Pedalogica: educa...
Follow
Find tag "Cybersecurity"
76.6K views | +0 today
Pedalogica: educación y TIC
Pedalogica: educación y TIC
TIC, educación y otros cuentos...
Your new post is loading...
Your new post is loading...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Who are the hackers? | #TED #recomiendo

Who are the hackers? | #TED #recomiendo | Pedalogica: educación y TIC | Scoop.it
The Internet connects us as never before, but there's a dark side to this web. Who are the hackers who wreak havoc online? And what is it they want?

Via Gust MEES
more...
Gust MEES's curator insight, August 9, 2013 9:59 AM

 

Absolutely a MUST watch!!!

 

Rescooped by Alazne González from Web 2.0 for juandoming
Scoop.it!

Learning Cybersecurity: DDOS on the VideoLAN downloads infrastructure

The April 23, 2013 we experienced a major DDOS on our infrastructures this how it looked like from logstalgia. https://code.google.com/p/logstalgia/

Via Gust MEES, juandoming
more...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Pedalogica: educación y TIC | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
more...
Gust MEES's curator insight, December 23, 2012 8:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Gianfranco D'Aversa's curator insight, December 28, 2012 9:01 AM
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets | Pedalogica: educación y TIC | Scoop.it
Attackers look for companies with poor defenses and a lack of security skills, so no business, not even an SMB, is immune.

 

Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They're looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.


There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: No business, no individual is immune. Whether you're Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached.

 

Read more, a MUST:

http://www.informationweek.com/smb/security/how-cybercriminals-choose-their-targets/240007409

 


Via Gust MEES
more...
No comment yet.
Rescooped by Alazne González from Social Media and its influence
Scoop.it!

20 ways to keep your internet identity safe from hackers

20 ways to keep your internet identity safe from hackers | Pedalogica: educación y TIC | Scoop.it
Cybercrime costs Britain £27bn a year, and it could cost you dear too if you don't take basic precautions. James Silver asked experts for their top tips

Via Gust MEES
more...
Gust MEES's curator insight, May 12, 2013 4:58 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

Gust MEES's curator insight, May 12, 2013 5:02 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Gust MEES's curator insight, May 12, 2013 5:03 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Identity Theft: Keeping Safe in an Online World [Infographic]

Identity Theft: Keeping Safe in an Online World [Infographic] | Pedalogica: educación y TIC | Scoop.it

Via Gust MEES
more...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Infographic of the week: Why ignoring information security is lethal

Infographic of the week: Why ignoring information security is lethal | Pedalogica: educación y TIC | Scoop.it

Infographic of the week: Why ignoring information security is lethal


Via Frederic GOUTH, Gust MEES
more...
No comment yet.
Rescooped by Alazne González from Educational tools and ICT
Scoop.it!

How To Make Information Security Everyone's Problem

How To Make Information Security Everyone's Problem | Pedalogica: educación y TIC | Scoop.it
Use self-interest and propaganda to change employees' attitudes about endpoint security.

Via Gust MEES, Maria Palaska
more...
No comment yet.