk

Apple and Amazon Hacks: How to Minimize Your Risk | WEBOLUTION! | Scoop.it
A Gizmodo writer was the victim of an epic hack. Here's what you can do to avoid the same fate.

 

 

 

Read more:

http://www.pcworld.com/article/260511/apple_and_amazon_hacks_how_to_minimize_your_risk.html#tk.hp_new

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécurité : Apple a donné trop facilement accès à un compte iCloud

Sécurité : Apple a donné trop facilement accès à un compte iCloud | WEBOLUTION! | Scoop.it
L'affaire a fait grand bruit ce week-end : vendredi, Mat Honan, journaliste chez Wired a perdu les données personnelles sur son iPhone, iPad et son Mac.

 

En savoir plus :

http://www.macgeneration.com/news/voir/254122/securite-apple-a-donne-trop-facilement-acces-a-un-compte-icloud

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

One in five data breaches are the result of cyberespionage, Verizon says

One in five data breaches are the result of cyberespionage, Verizon says | WEBOLUTION! | Scoop.it
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be...

Via Gust MEES
more...
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

ETHICS: Researcher uses botnet to map internet - vital public service, or cybercriminal dodginess? [POLL]

ETHICS: Researcher uses botnet to map internet - vital public service, or cybercriminal dodginess? [POLL] | WEBOLUTION! | Scoop.it
An anonymous researcher just published a paper that claims to have mapped out almost the entire internet for the first, and perhaps the last, time.

Thing is, he used a virus to create a giant bo...

Via Gust MEES
more...
Gust MEES's curator insight, March 25, 2013 10:19 AM

 

When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Ethics

 

Gust MEES's curator insight, March 25, 2013 10:24 AM

 

When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Ethics

 

Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

What is Cybersecurity? [PDF] from MIT

What is Cybersecurity?


Explorations in Automated Knowledge Generation

 

Nazli Choucri
Department of Political Science Massachusetts Institute of Technology

 

Gihan Daw Elbait
Masdar Institute of Science and Technology and Massachusetts Institute of Technology

 

Stuart Madnick
Sloan School of Management and Engineering Systems Division Massachusetts Institute of Technology

 

Download:

http://ecir.mit.edu/images/stories/Madnick%20et%20al%20Comparison%20Paper%20for%20ECIR%20workshop%20-%20Fig%201%20also%20FIXED%20v2.pdf

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Google to Scan Third-party Android Applications On Devices

Google to Scan Third-party Android Applications On Devices | WEBOLUTION! | Scoop.it
According to reports, a new security feature in Android 4.2 will checks apps in real-time for malicious code.

 

Read more:

http://www.securityweek.com/google-scan-third-party-android-applications-devices?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

First European Cyber Security Month going well

First European Cyber Security Month going well | WEBOLUTION! | Scoop.it
Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide. In addition, a special Security Month awareness event has taken place every two days in one of the participating countries.

 

Read more:

http://www.net-security.org/secworld.php?id=13805

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers Identify Four BlackBerry Zitmo Variants

Researchers Identify Four BlackBerry Zitmo Variants | WEBOLUTION! | Scoop.it
Security researcher Denis Maslennikov identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. The samples were three .cod files and one .jar file with a .cod file inside.

 

Security researchers have identified new Zeus samples targeting Android and BlackBerry devices.

 

Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as Kaspersky Lab recently analyzed four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy, Denis Maslennikov, a researcher at Kaspersky Lab wrote on the company's Securelist blog. These variants were communicating with two command-and-control cell phone numbers associated with a Swedish mobile operator.

 

Read more:

http://www.securityweek.com/researchers-identify-four-blackberry-zitmo-variants

 


Via Gust MEES
more...
No comment yet.