Social media and ...
Follow
Find tag "Government"
7.4K views | +0 today
Social media and education
Social media and web 2.0 tools in education
Curated by Jack Patterson
Your new post is loading...
Your new post is loading...
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Great Resources to Teach Students about Plagiarism and Citation Styles

Great Resources to Teach Students about Plagiarism and Citation Styles | Social media and education | Scoop.it

Learn more:

 

http://gustmees.wordpress.com/2013/02/22/what-you-should-know-about-copyright/

 


Via Gust MEES
more...
Nevermore Sithole's curator insight, November 10, 10:17 AM

Great Resources to Teach Students about Plagiarism and Citation Styles

Richard Samson's curator insight, November 12, 4:13 AM

Lots of relevanmt info. all in one place.

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic]

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic] | Social media and education | Scoop.it

Via Gust MEES
more...
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Will The New 'Copyright Alert System' Actually Stop People From Downloading Music and Movies Illegally?

Will The New 'Copyright Alert System' Actually Stop People From Downloading Music and Movies Illegally? | Social media and education | Scoop.it
Starting this week, those downloading movies, TV shows and music illegally in the U.S. are going to start getting called out for committing Internet fouls.

 

Copyright holders RIAA and MPAA in partnership with five major Internet service providers are launching the “Copyright Alert System” a.k.a. “Six Strikes” a.k.a. “The Copyright Surveillance Machine.” What does it mean?

 


Via Gust MEES
more...
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Adobe patches Acrobat and Reader, Mozilla debuts Firefox built-in PDF viewer

Adobe patches Acrobat and Reader, Mozilla debuts Firefox built-in PDF viewer | Social media and education | Scoop.it

Adobe has pushed out the announced update for Acrobat and Reader that patches the two vulnerabilities that were recently exploited in attacks in the wild.

But, the popularity of these Adobe products, the amount of security bugs they apparently contain, and Adobe's consistently slow release of patches make them the perfect entry point for cyber attackers, so it's no wonder that security experts are advising and users considering using alternative PDF viewers.

Google has solved part of the problem for users by building in a PDF viewer into Chrome and turning it on by default. Apple's Safari has done the same for Safari for Mac.

And now Mozilla has introduced one in its latest stable version of Firefox (v19.0).

 


Via Gust MEES
more...
Gust MEES's curator insight, February 20, 2013 1:30 PM

Google has solved of the problem for users by building in a PDF viewer into Chrome and turning it on by default. Apple's Safari has done the same for Safari for Mac.


And now Mozilla has introduced one in its latest stable version of Firefox (v19.0).

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Passwords, Security and the Future of Authentication [#Infographic]

Passwords, Security and the Future of Authentication [#Infographic] | Social media and education | Scoop.it

Are passwords dead?

 

According to Wired's Mat Honan, they ought to be. Honan is the technology journalist who was hacked last year. In just a few minutes, his entire digital life, including photos of his young daughter, disappeared. If it can happen to a tech-savvy writer like Honan, it can happen to anyone.


Via Berend de Jonge, juandoming, Gust MEES
more...
Rescooped by Jack Patterson from Social Media and its influence
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Social media and education | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
more...
Gust MEES's curator insight, January 22, 2013 11:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Mobile security: Defending your devices

Mobile security: Defending your devices | Social media and education | Scoop.it

===> The days when IT security was solely focused on desktop PCs are long gone. <===

 

Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Clueless officials hamper cybersecurity law-making

Clueless officials hamper cybersecurity law-making | Social media and education | Scoop.it
Governments need to know what problems the cybersecurity legislation is meant to address, or they will face public backlash over the possible intrusions to their personal rights.

 

Read more, a MUST:

http://www.zdnet.com/clueless-officials-hamper-cybersecurity-law-making-7000008140/?s_cid=e550

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

EUROPA - PRESS RELEASES - Cyber-security – a shared responsibility

EUROPA - PRESS RELEASES - Cyber-security – a shared responsibility | Social media and education | Scoop.it
European Commission - Press Release - European Commission Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda Information Security Forum Conference, Chicago 4th November 2012 Every day, people worldwide rely...

 

===> Cyber-security should be recognised as a top political priority. <===

 

Here in the US it has long obtained political attention. It is time we do the same in Europe and worldwide.

 

Read more, a MUST:

http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm?locale=en

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

National Cyber Security Education Council (NCEC)

National Cyber Security Education Council (NCEC) | Social media and education | Scoop.it

ABOUT

 

The National Cyber Security Alliance (NCSA) has created the National Cyber Security Education Council (NCEC), a public-­‚Äźprivate partnership between government and industry to help address formal cybersecurity education in the United States.

