21st Century Learning and Teaching
585.8K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Learning-Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

What is Naivety in the Digital Age?

What is Naivety in the Digital Age? | 21st Century Learning and Teaching | Scoop.it

[Start Text from Wikipedia]

Naivety (or naïvety, naïveté, etc.), is the state of being naive—having or showing a lack of experience, understanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]

 

=============================================

 

Gust MEES

 

Naivety in the Digital Age means not realizing and accepting the dangers of Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + ...), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough!

 

===> Naif means ALSO thinking that a certain Operating System is secure and perfect! Nobody is perfect: <===

 

- Apple: http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- Linux: http://www.scoop.it/t/securite-pc-et-internet?q=Linux

 

- Windows: everybody knows that already...

 

 

In 21st Century Internet-Safety ALONE isn't enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!

 

Would YOU like to get called a naif because not having those skills?

 

Certainly NOT, so check out my FREE courses please to become a good eCitizen, Digital Citizen and share it with YOUR family, colleagues, friends and...

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

There will be soon a blog created about that topic, so stay tuned and follow my blog here to get the news:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Update: the blog is online now http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

 

=============================================

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

EUROPA - PRESS RELEASES - Cyber-security – a shared responsibility

EUROPA - PRESS RELEASES - Cyber-security – a shared responsibility | 21st Century Learning and Teaching | Scoop.it
European Commission - Press Release - European Commission Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda Information Security Forum Conference, Chicago 4th November 2012 Every day, people worldwide rely...

 

===> Cyber-security should be recognised as a top political priority. <===

 

Here in the US it has long obtained political attention. It is time we do the same in Europe and worldwide.

 

Read more, a MUST:

http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm?locale=en

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

YOU DON’T HAVE TO BE A COMPUTER EXPERT TO KEEP YOUR CHILD SAFE ONLINE. — iKeepSafe

YOU DON’T HAVE TO BE A COMPUTER EXPERT TO KEEP YOUR CHILD SAFE ONLINE. — iKeepSafe | 21st Century Learning and Teaching | Scoop.it

You can help your child become a responsible, ethical digital citizen with healthy online relationships. To do that, you’ll use the same successful parenting skills that you’re already using at home.

 

Resilient digital citizens recognize and seek out the 3Cs—appropriate contact, content, and conduct—in all digital settings (e.g., iPods,instant messaging, chat, computer games, game consoles, cell phones, text messaging, webcams).

 

==========================================

 

Gust MEES

 

In 21st Century there is a MUST to have basic knowledge about Internet-Safety, Internet-Security, Cyber-Security! Lots of strange words, isn't it? But don't be afraid of that, it is much more easy to stay safe on Internet as YOU might think!

 

WE need ONLY to have the right reflexes and spend a bit of time to make the first steps. Remember the first steps YOU made and YOUR kids? Took a bit time before YOU were walking ;) Same when learning to stay secure, a bit effort is needed, but certainly worth to do to protect YOUR Kids, right ;)

 

This website is very interesting, professional and with lots of tips, YOU should watch the videos and read also... First read it and watch the videos and then later together with YOUR Kids, where YOU can explain to them...

 

Check out also my FREE courses about How To know which websites are trustful, easy to install the FREEWARE (takes ONLY +/- 5 minutes) [install it ALSO on YOUR computer]:

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/

 

==========================================

 

To help you teach your children to safely and ethically use their digital devices, iKeepSafe has created the following programs:

 

http://www.ikeepsafe.org/parents/

 

http://www.ikeepsafe.org

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Digital Agenda for Europe - Creating a Better Internet for Kids

Digital Agenda for Europe - Creating a Better Internet for Kids | 21st Century Learning and Teaching | Scoop.it

Keeping kids safe and empowered as they explore the digital world
Kids start using the Internet from the age of 7. Eighty eight minutes is the average time 9-16 year olds spend online. Children need quality content online to stimulate their imagination and help them learn, but they also need the skills and tools for using the Internet safely and responsibly.

 

============================================

 

Gust MEES

 

A very good initiative, though I don't agree with the age of 7! Other reports show age of 3 1/2-4 and I taught my niece already 10 years ago about awareness when she had the age of 4 /12.

