Technological Sparks
Follow
Find tag "2014"
2.2K views | +0 today
Technological Sparks
Notable Ideas in Technology and General News About What's Happening On, Around and To the WEB
Your new post is loading...
Your new post is loading...
Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Most vulnerable operating systems and applications in 2014

Most vulnerable operating systems and applications in 2014 | Technological Sparks | Scoop.it
An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

Via Gust MEES
more...
Gust MEES's curator insight, February 22, 6:51 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched.IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Gust MEES's curator insight, February 22, 7:08 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:


Rescooped by Monica S Mcfeeters from Curating Tools and Information
Scoop.it!

What Social Networks Should You Use in 2014? [INFOGRAPHIC]

What Social Networks Should You Use in 2014? [INFOGRAPHIC] | Technological Sparks | Scoop.it
We’re now into a whole new year – but which social networks should have your full attention this year?

Via Lauren Moss, R.Conrath, Ed.D.
Monica S Mcfeeters's insight:

Do you wonder where to put most of your online time for the best reach to viewers? Here is helpful info to help you decide.

more...
Dillon Thomas's curator insight, February 1, 2014 9:15 AM

TO FULLY UNDERSTAND AND HAVE STATS AND DATA ..  FOR EXAMPLE YOUR AUDIENCE FOR YOUR INFOGRAPHIC AND THEN  TP UNDERSTAND WHAT SOCIAL MEDIA THEY USE

BOTH: .. quanitatively and qualititatively .. (How much time they spend and what content they are utilizing or extracting) 

 

THIS IS CRITICAL TO MAKING AN INFOGRAPHIC TARGETED TO AN AUDIANCE SPECIFIC

 

ALSO:   I recommend Lauren Moss SCOOP - VISUALIZING SOCIAL MEDIA 

Amy Williamson's curator insight, February 5, 2014 5:43 AM

A must read for anyone working in social media!

Marianne Naughton's curator insight, February 20, 2014 1:54 PM

Thanks

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Technological Sparks | Scoop.it
Will 2015 be a happy new year for internet...

Via Gust MEES
more...
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Dirk Cipido's curator insight, December 31, 2014 8:14 AM

up to a secure 2015

Wron Ga's curator insight, January 18, 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze