Wepyirang
Follow
Find tag "Learning basics of Cyber-Security"
2.8K views | +0 today
Wepyirang
Web life/Real-time Social Web
Curated by Jimun Gimm
Your new post is loading...
Your new post is loading...
Rescooped by Jimun Gimm from ICT Security Tools
Scoop.it!

Tenable Network Security

Tenable Network Security | Wepyirang | Scoop.it

SecurityCenterContinuous View

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Learn more about integrated risk, threat, and compliance analytics for security analysts, compliance auditors, and executive risk managers.

 


Via Gust MEES
more...
Gust MEES's curator insight, July 12, 2013 1:31 AM

 

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Rescooped by Jimun Gimm from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

How to Protect Your WordPress From Attack

How to Protect Your WordPress From Attack | Wepyirang | Scoop.it
An ongoing brute-force attack on WordPress-based websites has compromised more than 90,000 blogs, but there are simple ways to make sure your blog won't be next to fall.

Via Gust MEES
more...
Rescooped by Jimun Gimm from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | Wepyirang | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Rescooped by Jimun Gimm from La "Réalité Augmentée" (Augmented Reality [AR])
Scoop.it!

Unintended, malicious and evil applications of augmented reality

Unintended, malicious and evil applications of augmented reality | Wepyirang | Scoop.it

Products have substantial flaws, technology designers seek ways to extract money from users, and many users twist well intentioned technology in ways the designers never expected, often involving baser instincts. These realities should come as no surprise to security professionals who are usually most effective when assuming the worst in people. One sure to be abused emerging technology is augmented reality.

 

Augmented reality technologies overlay computer generated data on a live view of the real world. Anticipated application domains include entertainment, travel, education, collaboration, and law enforcement, among numerous others.

 


Via Gust MEES
more...
Gust MEES's curator insight, February 12, 2013 10:11 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

 

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 10:17 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 10:18 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Jimun Gimm from QR-Code and its applications
Scoop.it!

QR codes, smartphones et sécurité

QR codes, smartphones et sécurité | Wepyirang | Scoop.it

Les "QR codes" fleurissent depuis quelques années dans tous les environnements : presse, lieux publics, pages web, boîtes d'emballages... mais savez-vous vraiment si leur utilisation est sécurisée ? Que risquez-vous en utilisant ces mystérieux dessins noir & blanc ?


Via Jean-Robert Bos, Frederic GOUTH, Gust MEES
more...
Jean-Robert Bos's curator insight, January 14, 2013 10:43 AM

Les récentes déclarations de Symantec déclaraient récemment que de faux codes QR sont fréquemment trouvés dans les lieux publics (métro, aéroports, centre-ville) : des organisations ayant pris la fâcheuse habitude de coller des codes QR malveillants en lieu et place des codes QR officiels sur des publicités, affiche ou affichage officiels.

Gust MEES's curator insight, January 17, 2013 8:13 AM

À voir également :

 

- http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Norton+Snap

 

Gust MEES's curator insight, January 17, 2013 8:27 AM

MUST read ALSO:

 

http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Norton+Snap

 

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

TOP 20 countries where web resources are seeded with malware

TOP 20 countries where web resources are seeded with malware | Wepyirang | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 11:29 AM

 

 

Learning the basics of Cyber-Security is ALSO a MUST in the 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use the Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

===> Some countries are looking really BAD and they SHOULD introduce "Teaching the basics of Cyber-Security!!! <===

 

Gust MEES's curator insight, January 14, 2013 11:34 AM

Learning the basics of Cyber-Security is ALSO a MUST in the 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use the Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

===> Some countries are looking really BAD and they SHOULD introduce "Teaching the basics of Cyber-Security!!! <===

 

Rescooped by Jimun Gimm from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs hit by new wave of money-stealing malware 

Macs hit by new wave of money-stealing malware  | Wepyirang | Scoop.it

Apple users who think they're immune to malware and other bugs need to pay attention: A new Trojan is infecting Apple computers in order to obtain victims' phone numbers and rob them via unexpected premium SMS charges.

The Trojan, which masks itself as downloadable software, presents victims with a legitimate-looking installation wizard that asks for their phone number in order to verify or authenticate the install.