 

============================================

 

Read more, a MUST:

http://ec.europa.eu/digital-agenda/en/creating-better-internet-kids

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Deadly Viruses That Small Businesses Should be Wary of [Infographic]

Deadly Viruses That Small Businesses Should be Wary of [Infographic] | 21st Century Learning and Teaching | Scoop.it
Digital viruses can play havoc with your business' computer network.

 

Digital viruses can play havoc with your business’ computer network. Businesses, especially small and medium enterprises, can’t afford to ignore system security. Today’s infographic compares the most debilitating digital viruses to some of the deadliest human viruses of all time.

 

===========================================

Gust MEES

 

Check out also my FREE courses where YOU learn how to protect yourself and others at its best:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/

 

===========================================

 

Read more, a MUST:

http://www.saleschase.com/blog/2012/06/06/deadly-viruses-small-businesses-wary-of/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple fixes Safari security flaws

Apple fixes Safari security flaws | 21st Century Learning and Teaching | Scoop.it
Company bolsters anti-hacker defences...

 

Apple has released an update for its Safari web browser designed to fix a number of security flaws.


The iPhone maker released the Safari update alongside a security patch for its iOS mobile operating system on Friday.
The update aims to protect Safari users from drive-by download attacks and patch a number of Java vulnerabilities within the web browser.


===> Drive-by download attacks use malicious websites that infect machines with malware when visited. <===


The update is available now on Apple's OS X Lion v10.7.5, OS X Lion Server v10.7.5 and OS X Mountain Lion v10.8.2 operating systems.


===> The release follows a number of high-profile attacks on Apple's Mac OS. Prior to the update numerous exploits targeting Safari using Java vulnerabilities had been detected. <===

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2222043/apple-fixes-safari-security-flaws?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercriminals Continue to Improve Skype-Spreading Malware

Cybercriminals Continue to Improve Skype-Spreading Malware | 21st Century Learning and Teaching | Scoop.it
Cybercriminals Continue to Improve Skype-Spreading Malware...

 

At the beginning of October, cybercriminals started spreading some nasty pieces of malware via Skype by using messages such as “lol is this your new profile pic” to trick users into clicking on malicious links.

 

According to security firms, millions of users might have infected their computers after clicking on the suspicious links.

Although the infection rates have dropped since, security researchers say that the individuals responsible for developing and maintaining the threats known as W32.IRCBot.NG and W32.Phopifas haven’t given up on their project.

 

The infection routine remains unchanged, but the developers have added new hosts from which the pieces of malware can be downloaded, Symantec experts explain.

 

Read more, a MUST:

http://news.softpedia.com/news/Cybercriminals-Continue-to-Improve-Skype-Spreading-Malware-303654.shtml?utm_source=twitter&amp;utm_medium=twitter&amp;utm_campaign=twitter_web

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

International cybersecurity exercises grow in popularity

International cybersecurity exercises grow in popularity | 21st Century Learning and Teaching | Scoop.it

While there is growing support for international cybersecurity exercises, more can be done to ensure such exercises are successful, according to a report published Oct. 25 by the European Network and Information Security Agency (ENISA).

 

Read more, a MUST:

http://www.fiercegovernmentit.com/story/international-cybersecurity-exercises-grow-popularity/2012-10-30?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

National Cyber Security Education Council (NCEC)

National Cyber Security Education Council (NCEC) | 21st Century Learning and Teaching | Scoop.it

ABOUT

 

The National Cyber Security Alliance (NCSA) has created the National Cyber Security Education Council (NCEC), a public-­‐private partnership between government and industry to help address formal cybersecurity education in the United States.

 

Read more:

http://www.staysafeonline.org/ncec/about

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Small Business Online Security [Infographic]

Small Business Online Security [Infographic] | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

Zero-Day World | Symantec Connect Community

Zero-Day World | Symantec Connect Community | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

Zero-Day World

 

Zero-day (zero-hour or day zero) vulnerabilities are previously unknown vulnerabilities that have not been revealed publicly but are exploited by attackers. Discovering and exploiting zero-day vulnerabilities helps cyber criminals to increase the success rate of attacks. Attacks using zero-day exploits are tough to identify and analyze because in many cases information is not available until attacks have already occurred. There is practically no protection against zero-day attacks as details of the vulnerability is usually a mystery when these attacks are first observed.

