#Security #InfoSe...
Follow
Find tag "eCitizen"
84.8K views | +100 today
#Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence
All About #Security #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Security: #Protect your #teens: 7 apps and websites parents should be aware of

#Security: #Protect your #teens: 7 apps and websites parents should be aware of | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Teens and tweens are heading in droves to apps and social platforms where they can't bump into their dads. Here are 7 apps and websites you need to be aware of.

Via Gust MEES
more...
Gust MEES's curator insight, June 25, 5:50 PM

Teens and tweens are heading in droves to apps and social platforms where they can't bump into their dads. Here are 7 apps and websites you need to be aware of.


Filipe Cálix's curator insight, June 26, 5:55 PM

Especial atenção às cada vez mais usadas Instagram, Snapchat e Ask.fm.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Excellent !! A Parent's Guide to #Cybersecurity

Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/




Via Gust MEES
more...
Suvi Salo's curator insight, November 16, 2014 5:55 PM

This gives you clear advice (in positive manner).

HazelC's comment, November 16, 2014 11:06 PM
This is a great resource. This month we are focusing on Internet safety and cyber bullying!
Christine Kennerd's curator insight, November 17, 2014 3:27 PM

Great resource for parents

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The evolution of OS X #malware.

The evolution of OS X #malware. | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about security, which means there are plenty of opportunities – for those blackhatters who are willing to put in the work.


Third: professional espionage groups have really taken to exploiting OS X. Many APT attacks in the last few years acquired Mac-modules, for example CaretoIcefog, and the targeted attacks against Uyghur activists. Yes, here we’re talking pinpointed –exclusive as opposed to mass – attacks, aimed at specially chosen victims; this is why they don’t figure in the top-20. Not that they are any less dangerous; especially if your data may be interesting to intelligence agencies.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 29, 2014 9:34 AM
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about secu


Gust MEES's curator insight, September 29, 2014 9:38 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Quran Coaching's curator insight, October 1, 2014 3:22 AM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Hackers target #Apple #Mac OS X with 25 #malware variants

#Hackers target #Apple #Mac OS X with 25 #malware variants | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 9, 2014 10:12 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 2014 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Internet Safety | Good Practice Guides - www.saferinternet.org via @knolinfos

#Internet Safety | Good Practice Guides - www.saferinternet.org via @knolinfos | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

Learn more:


http://gustmees.wordpress.com/2014/03/19/only-internet-safety-and-no-cyber-security-education-in-schools/



Via Gust MEES
more...
Ivo Kleber's curator insight, August 9, 2014 11:27 AM

Internet Safety | Good Practice Guides - www.saferinternet.or<wbr></wbr>g

Sue Gaardboe's curator insight, August 10, 2014 5:46 AM

This made me think about not just how we as teachers feel about technology use in schools, but also, how do our students feel about it? We know many of them know more about how to use the technology than we do, so are we involving them in the decisions we make about use and purchase of technology...or are we doing what we've always done and assumed we know better than they do?

Ness Crouch's curator insight, April 15, 7:18 PM

Excellent tips well worth a look.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Metadata is surveillance: my online metadata actually reveals where I’ve been

#Metadata is surveillance: my online metadata actually reveals where I’ve been | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
In an attempt to simulate the NSA's capability, Ars tracks its own editor for 11 days.


“Facebook knows if you hit any page that has a Like button it,” he said. “Same with TweetThis, unless the site goes out of the way to mask them, then these are specifically reporting them to social networks. This is why NSA loves it, is because they can go along for the ride.

.

“One thing that we know that the NSA does on their non-US wiretaps is bind usernames to cookies so if you see a request for LinkedIn or YouTube or Yahoo, these are all sites that have user ID in the clear, all you need to do is see a request, and say I don't know who this is or I know who this is, but then you look at the HTML body and look for the username. This is why the NSA went after Google ad networks, include user identification [broadcast] in the clear: ‘I am person X at this location.’

.

Despite the vast amount of data, it's just as easy to store as it is to interpret. “It works out to only a few kilobytes per person for everyone on the planet,” Weaver added. In other words, if I had the access, it'd cost just a few thousand dollars to have enough consumer-grade storage to keep data on everyone in the United States. It would comfortably fit on my desk.



Via Gust MEES
more...
smadar yona's curator insight, March 31, 2014 3:32 PM

במתכונת האח הגדול?

