Information #Secu...
Follow
Find tag "English"
46.0K views | +121 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Internet Safety | Good Practice Guides - www.saferinternet.org via @knolinfos

#Internet Safety | Good Practice Guides - www.saferinternet.org via @knolinfos | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Learn more:


http://gustmees.wordpress.com/2014/03/19/only-internet-safety-and-no-cyber-security-education-in-schools/



Via Gust MEES
more...
Gust MEES's curator insight, August 8, 9:37 AM

Learn more:


http://gustmees.wordpress.com/2014/03/19/only-internet-safety-and-no-cyber-security-education-in-schools/


Ivo Kleber's curator insight, August 9, 8:27 AM

Internet Safety | Good Practice Guides - www.saferinternet.or<wbr></wbr>g

Sue Gaardboe's curator insight, August 10, 2:46 AM

This made me think about not just how we as teachers feel about technology use in schools, but also, how do our students feel about it? We know many of them know more about how to use the technology than we do, so are we involving them in the decisions we make about use and purchase of technology...or are we doing what we've always done and assumed we know better than they do?

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

10 sites with stunning visual data that will change your world view | #Privacy

10 sites with stunning visual data that will change your world view | #Privacy | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
We all know what a picture's worth. These websites use graphics to display everything from Twitter traffic to births and deaths, in ways that truly drive home what words alone cannot.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
more...
ewarta geo's curator insight, July 9, 6:28 AM

Very interesting sites. Shows the differences in every country from the trending twitter topics to even the amount of computer hacks.

Cliensol Energy's comment, July 10, 7:47 AM
De nada :D
Lina Heaster-Ekholm's curator insight, July 10, 1:35 PM

Not sure it changed my world view, but does provide links to some interesting resources

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:




Via Gust MEES
more...
Gust MEES's curator insight, April 17, 7:55 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 8:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Future of the Internet of Things [infographic]

The Future of the Internet of Things [infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Ever wonder why Google is installing extreamly fast gigabit internet infrastructure when the average person needs 200x less speed? It is because of the future of the Internet of Things. In less than 10 years, the internet will not just be for your phone or laptop, everything will be online.

I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.

Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.

I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:





Via Gust MEES
more...
Gust MEES's curator insight, March 26, 7:05 AM


I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.


Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.


I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:


Rescooped by Frederic GOUTH from Best Freeware Software
Scoop.it!

#Junkware Removal Tool Download

#Junkware Removal Tool Download | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it


Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.



Via Gust MEES
more...
Gust MEES's curator insight, February 4, 2:52 AM


A great tool...


173 Sud's curator insight, February 4, 6:15 AM


Junkware Removal Tool va vous aider à supprimer l'ensemble des logiciels indésirables tels que Ask Toolbar, Babylon, Browser Manager ou bien encore MyWebSearch et qui s'installe discrètement sur votre navigateur web. Pour cela rien de plus simple il vous suffit de lancer le programme Junkware Removal Tool et de fermer l'ensemble des navigateurs en cours d'utilisation. Attendez quelques minutes et le tour est joué.


Entièrement gratuit ce petit utilitaire est compatible avec les versions récentes de Windows.


Jean Claude Le Tellier's curator insight, February 7, 4:34 AM

A good one to keep in the toolbox!

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

What Is Web 3.0 And How Will It Change Education?

What Is Web 3.0 And How Will It Change Education? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
We'll reach a new state of web skills when we reinvent technology tools to better enhance our personal learning. We'll be at 3.0 when schools are everywhere and not viewed as daycare.

Via Gust MEES
more...
congerjan's curator insight, February 4, 5:57 AM

Personal learning is the key for growing kids who innovate!

Maria Richards's curator insight, March 29, 1:41 PM

change is constant and inevitable! Might as well embrace it!

Antonis Michailidis's curator insight, April 26, 2:44 AM

Για την ενημέρωσή μας.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Scammers in a Wi-Fi Wonderland

Scammers in a Wi-Fi Wonderland | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

You’d better watch out, you’d better not cry—you’d better not use that public Wi-Fi. The holiday season is upon us and in addition to more flash sales, baked goods, and travel time—this meansmore online scams. A recent survey of American travelers revealed that the majority of us are not taking measures to protect ourselves when using public Wi-Fi. Numerous forms of malware can be delivered over unsecured connections, so when traveling for the holidays you’re more vulnerable than ever to a cyber break in.