 

Learn more, a MUST:

http://www.symantec.com/connect/blogs/zero-day-world

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Facebook investigates data leak from 1 million accounts

Facebook investigates data leak from 1 million accounts | 21st Century Learning and Teaching | Scoop.it
Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was offered for sale for $5.

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=13870

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Inspiring the Next Generation of Cyber Professionals | Homeland Security

Inspiring the Next Generation of Cyber Professionals | Homeland Security | 21st Century Learning and Teaching | Scoop.it

October 26, 2012
10:51 am

 

At DHS, we’re working to develop the next generation of leaders in cybersecurity while fostering an environment for talented staff to grow in this field.

 

We are building strong cybersecurity career paths within the Department, and in partnership with other government agencies. We are also creating training and development opportunities to retain our most talented employees and ensure their professional development. In collaboration with the National Security Agency, we are strengthening the nation’s educational infrastructure by supporting Centers of Academic Excellence across the country.

 

In addition, we are extending the scope of cyber education beyond the federal workplace through the National Initiative for Cybersecurity Education, involving students from kindergarten through post-graduate school.

 

And we sponsor the U.S. Cyber Challenge, a program that works with academia and the private sector to identify and develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.

 

=============================================

Gust MEES

 

Read also my FREE courses:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

=============================================

 

Read more, a MUST:

http://www.dhs.gov/blog/2012/10/26/inspiring-next-generation-cyber-professionals

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

BYOD: New Android malware disguised as security app

BYOD: New Android malware disguised as security app | 21st Century Learning and Teaching | Scoop.it

Android Security Suite Premium -- loaded with Zeus variant ZitMo ===> is a threat to companies given the bring-your-own-device (BYOD) trend... <===

 

Read more, a MUST:

http://www.csoonline.com/article/708654/new-android-malware-disguised-as-security-app?source=rss_malware_cybercrime&amp;amp;amp;utm_source=dlvr.it&amp;amp;amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Bit9: 25 Percent of Google Play Apps Pose a Security Risk

Bit9: 25 Percent of Google Play Apps Pose a Security Risk | 21st Century Learning and Teaching | Scoop.it
The company says the apps demand a 'suspicious' number of high-risk permissions.

 

According to a new report from Bit9, more than 100,000 Android apps in the Google Play store (25 percent of more than 400,000 apps studied) pose a security risk to users.

 

Read more:

http://www.esecurityplanet.com/mobile-security/bit9-25-percent-of-google-play-apps-pose-a-security-risk.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Surprise! The Most Dangerous Web Sites Aren't Porn Sites

Surprise! The Most Dangerous Web Sites Aren't Porn Sites | 21st Century Learning and Teaching | Scoop.it
The Internet is still not safe, the number of malicious sites is on the rise, and risks may lie in unexpected places.

 

=============================================


Gust MEES

 

Read also my FREE courses:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

=============================================

 

Read more, a MUST:

http://www.technewsdaily.com/4365-porn-dangerous-web-site.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Is This Website Safe | Website Security | Norton Safe Web

Is This Website Safe | Website Security | Norton Safe Web | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Protect Your System from Bad Websites [Infographic]

How to Protect Your System from Bad Websites [Infographic] | 21st Century Learning and Teaching | Scoop.it
In February 2012, the incidence of malware infections on the 25,000 most popular websites was studied. Some of the findings are interesting.

 

Highlights of the infographic:

 

1. Over 10 million people would have been served with malicious software in the month that the survey was done, i.e February 2012.

 

2. United States hosted around half of all infected websites. The Netherlands came in second at 19%.

 

3. 54% of the infected websites are more than 5 years old; 43% of the websites were between 1 and 5 years

 

4. Free-tv-video-online.me, bigresource.com and myplaycity.com are the top 3 infected sites as per Alexa Site Ranking

 

===========================================

 

Gust MEES

 

Check out also my FREE courses where YOU learn how to protect yourself and others at its best:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/

 

===========================================

 

Read more, a MUST:

http://www.saleschase.com/blog/2012/07/01/how-to-protect-your-system-from-bad-websites/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online Safety Posters ¦ Stop Think Connect

Online Safety Posters ¦ Stop Think Connect | 21st Century Learning and Teaching | Scoop.it

These posters are a great way to raise awareness about good online safety habits and tips.

