21st Century Learning and Teaching
586.1K views | +6 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Awareness', 'IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness

Windows moins vulnérable que Mac OS X ou Linux | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.


Gust MEES's insight:

par Stéphane Larcher, le 23 février 2015 16:16

La National Vulnerability Database vient de publier les chiffres pour 2014. Contrairement aux idées reçues, Windows (toutes versions confondues) s’est révélé moins vulnérable que Mac OS X, iOS ou Linux. Toutefois, Microsoft n’a pas non plus de raison de pavoiser car Internet Explorer est l’application la plus vulnérable, très loin devant les autres.

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is Browser Hijacking? | Cyber Security

What is Browser Hijacking? | Cyber Security | 21st Century Learning and Teaching | Scoop.it

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Gust MEES's insight:

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Roger Smith's curator insight, October 13, 2014 7:03 PM

Another sneaky way that the bad guys get ya!

mbeva's curator insight, October 14, 2014 7:21 AM

hack!!!!

Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

SANS: IT Information Security Awareness Training

SANS: IT Information Security Awareness Training | 21st Century Learning and Teaching | Scoop.it
The SANS Securing The Human Program provides IT/information security awareness training to address everything your organization needs to secure your employees, contractors, IT staff, and management.


"Wow! This is the first security awareness document that our users really like! Thank you, SANS"


That note came from the CISO of an 8,000 employee organization. OUCH! is the world's leading, free security awareness newsletter designed for the common computer user. Published every month and in multiple languages, each edition is carefully researched and developed by the SANS Securing The Human team, SANS instructor subject matter experts and team members of the community.


Each issue focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization. OUCH! is distributed under the Creative Commons BY-NC-ND 3.0 license. You are encouraged to distribute OUCH! within your organization or share with family and friends, the only limitation is you cannot modify nor sell OUCH!.



Gust MEES's insight:


Bookmark THIS GREAT resource and LEARN from it!


Learn more:


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to avoid digital dangers while traveling

How to avoid digital dangers while traveling | 21st Century Learning and Teaching | Scoop.it
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices it’s never been easier to find one’s way around, record memories, and stay in touch with friends back home.

 

But while technology makes traveling easier, a recent F-Secure survey pinpointed digital areas that need special consideration while on the road.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WiFi

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Scooped by Gust MEES
Scoop.it!

How to keep your business safe – the one checklist all SMBs should have [Infographic]

How to keep your business safe – the one checklist all SMBs should have [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, June 24, 2013 11:04 AM

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

How your webcam can spy on you

How your webcam can spy on you | 21st Century Learning and Teaching | Scoop.it

Once installed, the “remote administration tool” (RAT) software allows hackers to take control of the machine at any time – similar to how IT workers fix office computers remotely.

 

Hackers can then use a victim’s home computers as if sitting at it – doing everything from switching on the webcam to looking through personal files on the hard drive.

 

Mr Neate said: “The most at-risk computers are those running older software, and those without up-to-date anti-virus software installed.”

Gust MEES's insight:

 

Mr Neate said: “The most at-risk computers are those running older software, and those without up-to-date anti-virus software installed.”

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

Gust MEES's curator insight, June 23, 2013 8:19 AM

 

Mr Neate said: “The most at-risk computers are those running older software, and those without up-to-date anti-virus software installed.”

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

Scooped by Gust MEES
Scoop.it!

10 security best practice guidelines for businesses

10 security best practice guidelines for businesses | 21st Century Learning and Teaching | Scoop.it
Businesses need extreme security measures to combat extreme threats. Here are ten best practices that provide defense against the majority of all security threats.
Gust MEES's insight:

 

                      ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 4:04 PM

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers | Cyber Security

Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers | Cyber Security | 21st Century Learning and Teaching | Scoop.it
Hackers are exploiting a security flaw in Microsoft PowerPoint to attack computer systems


Fortunately, the attack requires user interaction the attack requires user interaction, so you would have to consent to open the file containing an infected OLE object. So if you tried to download a PowerPoint file from the web, a display prompt would ask for download permission. Consent prompts are fairly common, however, so users might not even realize they're granting permission to an infected file.


As for now, Microsoft suggests users avoid opening any PowerPoint files from an untrusted source.


Gust MEES's insight:

As for now, Microsoft suggests users avoid opening any PowerPoint files from an untrusted source.

Roger Smith's curator insight, October 25, 2014 6:22 AM

Zero exploits are one of the most destructive way for hackers to gain access to computers and smart devices. 

Scooped by Gust MEES
Scoop.it!

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
DIY stalker device uniquely IDs people by tracking radio signals they emit.


The research pair first envisioned Snoopy more than two years ago to underscore how much data could be gathered by a collection of devices that are within the capability and budget of a die-hard hobbyist.