 

That’s why on the road, in the air, or otherwise on the go this holiday season, it’s more important than ever that you watch where you connect.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Great !! LEGO Digital Designer 4.3.8

Great !! LEGO Digital Designer 4.3.8 | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Get your kids to design LEGO models

Via Gust MEES
more...
Pippa Davies @PippaDavies 's curator insight, December 10, 2013 8:58 AM

Many of my students love this tool and it can be used for fine arts as well!  

Pippa Davies @PippaDavies 's curator insight, December 10, 2013 9:00 AM

Design and play all mixed in together to make learning fun and exciting!  Five stars for this design oriented game which your male students will love!

J Weidenbenner's curator insight, January 3, 6:05 AM

Legos for learning, anyone?

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Junkware Removal Tool

Junkware Removal Tool | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.


Via Gust MEES
more...
Gust MEES's curator insight, November 9, 2013 8:50 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

 

Gust MEES's curator insight, November 9, 2013 8:54 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

Rescooped by Frederic GOUTH from Social Media and its influence
Scoop.it!

Twitter plans to encrypt its direct messaging service

Twitter plans to encrypt its direct messaging service | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
As a result of the growing NSA revelations, the social microblogging site is upping its defenses by planning to encrypt its direct messaging Service.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 5:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 7:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 8:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

7 Project Manager Personalities-Which Are YOU? [Infographic]

7 Project Manager Personalities-Which Are YOU? [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, August 12, 2013 6:45 AM

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=project-based-learning

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=PBL

 

Diane Goodman's curator insight, August 12, 2013 4:53 PM

Interesting infographic that maps 7 different approaches to leading a team or project

MURIEL LESELBAUM's curator insight, August 13, 2013 2:06 AM

Les typologies ont toujours du succès… pourquoi pas ?

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Excellent !! How Hackable Is Your Car? Consult This Handy Chart

Excellent !! How Hackable Is Your Car? Consult This Handy Chart | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



Via Gust MEES
more...
Gust MEES's curator insight, August 6, 1:29 PM
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

#Ransomware 101: FAQ for computer and #smartphone owners

#Ransomware 101: FAQ for computer and #smartphone owners | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

What is ransomware?
Ransomware is the generic term for any malicious software that, as its name suggests, demands a ransom be paid by the computer’s user.

Why would you want to pay a ransom?
Because the ransomware has done something unpleasant to your computer, and potentially to your data.

.

For instance, it might have encrypted your documents and demanded that you pay a ransom to unlock access to them. This type of ransomware is known as a filecoder.

.

The most notorious filecoder is Cryptolocker. (Numerous versions of this are detected by ESET antivirus products as Win32/Filecoder).

.

Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.

.

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Metadata is surveillance: my online metadata actually reveals where I’ve been

#Metadata is surveillance: my online metadata actually reveals where I’ve been | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In an attempt to simulate the NSA's capability, Ars tracks its own editor for 11 days.


“Facebook knows if you hit any page that has a Like button it,” he said. “Same with TweetThis, unless the site goes out of the way to mask them, then these are specifically reporting them to social networks. This is why NSA loves it, is because they can go along for the ride.

.

“One thing that we know that the NSA does on their non-US wiretaps is bind usernames to cookies so if you see a request for LinkedIn or YouTube or Yahoo, these are all sites that have user ID in the clear, all you need to do is see a request, and say I don't know who this is or I know who this is, but then you look at the HTML body and look for the username. This is why the NSA went after Google ad networks, include user identification [broadcast] in the clear: ‘I am person X at this location.’

.

Despite the vast amount of data, it's just as easy to store as it is to interpret. “It works out to only a few kilobytes per person for everyone on the planet,” Weaver added. In other words, if I had the access, it'd cost just a few thousand dollars to have enough consumer-grade storage to keep data on everyone in the United States. It would comfortably fit on my desk.



Via Gust MEES
more...
smadar yona's curator insight, March 31, 12:32 PM

במתכונת האח הגדול?

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

How to Delete Yourself from the #Internet [Infographic] #Privacy #CNIL

How to Delete Yourself from the #Internet [Infographic] #Privacy #CNIL | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Ready to erase your tracks and disappear online, once and for all? This infographic from Who Is Hosting This reveals the nine steps you need to take to remove your personal information collected all over the web.

Via Gust MEES
more...
Marc Kneepkens's curator insight, March 8, 5:25 AM

It's amazing how much information is out there about you. Have you ever Googled yourself?