 

Our 10 posters offer helpful reminders about everything from keeping a long, strong password to making sure your software is up-to-date.

 

We encourage you to download them, print them out and post them in your home, office, classroom community centers or religious establishments to get the word out!

 

You can download the posters by clicking on a thumbnail image below or in our Resource Center.

 

=============================================

 

Gust MEES

 

Check out also my FREE courses:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

=============================================

 

Read more, a MUST:

http://stopthinkconnect.org/campaigns/details/?id=76

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Millions of Home Networks Infected by ZeroAccess Botnet

Millions of Home Networks Infected by ZeroAccess Botnet | 21st Century Learning and Teaching | Scoop.it
With more than 2 Million home computers infected, the ZeroAccess Botnet Generates roughly $1 Million in Ad Click fraud daily for cybercriminals.

 

A report from network-based security and analytics vendor Kindsight says that 2.2 million home networks were infected with the ZeroAccess botnet in Q3 2012. This infection rate means that advertisers are losing almost one million dollars a day due to click fraud generated by the botnet, the report adds.

 

ZeroAccess has been around since 2010, and is a business in and of itself. In September, it was estimated that the size of the botnet had grown to one million systems and had been installed over 9 million times globally, with the majority of these infection and installation points located within the U.S.

 

Read more, a MUST:

http://www.securityweek.com/millions-home-networks-infected-zeroaccess-botnet?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a Global Problem; Increasingly Social and Mobile (2012 Norton Cybercrime Report) : It's Not A Con

Cybercrime is a Global Problem; Increasingly Social and Mobile (2012 Norton Cybercrime Report) : It's Not A Con | 21st Century Learning and Teaching | Scoop.it

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

 

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20% from last year, and that cybercrime impacted just under &frac12; of them in the previous 12 months.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/12/cybercrime-is-a-global-problem-increasingly-social-and-mobile-2012-norton-cybercrime-report/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | 21st Century Learning and Teaching | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 

Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Scooped by Gust MEES
Scoop.it!

Learning basics of Cybersecurity: A look at the Russian underground cyber market

Learning basics of Cybersecurity: A look at the Russian underground cyber market | 21st Century Learning and Teaching | Scoop.it
“The Russian shadow economy is an economy of scale, one that is service oriented and that has become a kleptocracy wherein crony capitalism has obtained a new lease on life in cyberspace,” says a new report into the cybercriminal Russian underground.

 

Professor John Walker, chair of the London chapter ISACA and CTO of Secure-Bastion, sees a road-map for APT laid out by the report. “In a nutshell,” he told Infosecurity, “what the Trend Micro report is confirming is that the much debated logical attack vectors of

 

===>  the Advanced Persistent Threat (APT), and the more focused Advanced Evasion Techniques (AET) as reported by StoneSoft are not hype, but reality.<===

 

“In the Trend Micro report,” he continued, “we see the imagination of the Russian Cyber Attacker laid out before our eyes – with some excellent examples of the lengths cyber criminals are prepared to take to underpin a successful mission.

 

===> It is also very clear that, this mission is lucrative, and would seem to imply it is going to be with us for some time yet.” <===

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/29077/a-look-at-the-russian-underground-cyber-market/#.UJFD5MecGjY.twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Phone Safety For Kids

Mobile Phone Safety For Kids | 21st Century Learning and Teaching | Scoop.it

We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/06/mobile-phone-safety-for-kids/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

FBI rolls out roundtheclock cyber crime team

FBI rolls out roundtheclock cyber crime team | 21st Century Learning and Teaching | Scoop.it
One of the chief aims of the new program will be to determine which adversaries are behind cyber attacks against businesses and critical infrastructure.

 

The FBI has introduced a team of specialists, which will be on call 24/7, to investigate cyber threats affecting businesses, critical industries and domestic security -- and possibly determine who's behind on them.

 

Read more, a MUST:

http://www.scmagazine.com/fbi-rolls-out-round-the-clock-cyber-crime-team/article/265894/

 

No comment yet.