School Psychology...
Follow
Find tag "Cybersecurity"
5.5K views | +3 today
Your new post is loading...
Your new post is loading...
Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

eSafety label

eSafety label | School Psychology Tech | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 3:56 AM

Is your school on track with eSafety?  Assess your infrastructure, policy and practice and get your personalised action plan now.


Rescooped by AnnC from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs, Malware & Security Myths

Are Mac Users safe from Malware? Not as much as you might think. Symantec's Security Expert Kevin Haley breaks down the Mac's invincibility myth. Learn why M...

Via Gust MEES
more...
Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Malware Alert: Please Update Your Expired Dropbox Password

Malware Alert: Please Update Your Expired Dropbox Password | School Psychology Tech | Scoop.it

Dropbox users are advised to be on the lookout for emails entitled “Please update your Expired Dropbox Password.”

 

Experts warn that cybercriminals are sending out such

 

===> scam notifications in an effort to distribute malware. <===

 


Via Gust MEES
more...
Estelblau's curator insight, October 4, 2013 9:45 AM

Thanks for the advice @knolinfos!

Randi Thompson's curator insight, October 4, 2013 2:47 PM

If you use Dropbox and are getting these notifications, they are hackers!   

Philip Verghese 'Ariel's curator insight, October 6, 2013 5:32 AM

Dropbox users are advised to be on the lookout for emails entitled “Please update your Expired Dropbox Password.”

 

Experts warn that cybercriminals are sending out such

 

===> scam notifications in an effort to distribute malware. <===

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

How to keep your business safe – the one checklist all SMBs should have [Infographic]

How to keep your business safe – the one checklist all SMBs should have [Infographic] | School Psychology Tech | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, June 24, 2013 7:56 AM

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, June 24, 2013 8:04 AM

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | School Psychology Tech | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
AnnC's insight:

see the math...

more...
Gust MEES's curator insight, June 3, 2013 12:44 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, June 3, 2013 12:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 3:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week | School Psychology Tech | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for the Internet's future! . ===> "Nothing in life is to be feared. It is only t...

 


Via Gust MEES
more...
hedgeshandy's comment, October 17, 2013 3:24 AM
Thats stunning...
Jean-Robert Bos's curator insight, March 31, 11:21 PM

Apprenez à sécuriser en 7 jours

keamogetswe Dikobe's curator insight, July 29, 12:10 AM

information technology

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Twitter hacked, at least 250,000 users affected: what you can do to protect yourself

Twitter hacked, at least 250,000 users affected: what you can do to protect yourself | School Psychology Tech | Scoop.it
Twitter is the latest web property to admit that intruders seem to have been wandering around its network for some time.

Paul Ducklin investigates and offers some advice on what to do next...

Via Gust MEES
more...
Gust MEES's curator insight, February 1, 2013 5:51 PM

                           ===> BEWARE the MALWARE!!! <===

Gust MEES's curator insight, February 1, 2013 5:55 PM

                       ===> BEWARE of the MALWARE!!! <===

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

UK teenagers without the internet are 'educationally disadvantaged' - University of Oxford

UK teenagers without the internet are 'educationally disadvantaged' - University of Oxford | School Psychology Tech | Scoop.it

A major in-depth study examining how teenagers in the UK are using the internet and other mobile devices says the benefits of using such technologies far outweigh any perceived risks. 

 

The findings are based on a large-scale study of more than 1,000 randomly selected households in the UK, coupled with regular face-to-face interviews with more than 200 teenagers and their families between 2008 and 2011. 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, January 4, 2013 12:04 PM

SO, knowing this NOW, Education should go a step further and HELP protecting the kids by TEACHING the basics of Cyber-Security and Internet-Safety!

 

BOTH are a MUST in 21st Century, while Internet-Safety is the THEORY and basics of Cyber-Security the ===> PRACTICE! <===

 

Check here:

 

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internet-Safety-For-Children

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Cybersecurity Summary for Parents

Cybersecurity Summary for Parents | School Psychology Tech | Scoop.it

Cyber-Security:

 

Download this free guide to get the full list of...

 

- How to prevent and avoid cyberbullying

 

- Tips for you teen to prevent sharing too much personal information

 

- Tips for identifying and dealing with an online predators

 

Want more safety information for you and your kids? Download this new guide today, hot off the press!


Via Gust MEES
more...
No comment yet.
Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

eSafety label

eSafety label | School Psychology Tech | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 3:56 AM

Is your school on track with eSafety?  Assess your infrastructure, policy and practice and get your personalised action plan now.


Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Teach Kids To Be Their Own Internet Filters

Teach Kids To Be Their Own Internet Filters | School Psychology Tech | Scoop.it
Students live in an information saturated world. The most effective way to keep them safe and using the internet responsibly as a learning tool is to teach them how to be their own filters.

Via Gust MEES
more...
Say Keng Lee's curator insight, October 7, 2013 12:12 AM

Useful for the adult pros as well, especially the evaluation criteria suggested...

Philip Verghese 'Ariel's curator insight, October 7, 2013 6:45 AM

Yes, Gust, let them felter themselves, and ha, let us guide them. Thanks for the share Gust.

