omnia mea mecum fero
Follow
Find tag "Cybersecurity"
11.2K views | +1 today
omnia mea mecum fero
όλα τα δικά μου τα κουβαλάω πάνω μου
Curated by pa3geo
Your new post is loading...
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | omnia mea mecum fero | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...
Rescooped by pa3geo from Best Freeware Software
Scoop.it!

SSDownloader - Security Software Downloader

SSDownloader - Security Software Downloader | omnia mea mecum fero | Scoop.it
SSDownloader or Security Software Downloader is a small, easy to use download manager specially designed for security software.

Via Gust MEES
more...
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Passwords, Security and the Future of Authentication [#Infographic]

Passwords, Security and the Future of Authentication [#Infographic] | omnia mea mecum fero | Scoop.it

Are passwords dead?

 

According to Wired's Mat Honan, they ought to be. Honan is the technology journalist who was hacked last year. In just a few minutes, his entire digital life, including photos of his young daughter, disappeared. If it can happen to a tech-savvy writer like Honan, it can happen to anyone.


Via Berend de Jonge, juandoming, Gust MEES
more...
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Interactive Maps of Infected Websites

Interactive Maps of Infected Websites | omnia mea mecum fero | Scoop.it

Find out in real time which are the TOP 10 infected websites by country...

 

Check out, a MUST:

http://www.avast.com/maps

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | omnia mea mecum fero | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 10:18 AM
Thank you for the information.
Gary Harwell's curator insight, April 2, 2013 9:47 PM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 10:08 AM

More information on BYOD

Rescooped by pa3geo from Durff
Scoop.it!

Are You Safe Online? [INFOGRAPHIC]

Are You Safe Online? [INFOGRAPHIC] | omnia mea mecum fero | Scoop.it

Thankfully, the security tools we use today have also improved accordingly, but users need to be proactive and take responsibility to ensure that their desktop machines, smartphones and tablets are protected.

 

Read more:

http://ht.ly/dBrMr

 


Via Gust MEES, Lisa Durff
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

BYOD:(B)rought (Y)our (O)wn (D)estruction?

BYOD:(B)rought (Y)our (O)wn (D)estruction? | omnia mea mecum fero | Scoop.it
Nowadays all employees bring their own Internet-aware devices to work. Employers and institutions such as schools think
they can save a lot of money by having their employees or students use their own kit.

 

These devices are often 'powered' by applications downloaded from some kind of App-Store/Market. The applications there should be safe, but are they? What kind of risks do they pose for personal or corporate data? Furthermore, the paper will describe different vectors of attack towards corporate networks and the risk of intractable data leakage problems: for example, encryption of company data on portable devices is by no means common practice.

 

Finally, we offer advice on how to handle BYOD policies in your own environment and if it is really worth it. Maybe 'Windows To Go' - a feature of Windows 8 that boots a PC from a Live USB stick which contains Win8, applications plus Group Policies applied by the admin - is a suitable base model for converting BYOD into a Managed By IT Device.

 

===> Remember: BYOD isn't coming, it is here already and it is (B)ig, (Y)et (O)utside (D)efence perimeters! <===

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Infographic: 2012, the year of password theft

Infographic: 2012, the year of password theft | omnia mea mecum fero | Scoop.it
This infographic breaks out the numbers of password theft exploits so far in 2012. Help your users understand the risks of bad password management.

 

Read more:

http://www.techrepublic.com/blog/security/infographic-2012-the-year-of-password-theft/8351

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Infographic: Timeline and history of computer viruses

Infographic: Timeline and history of computer viruses | omnia mea mecum fero | Scoop.it
BitDefender has prepared this wonderful and a very informative Infographic on the history of computer viruses starting 1970. The history of malware is rife with incidents that allowed viruses to morph ...

Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | omnia mea mecum fero | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 2013 12:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 3:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

AnnC's curator insight, June 4, 2013 6:12 PM

see the math...

Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Malware injected into legitimate JavaScript code on legitimate websites

Malware injected into legitimate JavaScript code on legitimate websites | omnia mea mecum fero | Scoop.it
SophosLabs has observed a trend of hackers inserting their malicious code into legitimate JavaScript hosted on legitimate compromised websites.

Learn more about what our experts have seen, and e...

 

 

 

 

 

 

 

Recently SophosLabs has seen a flurry of detections of Troj/Iframe-JG on legitimate websites, including:

Primary School websites in EnglandSmall community websites in ItalyA nightclub website in LondonThe website of an East African nation's TV companyThe website of trade association of Financial Advisors in the US


Via Gust MEES
more...
Gust MEES's curator insight, February 13, 2013 7:33 AM

                      ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

Gust MEES's curator insight, February 13, 2013 7:37 AM

                       ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says | omnia mea mecum fero | Scoop.it
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch?

It's time to rip Java out of your browser for better securi...

Via Gust MEES
more...
Gust MEES's curator insight, January 19, 2013 9:46 AM

A MUST follow instructions!!!

 

Gust MEES's curator insight, January 20, 2013 6:05 AM

===> A MUST follow instructions!!! <===

 

 

Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...

 

Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Java-vulnerabilities

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

#Learning basics of #cybersecurity: Information-October 2012 Global Threats

#Learning basics of #cybersecurity: Information-October 2012 Global Threats | omnia mea mecum fero | Scoop.it
We determined the cyber criminal activity across the globe in this map that features a roundup of securityrelated news in the October issue of SC Magazine.

 

Read more, a MUST:

http://www.scmagazine.com/october-2012-global-threats/slideshow/965/#0

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

How to Be always Secured on Facebook [Infographic]

How to Be always Secured on Facebook [Infographic] | omnia mea mecum fero | Scoop.it
Infographics on Facebook Security Guide to stay away from Spam and Hacking in Social Networking world with Facebook Spamming Apps with Implementing Security...

 

Read more, a MUST:

http://allinfographics.org/how-to-be-always-secured-on-facebook-a-to-z-security-guide/

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Infographic: The Ten Things We Fear (And Love) About BYOD

Infographic: The Ten Things We Fear (And Love) About BYOD | omnia mea mecum fero | Scoop.it
Everyone’s got a point-of-view about Bring Your Own Device. SAP and NetBase went and investigated this, and came back with the top things that people love and hate about BYOD.

 

Read more:

http://www.forbes.com/sites/sap/2012/07/16/infographic-the-ten-things-we-fear-and-love-about-byod/


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Google Yourself For Safety [Infographic]

Google Yourself For Safety [Infographic] | omnia mea mecum fero | Scoop.it
Online challenge encourages users to protect their identities by searching for personal mentions of themselves on the web.

 

Read more:

http://www.edtechmagazine.com/k12/article/2012/08/google-yourself-safety-infographic

 


Via Gust MEES
more...
No comment yet.
Rescooped by pa3geo from 21st Century Learning and Teaching
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | omnia mea mecum fero | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 Check out also "Security Education Services" from Trustwave:

- https://www.trustwave.com/security-education-services/

 

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 


Via Gust MEES
more...
No comment yet.