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

You’re Being Watched Online [Infographic]

You’re Being Watched Online [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Yes, everything you do online is being tracked. Your searches, the videos you watch, transactions, social events, even crime. Scandalous crimes. With a little help, especially with our guides, you're still able to remain anonymous on the Internet. But understanding how you're being tracked is an important lesson, as are the little things you can…

Via Gust MEES
more...
ANA's curator insight, January 31, 2014 11:39 AM

whta happens while you are on-line? interesting to think about

Darius Douglass's curator insight, January 31, 2014 2:48 PM

Interesting and something to consider

Francisco Pontes Estevan's curator insight, February 2, 2014 5:14 AM

Sí, todo lo que haces en línea es rastreado. Tus búsquedas,  los videos que miras, tus transacciones electronicas, todas las paginas que visitas...etc.  Entender cómo te están siguiendo es una lección importante para aprender las cosas que puedes hacer para mantener minimamente tu privacidad.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Security: #Simda #Botnet taken down in global operation

#Security: #Simda #Botnet taken down in global operation | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet






Via Gust MEES
more...
Gust MEES's curator insight, April 13, 8:17 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Protecting Privacy In The Digital Age: Mikko Hyppönen @mikko Answers Your Questions

Protecting Privacy In The Digital Age: Mikko Hyppönen @mikko Answers Your Questions | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
more...
Gust MEES's curator insight, October 6, 2014 10:46 AM
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Willem Kuypers's curator insight, October 7, 2014 3:44 AM

Un Avis dont on peut tenir compte. A voir aussi sa prensetation au TED Talk En 2011.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Future of #DataStorage [Infographic]

The Future of #DataStorage [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Ebuyer has prepared an infographic outlining how data storage has progressed so far and where it is heading.

Via Gust MEES
more...
Quran Coaching's curator insight, September 13, 2014 12:42 PM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
‪#‎quran‬ ‪#‎onlineQuran‬ ‪#‎islam‬ ‪#‎Tajweed‬

Esquire Digital Business's curator insight, September 14, 2014 6:32 PM

The  evolution of data storage has been very interesting to watch, I can remember buying audio tapes, then compact disks, them digital music downloads, now we are entering into a new technology like Trent Reznor's Beats, which allows full access to any and all music for a relatively small fee.


Other types of Data storage have evolved even more dynamically, evidenced by the following infographic.

OXY GREY's curator insight, September 24, 2014 1:00 PM

Le future du stockage... excellente infographie.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Coding at #school: a parent's guide to England's new computing curriculum

#Coding at #school: a parent's guide to England's new computing curriculum | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
From the start of the new term, children as young as five will be learning programming skills in the classroom. By Stuart Dredge


Learn more:


http://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/



Via Gust MEES
more...
Gust MEES's curator insight, September 4, 2014 3:55 PM
From the start of the new term, children as young as five will be learning programming skills in the classroom. By Stuart Dredge


Learn more:


http://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

10 sites with stunning visual data that will change your world view | #Privacy

10 sites with stunning visual data that will change your world view | #Privacy | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
We all know what a picture's worth. These websites use graphics to display everything from Twitter traffic to births and deaths, in ways that truly drive home what words alone cannot.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
more...
ewarta geo's curator insight, July 9, 2014 9:28 AM

Very interesting sites. Shows the differences in every country from the trending twitter topics to even the amount of computer hacks.

Cliensol Energy's comment, July 10, 2014 10:47 AM
De nada :D
Lina Heaster-Ekholm's curator insight, July 10, 2014 4:35 PM

Not sure it changed my world view, but does provide links to some interesting resources

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

How to Delete Yourself from the #Internet [Infographic] #Privacy #CNIL

How to Delete Yourself from the #Internet [Infographic] #Privacy #CNIL | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Ready to erase your tracks and disappear online, once and for all? This infographic from Who Is Hosting This reveals the nine steps you need to take to remove your personal information collected all over the web.

Via Gust MEES
more...
Marc Kneepkens's curator insight, March 8, 2014 8:25 AM

It's amazing how much information is out there about you. Have you ever Googled yourself?

There may be many reasons for 'deleting' your online presence, or parts of it. This is good information.

Carol Rine's curator insight, March 8, 2014 9:18 AM

How to Disappear Online !

Vilma Galstaun's curator insight, March 13, 2014 6:50 PM

Some sites to be aware of where you have an online presence.