Read more:
http://www.nbcnews.com/technology/technolog/macs-hit-new-wave-money-stealing-malware-1C7563684


Via Gust MEES
more...
Gust MEES's curator insight, December 13, 2012 2:52 PM

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity

Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

Don't Use Any Of These 20 Popular Passwords [Infographic]

Don't Use Any Of These 20 Popular Passwords [Infographic] | Wepyirang | Scoop.it
What are some of the world's most popular passwords? If you're thinking your 123456 password is foolproof, you better think again.

Via Gust MEES
more...
Gust MEES's curator insight, April 23, 2013 4:03 PM

 

55% of net users use the same password for most, if not all, websites. When will they learn?

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

 

Gust MEES's curator insight, April 23, 2013 4:06 PM

55% of net users use the same password for most, if not all, websites. When will they learn?

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

Rescooped by Jimun Gimm from ICT Security-Sécurité PC et Internet
Scoop.it!

Cyber Security & Privacy EU Forum 2013

Cyber Security & Privacy EU Forum 2013 | Wepyirang | Scoop.it

Via Gust MEES
more...
Rescooped by Jimun Gimm from Social Media and its influence
Scoop.it!

[Infographic] Top Scams on Facebook

[Infographic] Top Scams on Facebook | Wepyirang | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 2, 2013 3:45 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, March 2, 2013 3:46 PM

Check also for more Security Infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Randi Thompson's curator insight, March 3, 2013 4:55 PM

Top Facebook scams to be aware of

Rescooped by Jimun Gimm from Surviving Social Chaos
Scoop.it!

Do We Need Social Media Education in Schools Now?

Do We Need Social Media Education in Schools Now? | Wepyirang | Scoop.it
Is it time for social media education in our schools? The recent Manti Te'o hoax is only the tip of the iceberg. He knew how to use social media, but didn’t understand its power.

 

There is an urgent need to educate students at all levels on the responsible use of social media. It’s time to help students navigate this unfiltered world of anonymous faces. When searching for a curriculum for social media education.

 

Teaching students how to set their privacy levels on applications is only the starting line, not the finish line.

 

 


Via Gust MEES, donhornsby
more...
Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

QR Code Security [pdf]

A MUST read!!!

 


Via Gust MEES
more...
Rescooped by Jimun Gimm from 21st Century Teaching & Learning Resources
Scoop.it!

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware | Wepyirang | Scoop.it
Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The bug, which can be used to gai...
Here's what the researchers found they could access:

TV settings and channel lists
SecureStorage accounts
Widgets and their configurations
History of USB movies
ID
Firmware
Whole partitions
USB drives attached to the TV


Gust MEES's insight:

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable! Protect YOUR computer(s) and Smartphone(s):

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

Via Gust MEES, Linda Buckmaster
more...
Gust MEES's curator insight, December 12, 2012 4:00 PM

I don't STOP to say it again and again: Nobody Is Perfect and any device connecting to Internet is vulnerable as it contains a at least a mini-computer and any mini-computer is vulnerable!

 

Protect YOUR computer(s) and Smartphone(s):

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Linda Buckmaster's curator insight, December 17, 2012 1:11 AM

I have just purchased a new Samsung TV and had no idea of the potential dangers ... thanks for info GM!

Thybo Lingier's curator insight, December 31, 2013 9:51 AM

Company name: Samsung
Economic activity segment: Technology

Use of ICT: New technolgy combined with the internet and several other options. For example connecting your television with Facebook or Youtube

Objectives: Customer Satisfaction and Innovation

Rescooped by Jimun Gimm from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Digital Universe - Insafe

Digital Universe - Insafe | Wepyirang | Scoop.it

European Schoolnet (host organisation of Insafe), together with Liberty Global, has today launched an animation aimed at educating parents on children's safety online: The Digital Universe of Your Children. View it here…

Gust MEES's insight:

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century! Check out also my FREE courses:

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

=============> BE AWARE OF THE MALWARE <============


Via Gust MEES
more...
Gust MEES's curator insight, December 13, 2012 9:05 AM

InSafe is although a good resource since years, use it! BUT InternetSafety ALONE isn't enough, basics of Cyber-Security must ALSO be learned and taught! None of them ONLY ALONE, both together are a MUST in 21st Century!

 

Check out also my FREE courses:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

                ===> BE AWARE OF THE MALWARE <===