With a price tag of under $200 for the Snoopy spying node and $1,650 for the optional flying drone, the resulting proof-of-concept is even more instructive in the post-Snowden world that has since emerged.


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


Gust MEES's insight:


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Security awareness training: Why it matters

Security awareness training: Why it matters | 21st Century Learning and Teaching | Scoop.it

Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including Procter & Gamble, European Central Bank, Deutsche Telecom and Bayer.

What you want is a change in behavior of individuals and a cultural change in the company as a whole. To achieve this goal, you must repeatedly confront employees with possible threats and show them best practices.


Also, the role of the managers is crucial. It is important to train trainers in their role and be sure that they practice good behavior on a day-to-day basis. Safety is not about knowledge in most cases, but it is all about “awareness” in the true sense of the word.


You only reach a higher level of awareness if safety is an issue that repeatedly is discussed and addressed.



Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to risk your job in 7 security mistakes

How to risk your job in 7 security mistakes | 21st Century Learning and Teaching | Scoop.it
It’s tricky sometimes to get your job done while sticking to all those pesky rules around confidentiality and data protection. Being escorted out of the building for security negligence is not some...
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Scooped by Gust MEES
Scoop.it!

Ingénierie sociale (Social Engineering) Comment les criminels abusent de votre serviabilité

Ingénierie sociale (Social Engineering) Comment les criminels abusent de votre serviabilité | 21st Century Learning and Teaching | Scoop.it
Il est 2 heures du matin. Le téléphone sonne : c'est un informaticien de la société pour laquelle vous travaillez. Il vous alerte qu'un virus informatique a infecté les ordinateurs de votre bureau, détruisant les documents de tous les collaborateurs.
Gust MEES's insight:

 

CASES est une structure du ministère de l’Economie et du Commerce extérieur et du G.I.E. SMILE (Security made in Lëtzebuerg). CASES désigne les Cyberworld Awareness & Security Enhancement Services et est le portail national pour la sécurité de l'information des petites et moyennes entreprises, citoyens et administrations au Grand-Duché de Luxembourg.


Lien :


- http://www.cases.lu

 

Gust MEES's curator insight, June 25, 2013 1:24 PM

 

CASES est une structure du ministère de l’Economie et du Commerce extérieur et du G.I.E. SMILE (Security made in Lëtzebuerg). CASES désigne les Cyberworld Awareness & Security Enhancement Services et est le portail national pour la sécurité de l'information des petites et moyennes entreprises, citoyens et administrations au Grand-Duché de Luxembourg.

 

Lien :

 

http://www.cases.lu

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW! | 21st Century Learning and Teaching | Scoop.it
. . . ICT Awareness: What YOU SHOULD KNOW! . Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones...) as well as I blog a lot about it and i...

 

 

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Gust MEES's insight:

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Learn more:

 

http://gustmees.wordpress.com

 

Gust MEES's curator insight, June 23, 2013 12:48 PM

 

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please  <===

 

Learn more:

 

http://gustmees.wordpress.com

 

ANGEL UWIMANA's comment, July 24, 2013 11:25 AM
by knowing what is cybersecurity, also using ICT in awareness of right and responsibilities will be an easy way.
Scooped by Gust MEES
Scoop.it!

The second most important BYOD security defense: user awareness

The second most important BYOD security defense: user awareness | 21st Century Learning and Teaching | Scoop.it
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.
Gust MEES's insight:

 

                 ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 4:12 PM

 

                ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

Scooped by Gust MEES
Scoop.it!

New update for Mozilla Firefox

New update for Mozilla Firefox | 21st Century Learning and Teaching | Scoop.it

Mozilla releases Firefox 14 and encrypts Google searches by default

Adds improved mouse recognition in games
By Lawrence Latif
Tue Jul 17 2012, 16:00


SOFTWARE DEVELOPER Mozilla has released Firefox 14 for desktop operating systems.
Mozilla's Firefox web browser has received its six-week update with Firefox 14 automatically encrypting Google searches and supporting the Pointer Lock API. Mozilla has also included support for fullscreen mode in Mac OS X 10.7.


Mozilla said it encrypts Google search data by default, adding that users can now easily verify the identity of a web site by clicking on an icon to the left of the URL. According to Mozilla, the addition of search encryption is particularly handy for those using Firefox on wireless connections.

 

Source: The Inquirer http://www.theinquirer.net/inquirer/news/2192288/mozilla-releases-firefox-14-and-encrypts-google-searches-by-default?utm_campaign=INQ&amp;amp;utm_source=Twitter&amp;amp;utm_medium=Twitterfeed

 

 

Gust MEES: I will include in the future also updates for your browsers as for e-Learning IT-Security is a MUST!!! So, update your browsers, please. Check out also my free courses about IT-Security to be sure that your devices for e-Learning are updated:

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

 

 

 

No comment yet.