Educational techn...
Follow
Find tag "Cybersecurity"
7.2K views | +0 today
Educational technology
Technology for all
Curated by Ann Vega
Your new post is loading...
Your new post is loading...
Rescooped by Ann Vega from 21st Century Learning and Teaching
Scoop.it!

Watch Every Cyber Attack in the World in Real Time

Watch Every Cyber Attack in the World in Real Time | Educational technology | Scoop.it

Kasperkspy Labs recently launched a beautifully terrifying interactive map that shows online threats around the world in real time. In practice, it's a global visualization of cyber attacks that, Kaspersky hopes, will motivate you to buy their security software. But it's still a hell of a spectacle.

.

 

Learn more about it on reading:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 


Via Gust MEES
more...
Gust MEES's curator insight, April 1, 3:48 PM


Learn more about it on reading:



Thornburrows's curator insight, April 2, 8:39 AM

Amazing and scary at the same time.

ICTPHMS's comment, April 2, 8:46 AM
You are welcome! Thank you for the scoop.
Rescooped by Ann Vega from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD is becoming a prevalent Information Security and IT Focus

BYOD is becoming a prevalent Information Security and IT Focus | Educational technology | Scoop.it

Bring your own device (BYOD) has become increasingly more prevalent in businesses with over 71% of companies planning, tolerating or supporting its infiltration into normal corporate work practices, according to an infograph published by Matrix 42. According to the below infograph the most common devices being utilised by employees via BYOD for work are laptops, PDA’s, mobile devices, and tablet computers.

 

The Matrix 42 infograph was developed after the company completed a survey of 600 enterprise IT professionals and was published via Visual.ly.

 

Top Ten tips for mobile security...

 

Read moree, a MUST:

http://www.certificationeurope.com/blog/byod-is-becoming-a-prevalent-information-security-and-it-management-focus/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Ann Vega from ICT Security-Sécurité PC et Internet
Scoop.it!

Most CCTV systems are easily accessible to attackers

Most CCTV systems are easily accessible to attackers | Educational technology | Scoop.it
The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don't give the devices a second thought anymore.

 

But, those individuals and organizations who actually use and control them should be aware that most of them come with default settings that make them vulnerable to outside attacks.

 

Read more...

 


Via Gust MEES
more...
No comment yet.
Rescooped by Ann Vega from ICT Security-Sécurité PC et Internet
Scoop.it!

Malware sophistication worries IT leaders

Malware sophistication worries IT leaders | Educational technology | Scoop.it
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities.

 

Additionally, 58 percent cited the growing number of threats as their biggest worry for 2012, according to Norman...


Via Gust MEES
more...
No comment yet.
Rescooped by Ann Vega from 21st Century Learning and Teaching
Scoop.it!

Keep Your Pesky Hands Off my Mobile Data! [Infographic]

Keep Your Pesky Hands Off my Mobile Data! [Infographic] | Educational technology | Scoop.it
Where's your mobile been hooking up lately? Follow our tips to keep your data secure.

Via Gust MEES
more...
Gust MEES's curator insight, February 27, 2013 6:29 AM

A MUST have...

 

Rescooped by Ann Vega from ICT Security-Sécurité PC et Internet
Scoop.it!

Malware now can spy using web camera. Who still has their cameras unblocked?

Malware now can spy using web camera. Who still has their cameras unblocked? | Educational technology | Scoop.it

Twitter Topic Text from https://twitter.com/#!/e_kaspersky

 

Text from SECURELIST by:

 

Dmitry Tarakanov
Kaspersky Lab Expert
Posted May 21, 14:10 GMT
Tags: SpyEye

 

Malware now can spy using web camera. Who still has their cameras unblocked?

 

It seems that development of the main module of SpyEye stopped with last autumn’s version 1.3.48. But just because the authors are not developing this platform further, it doesn’t mean that SpyEye is no longer getting new functions.

 

This is not the first time that cybercriminals using online banks have tried to get video and audio footage of victims. My colleague Dmitry Bestuzhev recalls a case when a malicious program targeting clients of an Ecuadorian bank also had functionality to record video and audio footage on the infected computer and to send it to intruders.

 

This too was not related to optical client recognition - the Ecuadorian bank had no such feature implemented.

 

It all begs the question – why film your victim? Apparently, cybercriminals watch the user’s reaction when the theft is in process. As usual, money is stolen in the following way: the user types his/her login data into the bank site, but the code of the bank’s page is modified by malware directly in the browser and after authorization the user doesn’t see the bank account but the malware creates a window with a message saying, for example, “Loading... Please wait...”. At the same time, injected malicious code prepares to send the stolen money to an accomplice’s bank account.

 

Once that’s done, in order to confirm the transaction, cybercriminals have to persuade the user to enter a secret code, which could be received by SMS. This is when social engineering is used: the intruder’s program puts a request on the victim’s screen, something like: “We have strengthened security measures. Please confirm your identity entering the secret code we have sent to your phone.”

 

Very interesting, learn more:

http://www.securelist.com/en/blog/208193513/Big_Brother

 


Via Gust MEES
more...
No comment yet.
Rescooped by Ann Vega from 21st Century Learning and Teaching
Scoop.it!

Infographic: Timeline and history of computer viruses

Infographic: Timeline and history of computer viruses | Educational technology | Scoop.it
BitDefender has prepared this wonderful and a very informative Infographic on the history of computer viruses starting 1970. The history of malware is rife with incidents that allowed viruses to morph ...

Via Gust MEES
more...
No comment yet.