 

Read more:

http://www.staysafeonline.org/ncec/about

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Small Business Online Security [Infographic]

Small Business Online Security [Infographic] | Social media and education | Scoop.it

Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Keep Your Children Safe Online

Keep Your Children Safe Online | Social media and education | Scoop.it
Online gaming used to be an activity confined to dimly lit arcades, but it can now be enjoyed by anyone and everyone.

 

 

 

 

 

 

 

 

 

A MUST read for parents and teachers:

http://about-threats.trendmicro.com/ebooks/keep-your-children-safe-online/#/1/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from Marketing and Digital Communication
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | Social media and education | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES, PatriAnnaD
more...
JM - Axioma WebLab's curator insight, August 1, 2013 9:34 PM

Take note of this info !.

MeeMetICT's curator insight, October 15, 2013 2:04 AM

Met de vakantie voor de deur wel even de moeite om te bekijken.

Carmenne K. Thapliyal's curator insight, October 15, 2013 2:36 AM

An infographic with some important information we can share with students

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Online Citizenship | Common Craft

Online Citizenship | Common Craft | Social media and education | Scoop.it

Via Gust MEES
more...
Dennis T OConnor's curator insight, March 6, 2013 2:58 PM

This is great way to build conceptual understanding of digital citizenship! 

Ness Crouch's curator insight, March 6, 2013 6:39 PM

Very useful and interesting. Though this has a 'watermark' it is still a valuable video and would be interesting to share with staff and students.

Helena Andrade Mendonça's curator insight, March 7, 2013 4:55 PM

Os videos da CommonCraft são interessantes. Alguns tem a versão em português e há vídeos de diversas áreas. Vale a pena dar uma olhada.

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Hackers Who Attacked Twitter, Facebook, Apple May Have 'Hundreds' More Victims

Hackers Who Attacked Twitter, Facebook, Apple May Have 'Hundreds' More Victims | Social media and education | Scoop.it
The hackers who attacked Twitter, Facebook and Apple employees likely claimed many more victims, an expert said Wednesday. But exactly how many remains unknown.

 

His site, which has about 200,000 registered users, is "the most widely read dedicated iOS developer forum," he said. Most visitors are software developers who discuss technical issues around building apps for the iPhone and iPad.

Not everyone who visited his site was hacked. His own computer, for example, was not infected, he said.

 

Sefferman said the hacker appeared to remove the malware from the site on Jan. 30. But on Wednesday, the site had not been taken down and experts warned users not to visit it because it may still infect their computers.

 


Via Gust MEES
more...
Gust MEES's curator insight, February 20, 2013 3:10 PM

The website that caused the hacks was identified as iPhoneDevSDK.

In an interview Wednesday, the website's owner, Ian Sefferman, said he was never contacted by Facebook or investigators looking into the attacks and only learned the site hosted malicious software, known as malware, when he was notified Tuesday by a reporter at the tech blog AllThingsD.

 

Sefferman said multiple other sites on the Internet also hosted the malware, though he did not provide details on which sites.

 

===> Wait and see what next NEWS will be!!! <===

 

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Internet Safety for Adults

Internet Safety for Adults | Social media and education | Scoop.it

Via Gust MEES
more...
Rescooped by Jack Patterson from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

Spotflux - lets you connect to the internet freely, safely, and securely from anywhere in the world

Spotflux - lets you connect to the internet freely, safely, and securely from anywhere in the world | Social media and education | Scoop.it
Spotflux lets you connect to the internet freely, safely, and securely from anywhere in the world.

 

Whether at home, traveling, or on a public WiFi, spotflux encrypts and secures your connection and protects your privacy while browsing.

Spotflux continuously scans and protects your connection for inbound threats such as malware and viruses.

 


Via Gust MEES, ABroaderView
more...
Gust MEES's curator insight, January 24, 2013 12:34 PM

I will give it a try, soon and compare it to HotSpot Shield...

 

BTW: the program was published with a review in PC-World:

 

https://www.pcworld.com/article/257831/spotflux_guards_your_privacy_for_free.html

 

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Top 12 Security Slideshows of 2012

Top 12 Security Slideshows of 2012 | Social media and education | Scoop.it
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

Via Gust MEES
more...
Gust MEES's curator insight, December 24, 2012 10:21 AM

 

                 ===> Be AWARE of the MALWARE! <===

Check also my other FREE courses here:

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Gianfranco D'Aversa's curator insight, December 28, 2012 12:01 PM

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day | Social media and education | Scoop.it

Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012.

