WEBOLUTION!
Follow
Find tag "Learning basics of Cyber-Security"
5.1K views | +1 today
WEBOLUTION!
1960 to 2030, connected to internet!
Curated by Jimi Paradise
Your new post is loading...
Your new post is loading...
Rescooped by Jimi Paradise from E-Learning-Inclusivo (Mashup)
Scoop.it!

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic]

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic] | WEBOLUTION! | Scoop.it

Via Gust MEES, juandoming
more...
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Urgent action is needed in order to combat emerging cyber-attack trends — ENISA

Urgent action is needed in order to combat emerging cyber-attack trends — ENISA | WEBOLUTION! | Scoop.it
EU cyber security agency, ENISA, has today issued an information Flash Note, ‘Cyber attacks – a new edge for old weapons’ that analyses and tracks recent cyber attacks.

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 


Via Gust MEES
more...
Gust MEES's curator insight, April 5, 2013 11:53 AM

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 

Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, April 5, 2013 11:56 AM

 

The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).

 

Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Jimi Paradise from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

Spotflux - lets you connect to the internet freely, safely, and securely from anywhere in the world

Spotflux - lets you connect to the internet freely, safely, and securely from anywhere in the world | WEBOLUTION! | Scoop.it
Spotflux lets you connect to the internet freely, safely, and securely from anywhere in the world.

 

Whether at home, traveling, or on a public WiFi, spotflux encrypts and secures your connection and protects your privacy while browsing.

Spotflux continuously scans and protects your connection for inbound threats such as malware and viruses.

 


Via Gust MEES, ABroaderView
more...
Gust MEES's curator insight, January 24, 2013 12:34 PM

I will give it a try, soon and compare it to HotSpot Shield...

 

BTW: the program was published with a review in PC-World:

 

https://www.pcworld.com/article/257831/spotflux_guards_your_privacy_for_free.html

 

Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

Security Threats in 2013 - Check also for Mac Malware

Security Threats in 2013 - Check also for Mac Malware | WEBOLUTION! | Scoop.it

Read about the latest cyber security trends in the Sophos Security Threat Report 2013.

 

Most malware developers have found it more profitable to attack Windows than to learn new skills needed to target the smaller OS X user community.

 

===> But Macs are finding a new home in thousands of businesses and government agencies, and malware authors are paying attention. <===


Forrester Research analyst Frank Gillette recently reported that “almost half of enterprises (1,000 employees or more) are issuing Macs to at least some employees—and they plan a 52% increase in the number of Macs they issue in 2012.”

 

===> Even more Macs are arriving unofficially through bring your own device arrangements, where they are often an executive’s device of choice for accessing web or cloud applications. <===

 

===> Growing Mac usage means many IT organizations must objectively assess, mitigate, and anticipate Mac-related malware threats for the first time. And the risks are clearly increasing! <===

 

=============================================

 

Gust MEES

 

Check also my Curation about it:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 


=============================================

 

Read more, a MUST:

http://www.sophos.com/en-us/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf?id=ee65b697-1d30-4971-b240-ce96b5e529aa&amp;amp;amp;amp;dl=true

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

New QuickTime fixes a number of security vulnerabilities

New QuickTime fixes a number of security vulnerabilities | WEBOLUTION! | Scoop.it

New QuickTime fixes a number of security vulnerabilities!

 

                          ===> UPDATE asap! <===

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Google to Scan Third-party Android Applications On Devices

Google to Scan Third-party Android Applications On Devices | WEBOLUTION! | Scoop.it
According to reports, a new security feature in Android 4.2 will checks apps in real-time for malicious code.

 

Read more:

http://www.securityweek.com/google-scan-third-party-android-applications-devices?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

One in five data breaches are the result of cyberespionage, Verizon says

One in five data breaches are the result of cyberespionage, Verizon says | WEBOLUTION! | Scoop.it
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be...

Via Gust MEES
more...
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

ETHICS: Researcher uses botnet to map internet - vital public service, or cybercriminal dodginess? [POLL]

ETHICS: Researcher uses botnet to map internet - vital public service, or cybercriminal dodginess? [POLL] | WEBOLUTION! | Scoop.it
An anonymous researcher just published a paper that claims to have mapped out almost the entire internet for the first, and perhaps the last, time.

Thing is, he used a virus to create a giant bo...

Via Gust MEES
more...
Gust MEES's curator insight, March 25, 2013 1:19 PM

 

When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Ethics

 

Gust MEES's curator insight, March 25, 2013 1:24 PM

 

When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Ethics

 

Rescooped by Jimi Paradise from 21st Century Learning and Teaching
Scoop.it!

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says | WEBOLUTION! | Scoop.it
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch?

It's time to rip Java out of your browser for better securi...

Via Gust MEES
more...
Gust MEES's curator insight, January 19, 2013 12:46 PM

A MUST follow instructions!!!

 

Gust MEES's curator insight, January 20, 2013 9:05 AM

===> A MUST follow instructions!!! <===

 

 

Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...

 

Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Java-vulnerabilities

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

What is Cybersecurity? [PDF] from MIT

What is Cybersecurity?


Explorations in Automated Knowledge Generation

 

Nazli Choucri
Department of Political Science Massachusetts Institute of Technology

 

Gihan Daw Elbait
Masdar Institute of Science and Technology and Massachusetts Institute of Technology

 

Stuart Madnick
Sloan School of Management and Engineering Systems Division Massachusetts Institute of Technology

 

Download:

http://ecir.mit.edu/images/stories/Madnick%20et%20al%20Comparison%20Paper%20for%20ECIR%20workshop%20-%20Fig%201%20also%20FIXED%20v2.pdf

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from Social Media and its influence
Scoop.it!

Twitter user passwords reset after accounts breached

Twitter user passwords reset after accounts breached | WEBOLUTION! | Scoop.it
Many Twitter users are being warned to change their password after an unknown bug or hack has seen left some accounts with deleted tweets or scam-links posted to their feeds.

 

Is it a bird? Is it a plane? No, it's a password reset message from Twitter, and you should probably do what it says.

 

Read more, a MUST:

http://www.zdnet.com/twitter-user-passwords-reset-after-accounts-breached-7000007108/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jimi Paradise from ICT Security-Sécurité PC et Internet
Scoop.it!

10 Spooky Cyberattacks in 2012 [INFOGRAPHIC]

10 Spooky Cyberattacks in 2012 [INFOGRAPHIC] | WEBOLUTION! | Scoop.it
With big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there's a good chance you have fallen victim to a security breach this year.

 

It’s been a chilling year so far for web and mobile security. Cybercriminals continue to think of clever and sneaky ways to strip millions of consumers of credit card information and personal data, thanks largely in part to malicious links, phishing scams and password hacks.

 

The team at cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. And with big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there’s a good chance you or someone you know has fallen victim to a security breach.

 

Read more, a MUST:

http://mashable.com/2012/10/18/cyber-attacks-201/

 


Via Gust MEES
more...
No comment yet.