Pedalogica: educa...
Follow
Find tag "Learning IT-Security"
91.0K views | +9 today
Pedalogica: educación y TIC
Pedalogica: educación y TIC
TIC, educación y otros cuentos...
Your new post is loading...
Your new post is loading...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

10 critical security habits you should be doing (but aren't) | CyberSecurity | Digital CitizenShip | ICT

10 critical security habits you should be doing (but aren't) | CyberSecurity | Digital CitizenShip | ICT | Pedalogica: educación y TIC | Scoop.it
Staying safe these digital days takes more than antivirus. Here are 10 fundamental things you do to protect your PC and other devices.


Learn more:



https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Via Gust MEES
more...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Why You Need Antivirus Software

Why You Need Antivirus Software | Pedalogica: educación y TIC | Scoop.it
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Via Gust MEES
more...
Gust MEES's curator insight, December 21, 2014 4:15 PM
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Wron Ga's curator insight, January 18, 1:54 PM

Trojany, botnety, ransomware, narzędzia rootkity-antywirusowe chronią przed wszystkimi rodzajami zagrożeń, nie tylko wirusy. Naprawdę  potrzebują ochrony antywirusowej

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

How To Protect Yourself Against Hackers

How To Protect Yourself Against Hackers | Pedalogica: educación y TIC | Scoop.it

There is nothing, hardware or software, that is unhackable.


Let’s get that out of the way right off the bat. If a hacker — a real hacker, not someone with a set of easily available hacking tools — really wants your information, they will get it. The same can be said for the NSA or any other state-sponsored organization.




Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2014 7:03 AM

There is nothing, hardware or software, that is unhackable.

Let’s get that out of the way right off the bat. If a hacker — a real hacker, not someone with a set of easily available hacking tools — really wants your information, they will get it. The same can be said for the NSA or any other state-sponsored organization.

Rescooped by Alazne González from Social Media and its influence
Scoop.it!

20 ways to keep your internet identity safe from hackers

20 ways to keep your internet identity safe from hackers | Pedalogica: educación y TIC | Scoop.it
Cybercrime costs Britain £27bn a year, and it could cost you dear too if you don't take basic precautions. James Silver asked experts for their top tips

Via Gust MEES
more...
Gust MEES's curator insight, May 12, 2013 7:58 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

Gust MEES's curator insight, May 12, 2013 8:02 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Gust MEES's curator insight, May 12, 2013 8:03 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Identity Theft: Keeping Safe in an Online World [Infographic]

Identity Theft: Keeping Safe in an Online World [Infographic] | Pedalogica: educación y TIC | Scoop.it

Via Gust MEES
more...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Infographic of the week: Why ignoring information security is lethal

Infographic of the week: Why ignoring information security is lethal | Pedalogica: educación y TIC | Scoop.it

Infographic of the week: Why ignoring information security is lethal


Via Frederic GOUTH, Gust MEES
more...
No comment yet.
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | Pedalogica: educación y TIC | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering



Via Gust MEES
more...
Gust MEES's curator insight, February 21, 6:22 PM
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


Rescooped by Alazne González from E-Learning-Inclusivo (Mashup)
Scoop.it!

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World | Pedalogica: educación y TIC | Scoop.it
The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Via Gust MEES, juandoming
more...
Gust MEES's curator insight, December 21, 2014 10:44 AM

The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Who are the hackers? | #TED #recomiendo

Who are the hackers? | #TED #recomiendo | Pedalogica: educación y TIC | Scoop.it
The Internet connects us as never before, but there's a dark side to this web. Who are the hackers who wreak havoc online? And what is it they want?

Via Gust MEES
more...
Gust MEES's curator insight, August 9, 2013 12:59 PM

 

Absolutely a MUST watch!!!

 

Rescooped by Alazne González from Web 2.0 for juandoming
Scoop.it!

Learning Cybersecurity: DDOS on the VideoLAN downloads infrastructure

The April 23, 2013 we experienced a major DDOS on our infrastructures this how it looked like from logstalgia. https://code.google.com/p/logstalgia/

Via Gust MEES, juandoming
more...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Pedalogica: educación y TIC | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
more...
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Gianfranco D'Aversa's curator insight, December 28, 2012 12:01 PM
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets | Pedalogica: educación y TIC | Scoop.it
Attackers look for companies with poor defenses and a lack of security skills, so no business, not even an SMB, is immune.

 

Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They're looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.


There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: No business, no individual is immune. Whether you're Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached.

 

Read more, a MUST:

http://www.informationweek.com/smb/security/how-cybercriminals-choose-their-targets/240007409

 


Via Gust MEES
more...
No comment yet.