There may be many reasons for 'deleting' your online presence, or parts of it. This is good information.

Carol Rine's curator insight, March 8, 6:18 AM

How to Disappear Online !

Vilma Galstaun's curator insight, March 13, 3:50 PM

Some sites to be aware of where you have an online presence.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

You’re Being Watched Online [Infographic]

You’re Being Watched Online [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Yes, everything you do online is being tracked. Your searches, the videos you watch, transactions, social events, even crime. Scandalous crimes. With a little help, especially with our guides, you're still able to remain anonymous on the Internet. But understanding how you're being tracked is an important lesson, as are the little things you can…

Via Gust MEES
more...
ANA's curator insight, January 31, 8:39 AM

whta happens while you are on-line? interesting to think about

Darius Douglass's curator insight, January 31, 11:48 AM

Interesting and something to consider

Francisco Pontes Estevan's curator insight, February 2, 2:14 AM

Sí, todo lo que haces en línea es rastreado. Tus búsquedas,  los videos que miras, tus transacciones electronicas, todas las paginas que visitas...etc.  Entender cómo te están siguiendo es una lección importante para aprender las cosas que puedes hacer para mantener minimamente tu privacidad.

Rescooped by Frederic GOUTH from 21st Century Tools for Teaching-People and Learners
Scoop.it!

7 Fabulous iPad Apps to Create Short Animated Lessons for Your Flipped Classroom

7 Fabulous iPad Apps to Create Short Animated Lessons for Your Flipped Classroom | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
John Rudkin's curator insight, January 16, 12:29 AM

Great choice.....

Gilles Le Page's curator insight, January 18, 11:41 PM

outils Ipad

Karine Thonnard's curator insight, January 21, 5:59 AM

add your insight...

 
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Google’s Location History Browser Is A Minute-By-Minute Map Of Your Life

Google’s Location History Browser Is A Minute-By-Minute Map Of Your Life | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Quick! Where were you last Tuesday at 6:35 PM? If you’re anything like me, your answer is probably along the lines of “I… have absolutely no idea.”..

 

But odds are, Google knows. They probably know where you’ve been most other days, too. And they’ll happily show you, letting you relive your life one step at a time.

 

If you carry any Google-filled gear (like, say, an Android phone or tablet), there was a prompt during the initial setup that asked if Google could transmit your location data back to the mothership. This is that data. You know how Google Now can auto-magically figure out where you work and warn you about traffic?

 

This is the data that makes that possible (or at least a good chunk of it.)


Via Gust MEES
more...
Gust MEES's curator insight, December 19, 2013 1:11 PM

But odds are, Google knows. They probably know where you’ve been most other days, too. And they’ll happily show you, letting you relive your life one step at a time.

 

If you carry any Google-filled gear (like, say, an Android phone or tablet), there was a prompt during the initial setup that asked if Google could transmit your location data back to the mothership.

 

This is that data.

 

You know how Google Now can auto-magically figure out where you work and warn you about traffic?

 

This is the data that makes that possible (or at least a good chunk of it.)

 

Learn more:

 

 - http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 8:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 8:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Frederic GOUTH from 21st Century Tools for Teaching-People and Learners
Scoop.it!

8 free tools for creating infographics

8 free tools for creating infographics | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Don't have hours to spare crafting something beautiful in Photoshop? Sarah James of The Infographic Design Company selects 8 tools that won't cost you a penny...

Via Gust MEES
more...
David Duncan's curator insight, November 29, 2013 8:49 AM

Here are some great aids if you are thinking of creating infographics

Elena Orlova's curator insight, November 30, 2013 6:32 PM

8 инструментов для создания инфографики

Alison Rostetter's curator insight, December 30, 2013 10:25 AM

I've never made one of these before but it looks like it might be fun to try out on a wintry night.

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Cyber Arms Race: Mikko Hypponen at TEDxBrussels

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Complete Visual Guide To Technology For Children [Infographic]

The Complete Visual Guide To Technology For Children [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
This handy visual guide explores technology use by young children. How much and what do they use, and is it appropriate?

Via Gust MEES
more...
Paul's curator insight, October 13, 2013 6:16 AM

Great infographic - we always me to consider the human element when we integrate technology into the classroom.

AnnC's curator insight, October 13, 2013 4:37 PM

Lots of great information addressing access to and use of technology by children!

Jonathan Climas's curator insight, October 13, 2013 5:16 PM

I love visuals! This works well to show how we can integrate technology with school and kids. 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...