Secondary Educati...
Follow
Find tag "Cybersecurity"
94 views | +0 today
Secondary Education; 21st Century Technology and Social Media
The use of technology and social media in education. Trends and learning styles in secondary education.
Curated by Julie Gant
Your new post is loading...
Rescooped by Julie Gant from 21st Century Learning and Teaching
Scoop.it!

Hacking Twitter ‘incredibly easy,’ security specialist says

Hacking Twitter ‘incredibly easy,’ security specialist says | Secondary Education; 21st Century Technology and Social Media | Scoop.it

Two bucks and a rudimentary command of the English language is enough for a successful Twitter hack, the likes of which was carried out against Associated Press Tuesday when hackers tweeted the false report that President Obama had been injured in explosions at the White House.

"It is incredibly easy to do, it takes zero technical skill and it has a high success rate," said Ryan Purita, forensic examiner and security specialist with Vancouver's Sherlock Forensics. "For the average Joe, it might be impossible to do, but for the average 14-year-old who lives on the Internet, it's easy."

 

The bogus tweet, which read: "Breaking: Two Explosions in the White House and Barack Obama is injured," resulted in an immediate stock market drop, with the Dow Jones Industrial Average plunging 150 points within seconds before recovering almost as quickly.

 

A tweet from @APMikeBaker suggests the hack may have resulted from a "phishing" expedition:




Via Gust MEES
more...
Rescooped by Julie Gant from Social Media and its influence
Scoop.it!

[Infographic] Types of Twitter Scams

[Infographic] Types of Twitter Scams | Secondary Education; 21st Century Technology and Social Media | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 2, 2013 3:24 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, March 2, 2013 3:28 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, March 2, 2013 3:30 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Rescooped by Julie Gant from Social Media and its influence
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Secondary Education; 21st Century Technology and Social Media | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
more...
Gust MEES's curator insight, January 22, 2013 11:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Julie Gant from 21st Century Learning and Teaching
Scoop.it!

Beware Twitter "password check" sites - there are fakes, and there are fake fakes!

Beware Twitter "password check" sites - there are fakes, and there are fake fakes! | Secondary Education; 21st Century Technology and Social Media | Scoop.it
After a widely publicised hack or data breach, you'll often find "password check" sites springing up.

Some of them are legitimate, but other password check sites are as bogus as they sound on th...

 

Short, sweet, and clear.

 

- Don't click login links in emails.

 

- Check the address bar.

 

- And watch out for the HTTPS (secure HTTP) padlock in the address bar whenever you are entering PII of any sort, from passwords to account numbers.

 


Via Gust MEES
more...
Gust MEES's curator insight, April 24, 2013 8:22 AM

 

Short, sweet, and clear.

 

- Don't click login links in emails.

 

- Check the address bar.

 

- And watch out for the HTTPS (secure HTTP) padlock in the address bar whenever you are entering PII of any sort, from passwords to account numbers.

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Gust MEES's curator insight, April 24, 2013 8:30 AM

 

Short, sweet, and clear.

 

- Don't click login links in emails.

 

- Check the address bar.

 

- And watch out for the HTTPS (secure HTTP) padlock in the address bar whenever you are entering PII of any sort, from passwords to account numbers.

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Gust MEES's curator insight, April 24, 2013 8:30 AM

 

Short, sweet, and clear.

 

- Don't click login links in emails.

 

- Check the address bar.

 

- And watch out for the HTTPS (secure HTTP) padlock in the address bar whenever you are entering PII of any sort, from passwords to account numbers.

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Rescooped by Julie Gant from Social Media and its influence
Scoop.it!

Do We Need Social Media Education in Schools Now?

Do We Need Social Media Education in Schools Now? | Secondary Education; 21st Century Technology and Social Media | Scoop.it
Is it time for social media education in our schools? The recent Manti Te'o hoax is only the tip of the iceberg. He knew how to use social media, but didn’t understand its power.

 

There is an urgent need to educate students at all levels on the responsible use of social media. It’s time to help students navigate this unfiltered world of anonymous faces. When searching for a curriculum for social media education.

 

Teaching students how to set their privacy levels on applications is only the starting line, not the finish line.

 

 


Via Gust MEES
more...
Rescooped by Julie Gant from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Secondary Education; 21st Century Technology and Social Media | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD