21st Century Learning and Teaching
586.1K views | +3 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'IT-Admin', 'Cyberespionage'. Clear
Scooped by Gust MEES
Scoop.it!

Destroying your hard drive is the only way to stop this super-advanced malware

Destroying your hard drive is the only way to stop this super-advanced malware | 21st Century Learning and Teaching | Scoop.it

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Geheimdienst überwacht Filesharer: Neue Enthüllung im Spionage-Skandal

Geheimdienst überwacht Filesharer: Neue Enthüllung im Spionage-Skandal | 21st Century Learning and Teaching | Scoop.it
Der kanadische Geheimdienst hat Geheimdokumenten zufolge gezielt Nutzer von Filehostern überwacht
Gust MEES's insight:

Der kanadische Geheimdienst hat Geheimdokumenten zufolge gezielt Nutzer von Filehostern überwacht


No comment yet.
Scooped by Gust MEES
Scoop.it!

Canadian Government Continues to Expand State Powers While Leaving Privacy by the Wayside

Canadian Government Continues to Expand State Powers While Leaving Privacy by the Wayside | 21st Century Learning and Teaching | Scoop.it
The Canadian government is scheduled to release new security legislation on Friday that would grant even more power to its police and domestic security agencies. This proposal comes in response to a string of "lone wolf" shootings of soldiers in Canada last October.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:

The Canadian government is scheduled to release new security legislation on Friday that would grant even more power to its police and domestic security agencies. This proposal comes in response to a string of "lone wolf" shootings of soldiers in Canada last October.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/




No comment yet.
Scooped by Gust MEES
Scoop.it!

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills | 21st Century Learning and Teaching | Scoop.it

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Gust MEES's insight:

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA shares 850 billion metadata records via Google-like tool

NSA shares 850 billion metadata records via Google-like tool | 21st Century Learning and Teaching | Scoop.it
The National Security Agency has a "Google-like" search engine designed to share 850 billion records about emails, phone calls, internet chats, and more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Quran Coaching's curator insight, August 27, 2014 1:24 PM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Scooped by Gust MEES
Scoop.it!

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées | 21st Century Learning and Teaching | Scoop.it
Mets-en de côté, ça peut servir.


La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Gust MEES's insight:

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.

.


Gust MEES's curator insight, April 30, 2014 1:11 PM

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Scooped by Gust MEES
Scoop.it!

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
DIY stalker device uniquely IDs people by tracking radio signals they emit.


The research pair first envisioned Snoopy more than two years ago to underscore how much data could be gathered by a collection of devices that are within the capability and budget of a die-hard hobbyist.


With a price tag of under $200 for the Snoopy spying node and $1,650 for the optional flying drone, the resulting proof-of-concept is even more instructive in the post-Snowden world that has since emerged.


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


Gust MEES's insight:


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Has Been Hijacking the Botnets of Other Hackers

NSA Has Been Hijacking the Botnets of Other Hackers | 21st Century Learning and Teaching | Scoop.it
The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.
Gust MEES's insight:


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Gust MEES's curator insight, March 12, 2014 9:36 PM


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Scooped by Gust MEES
Scoop.it!

Yes, you do have something to hide

Yes, you do have something to hide | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

- - http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...

 

http://www.scoop.it/t/securite-pc-et-internet/?q=NSA

 

Scooped by Gust MEES
Scoop.it!

How to avoid digital dangers while traveling

How to avoid digital dangers while traveling | 21st Century Learning and Teaching | Scoop.it
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices it’s never been easier to find one’s way around, record memories, and stay in touch with friends back home.

 

But while technology makes traveling easier, a recent F-Secure survey pinpointed digital areas that need special consideration while on the road.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WiFi

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Scooped by Gust MEES
Scoop.it!

Are cyber attacks more dangerous than physical attacks?

Are cyber attacks more dangerous than physical attacks? | 21st Century Learning and Teaching | Scoop.it

Eighty percent of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Gust MEES's insight:

 

===> Eighty (80%) percent <=== of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

Gust MEES's curator insight, June 26, 2013 7:02 AM

 

===> Eighty (80%) percent <=== of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: Targeted attacks via employee inboxes

INFOGRAPHIC: Targeted attacks via employee inboxes | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Targeted attacks via employee inboxes. Threat actors target enterprises and organizations for espionage and sabotage.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Canada Joins World Powers in Spying on Smartphone and Download Data

Canada Joins World Powers in Spying on Smartphone and Download Data | 21st Century Learning and Teaching | Scoop.it
In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It's the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming---at least in the surveillance realm.
Gust MEES's insight:

In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It's the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming---at least in the surveillance realm.


No comment yet.
Scooped by Gust MEES
Scoop.it!

PressTV-Canada monitors all internet downloads all around the world

PressTV-Canada monitors all internet downloads all around the world | 21st Century Learning and Teaching | Scoop.it
Canada’s electronic spy agency reportedly tracks and analyzes up to 15 million file downloads from all around the world per day.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...


Gust MEES's insight:
Canada’s electronic spy agency reportedly tracks and analyzes up to 15 million file downloads from all around the world per day.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Digital Arms Race: NSA Preps America for Future Battle - SPIEGEL ONLINE | CyberWar | CyberSecurity

The Digital Arms Race: NSA Preps America for Future Battle - SPIEGEL ONLINE | CyberWar | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit"

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit" | 21st Century Learning and Teaching | Scoop.it
Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.
Gust MEES's insight:

Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon | 21st Century Learning and Teaching | Scoop.it

Nations must be ready for a remote attack on critical infrastructure, including power and transport systems, says security expert. 




- Risk one: DDoS attack


Risk two: attacking critical data


Risk three: damaging infrastructure



In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.

Gust MEES's curator insight, May 1, 2014 9:42 AM

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.


Scooped by Gust MEES
Scoop.it!

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | 21st Century Learning and Teaching | Scoop.it
The Heartbleed bug is unusually worrisome because it could possibly be used by the NSA or other spy agencies to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — as well as the private keys that vulnerable web sites use to encrypt your traffic to them.


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.

Gust MEES's insight:


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!


Gust MEES's curator insight, April 10, 2014 11:03 AM


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!



Learn more:



Scooped by Gust MEES
Scoop.it!

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No.

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No. | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
No comment yet.
Scooped by Gust MEES
Scoop.it!

mSpy: A terrifying app for spying on another smartphone or tablet user

mSpy: A terrifying app for spying on another smartphone or tablet user | 21st Century Learning and Teaching | Scoop.it
Those of you interested in preserving your privacy will want to watch out for the mSpy app. When installed on an Android or iOS device, it can track phone calls, location data and ...
Gust MEES's insight:

 

WATCH OUT!!! Already more than 1 Million customers!!!

 

David Nandigam's curator insight, November 28, 2013 3:16 PM

“There will come a time when it isn't 'They're spying on me through my phone' anymore. Eventually, it will be 'My phone is spying on me'.” ― Philip K. Dick

Scooped by Gust MEES
Scoop.it!

FBI warns hacking spree on government agencies is a “widespread problem”

FBI warns hacking spree on government agencies is a “widespread problem” | 21st Century Learning and Teaching | Scoop.it

The FBI is warning that members of the Anonymous hacking collective have breached computers belonging to multiple government agencies and made off with sensitive information in a series of attacks that started almost a year ago, according to a published report.

 

 

 

Hack linked to man who said: "You have no idea how much we can f*ck with the US."

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Prism : les appels Skype pas à l’abri des écoutes de la NSA

Prism : les appels Skype pas à l’abri des écoutes de la NSA | 21st Century Learning and Teaching | Scoop.it
Depuis juillet 2012, les agences de renseignement américaines pourraient sans difficulté, et malgré le chiffrement mis en place, écouter des appels Skype.
Gust MEES's insight:

 

En savoir plus :

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Skype

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Guccifer hacks U.S. nuclear security agency chief

Guccifer hacks U.S. nuclear security agency chief | 21st Century Learning and Teaching | Scoop.it

The hacker that goes by the online moniker "Guccifer" continues his crusade agains U.S. current and former government officials, and his latest victim is Neile Miller, acting administrator of the U.S. National Nuclear Security Administration.

Gust MEES's insight:

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???

 

I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...

 
Gust MEES's curator insight, June 17, 2013 6:35 PM

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???


I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...