 

===> The report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. <===

 

Overall, Kaspersky Lab detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

 

At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.

 

===> Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. <===

 

This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2352

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from Latest Social Media News
Scoop.it!

New variant of Mac Trojan discovered, targeting Tibet

New variant of Mac Trojan discovered, targeting Tibet | Social media and education | Scoop.it
The malware threat on Macs is real, and should not be underestimated.

 

 

SophosLabs, is a new variant of the OSX/Imuler Trojan horse. In the past, earlier variants of the OSX/Imuler malware has been spread via topless photos of a Russian supermodel or embedded deep inside boobytrapped PDF files.

 

If your Mac was successfully infected by malware like this, you have effectively given remote control of your computer and your data to an invisible and unknown party.

 

===> They could steal files from your Mac, spy on your emails, and plant further malware onto your systems. <===

 

Read more, a MUST:

http://nakedsecurity.sophos.com/2012/11/13/new-mac-trojan/

 


Via Gust MEES, Gerrit Bes
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

YOU DON’T HAVE TO BE A COMPUTER EXPERT TO KEEP YOUR CHILD SAFE ONLINE. — iKeepSafe

YOU DON’T HAVE TO BE A COMPUTER EXPERT TO KEEP YOUR CHILD SAFE ONLINE. — iKeepSafe | Social media and education | Scoop.it

You can help your child become a responsible, ethical digital citizen with healthy online relationships. To do that, you’ll use the same successful parenting skills that you’re already using at home.

 

Resilient digital citizens recognize and seek out the 3Cs—appropriate contact, content, and conduct—in all digital settings (e.g., iPods,instant messaging, chat, computer games, game consoles, cell phones, text messaging, webcams).

 

==========================================

 

Gust MEES

 

In 21st Century there is a MUST to have basic knowledge about Internet-Safety, Internet-Security, Cyber-Security! Lots of strange words, isn't it? But don't be afraid of that, it is much more easy to stay safe on Internet as YOU might think!

 

WE need ONLY to have the right reflexes and spend a bit of time to make the first steps. Remember the first steps YOU made and YOUR kids? Took a bit time before YOU were walking ;) Same when learning to stay secure, a bit effort is needed, but certainly worth to do to protect YOUR Kids, right ;)

 

This website is very interesting, professional and with lots of tips, YOU should watch the videos and read also... First read it and watch the videos and then later together with YOUR Kids, where YOU can explain to them...

 

Check out also my FREE courses about How To know which websites are trustful, easy to install the FREEWARE (takes ONLY +/- 5 minutes) [install it ALSO on YOUR computer]:

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/

 

==========================================

 

To help you teach your children to safely and ethically use their digital devices, iKeepSafe has created the following programs:

 

http://www.ikeepsafe.org/parents/

 

http://www.ikeepsafe.org

 


Via Gust MEES
more...
No comment yet.
Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | Social media and education | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 


Via Gust MEES
more...
Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Rescooped by Jack Patterson from 21st Century Learning and Teaching
Scoop.it!

Mobile Devices: The Gateway for Hackers to Your Digital Identity

Mobile Devices: The Gateway for Hackers to Your Digital Identity | Social media and education | Scoop.it

While it is widely understood that mobile devices are more than just phones – they are a lifeline to the outside world, entertainment platform, GPS system, little black book and a shopping and banking tool – it’s lesser known that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone.


Hackers can use your mobile device as an access point to data that have historically been exclusively stored to your laptop or desktop, such as social network and bank accounts. One of the most harmful (and popular) mobile threats has to do with apps. Installing apps from unknown or untrusted sources like apps outside the official Google Play Market could allow hackers to steal sensitive and private information stored on your mobile device including passwords, photos, contacts and location data.

 

=============================================

 

Gust MEES

 

Critical Thinking: "While it is widely understood that mobile devices are more than just phones", really!?? Most people still think that it is ONLY a phone, but in reality it is a mini computer with phone capabilities! And any computer is vulnerable and at risk!!!

 

Check out also:

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Especially check the video under this topic "Ever thought about that your smartphone is also a computer with phone capabilities?" to understand!

 

=============================================

 

Read more, a MUST:

http://blogs.mcafee.com/consumer/mobile-devices-the-gateway-for-hackers-to-your-digital-identity?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.