Eileen Forsyth's curator insight, January 17, 9:28 AM

SAGE ADVICE on how to teach kids to filter themselves (digitally)

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | School Psychology Tech | Scoop.it

Via Gust MEES
more...
Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again) | School Psychology Tech | Scoop.it
You know those people who put tape over their laptop's webcam to keep digital peeping toms at bay? They're not crazy.

Via Gust MEES
AnnC's insight:

FYI - you can be seen - how do you look?

more...
Gust MEES's curator insight, June 15, 2013 5:03 AM

 

Fortunately, getting a solid layer of protection against such exploits moving forward is pretty straightforward. For one, you can tape up that webcam — it’s a bit tinfoil hat, sure, but it’s better than having a photo of your bad bits blasted out to the Internet on some shady-ass Tumblr. Second, consider using Firefox* with something like NoScript, disabling it only for trusted sites.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Webcam

 

Stewart-Marshall's curator insight, June 15, 2013 8:29 AM

Tested it - and it's true - it works on Chrome.  Scary :-(

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’ | School Psychology Tech | Scoop.it
Forget obscure apps, unexpected emails and suspicious links. A group of researchers from the Georgia Institute of Technology claim to have developed a new smartphone charger that can ...

Via Gust MEES
AnnC's insight:

beware unknown chargers !

more...
Gust MEES's curator insight, June 3, 2013 8:53 AM

 

Nobody is perfect ;)

Gust MEES's curator insight, June 3, 2013 8:56 AM

 

Nobody is perfect ;)

 

Rescooped by AnnC from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Help! My Mac's Been Hacked!

Help! My Mac's Been Hacked! | School Psychology Tech | Scoop.it
Mac users get hacked, too. Here are some tips for when you think your Apple's core is rotten with malware.

 

No one is immune to malware, and, though Apple users have been largely ignored by the bad guys, malware targeted at Apple machines is on the rise. Last year's Flashback trojan, for instance, made users think twice about security. If you are (or suspect you have been) infected with malware, here are some tips on how to clean up your system and keep it from happening again.


Via Gust MEES
AnnC's insight:

save just in case you need this later.

more...
Gust MEES's curator insight, March 9, 2013 9:47 AM

 

                               ===> Nobody Is Perfect!!! <===

 

No one is immune to malware, and, though Apple users have been largely ignored by the bad guys, malware targeted at Apple machines is on the rise. Last year's Flashback trojan, for instance, made users think twice about security. If you are (or suspect you have been) infected with malware, here are some tips on how to clean up your system and keep it from happening again.

 

Gust MEES's curator insight, March 9, 2013 9:52 AM

 

                           ===> Nobody Is Perfect!!! <===

 

No one is immune to malware, and, though Apple users have been largely ignored by the bad guys, malware targeted at Apple machines is on the rise. Last year's Flashback trojan, for instance, made users think twice about security. If you are (or suspect you have been) infected with malware, here are some tips on how to clean up your system and keep it from happening again.

 

 

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

AVG Antivirus & Security Software - The History of the Internet [Infographic]

AVG Antivirus & Security Software - The History of the Internet [Infographic] | School Psychology Tech | Scoop.it

Via Gust MEES
AnnC's insight:

A MUST have to use in "Learning the basics of Cyber-Security" and "Learning about ICT"...

 

more...
Gust MEES's curator insight, January 7, 2013 6:43 AM

A MUST have to use in "Learning the basics of Cyber-Security" and "Learning about ICT"...

 

Lynnette Van Dyke's curator insight, January 8, 2013 7:20 AM

A MUST have to use in "Learning the basics of Cyber-Security" and "Learning about ICT"...

 

Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Protecting the Internet Infographic | StaySafeOnline.org

Protecting the Internet Infographic | StaySafeOnline.org | School Psychology Tech | Scoop.it

To view or download a PDF version, click here:

http://staysafeonline.org/download/document/294/protecting_the_internet_infographic.pdf

 


Via Gust MEES
more...
No comment yet.
Rescooped by AnnC from 21st Century Learning and Teaching
Scoop.it!

Learning basics of Cybersecurity: Bluetooth technology and mobile phones - the risks

Attacks on Bluetooth-enabled devices can take place within a distance of 10 metres or more. Stay safe by installing firewalls and Kaspersky mobile phone antivirus software.

As many as three-quarters of mobile phone users are not aware of the internet security risks linked to Bluetooth-equipped devices. These risks come in four main guises:

 

- Bluejacking is when anonymous text messages are sent to mobile phones


- Bluespamming is when a phone’s contacts are secretly sent text messages


- Bluesnarfing is when hackers gain access to a mobile phone’s contacts


- Bluebugging is when hackers have access to a handset’s commands


While each of these risks is a nuisance, bluesnarfing and bluebugging are particularly serious. With bluesnarfing, hackers can gain access to stored data, such as a phonebook, calendar or to clone a phone.

 

Read more, a MUST:

http://www.kaspersky.com/threats/bluetooth-risks

 


Via Gust MEES
more...
No comment yet.