21st Century Learning and Teaching
585.9K views | +3 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'SYMANTEC'. Clear
Scooped by Gust MEES
Scoop.it!

Take the Phishing-Quiz | Symantec | CyberSecurity

Take the Phishing-Quiz | Symantec | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Can you tell the difference between a real site and a fake one? 
Do you know how to stay safe online?

See how fast you can recognize the safe site and click on its picture. Learn what to look for when you browse, bank, or shop.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Gust MEES's insight:

Can you tell the difference between a real site and a fake one? 
Do you know how to stay safe online?

See how fast you can recognize the safe site and click on its picture. Learn what to look for when you browse, bank, or shop.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Creepware - Who Is Watching You? | SymantecTV

Creepware - Who Is Watching You? | SymantecTV | 21st Century Learning and Teaching | Scoop.it
SymantecTV : Creepy as it may seem, somebody somewhere could be watching and recording your every move using the webcam attached to your computer. We’ve created this video to show the dangers of creepware and why people should take precautions.
Gust MEES's insight:

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

Targeted Attacks - Security Spotlight Series: Episode Five

Tune in to watch Security Spotlight's fifth episode, on Targeted Attacks. In these attacks cybercriminals target a specific person or company to obtain speci...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Web-Based Attacks, Security Spotlight Episode Two

Tune in to watch Security Spotlight's second episode, on Web-Based Attacks, also known as drive-by--downloads. Web-Based Attacks occur when cyber-criminals e...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Scooped by Gust MEES
Scoop.it!

Mobile Malware - Security Spotlight Series: Episode Three

Tune in to watch Security Spotlight's third episode, on Mobile Malware. In 2012, we saw a 58% increase in mobile malware, and it continues to grow. Cybercrim...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

Scooped by Gust MEES
Scoop.it!

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

The ISTR, which covers the major threat trends observed by Symantec in 2012, reveals that cybercriminals view SMBs as a prime target for stealing information. In fact, the largest growth area for targeted attacks in 2012 was businesses with fewer than 250 employees; 31 percent of all attacks targeted them, representing a threefold increase from 2011.

 

Getting a clear understanding of the dangers is an important step in improving security, and this year’s report is a wake-up call that SMBs are now being specifically targeted by cybercriminals.

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Gust MEES's insight:

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Gust MEES's curator insight, April 22, 2013 1:56 PM

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===


Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

SYMANTEC | Internet Security Threat Report April 2013 [pdf]

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

Gust MEES's insight:

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Gust MEES's curator insight, April 22, 2013 9:10 AM

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

Scooped by Gust MEES
Scoop.it!

Increase in Cyberespionage – Including Threefold Increase in Small Business Attacks | SYMANTEC Report

Increase in Cyberespionage – Including Threefold Increase in Small Business Attacks | SYMANTEC Report | 21st Century Learning and Teaching | Scoop.it

LAS VEGAS, Symantec Vision 2013 – April 16, 2013 

 

Symantec Corp.’s (Nasdaq: SYMC) Internet Security Threat Report, Volume 18 (ISTR) today revealed a 42 percent surge during 2012 in targeted attacks compared to the prior year.

 

Designed to steal intellectual property, these targeted cyberespionage attacks are increasingly hitting the manufacturing sector as well as small businesses, which are the target of 31 percent of these attacks.

 

Small businesses are attractive targets themselves and a way in to ultimately reach larger companies via “watering hole” techniques.

 

===> In addition, consumers remain vulnerable to ransomware and mobile threats, particularly on the Android platform. <===

 

Gust MEES's insight:

 

===> In addition, consumers remain vulnerable to ransomware and mobile threats, particularly on the Android platform. <===


Check also:


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Scooped by Gust MEES
Scoop.it!

Cybercriminals Use Anti-Spam System for Communication Between Malware and Server

Cybercriminals Use Anti-Spam System for Communication Between Malware and Server | 21st Century Learning and Teaching | Scoop.it
Cybercriminals Use Anti-Spam System for Communication Between Malware and Server

 

Cybercriminals are coming up with new ways to ensure that the malware they create can communicate with command and control (C&C) servers. Symantec experts found that they’ve started using the Sender Policy Framework (SPF) to maintain a solid connection between the malicious element and the C&Cs.


Image Credit: SYMANTEC


Gust MEES's insight:

Very tricky, a MUST read!

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Is This Website Safe | Website Security | Norton Safe Web

Is This Website Safe | Website Security | Norton Safe Web | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

Zero-Day World | Symantec Connect Community

Zero-Day World | Symantec Connect Community | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

Zero-Day World

 

Zero-day (zero-hour or day zero) vulnerabilities are previously unknown vulnerabilities that have not been revealed publicly but are exploited by attackers. Discovering and exploiting zero-day vulnerabilities helps cyber criminals to increase the success rate of attacks. Attacks using zero-day exploits are tough to identify and analyze because in many cases information is not available until attacks have already occurred. There is practically no protection against zero-day attacks as details of the vulnerability is usually a mystery when these attacks are first observed.

 

Learn more, a MUST:

http://www.symantec.com/connect/blogs/zero-day-world

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

Gust MEES's insight:

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Die Gewinner im Dauertest über zweieinhalb Jahre: 20 Internet-Sicherheitspakete

Die Gewinner im Dauertest über zweieinhalb Jahre: 20 Internet-Sicherheitspakete | 21st Century Learning and Teaching | Scoop.it
Welche Sicherheitssuite ist die beste? Das renommierte AV-TEST-Institut hat 20 Internet-Sicherheitspakete einem Dauertest unterzogen: Nur eines schneidet mit sehr gut ab, immerhin neun weitere mit gut.

 

 

 

1. Bitdefender

2. Kaspersky

3. Symantec (Norton)

...

 

Gust MEES's insight:

 

1. Bitdefender

2. Kaspersky

3. Symantec (Norton)

...

 

Gust MEES's curator insight, November 19, 2013 11:46 AM

 

 

1. Bitdefender

2. Kaspersky

3. Symantec (Norton)

...

 

Scooped by Gust MEES
Scoop.it!

Home Wi-Fi Network Security - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the topic of what you can do to ensure that your home Wi-Fi network is secure. Protect your...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

Moving Beyond Antivirus with Network Threat Protection

Today's evolved malware requires more than antivirus on the endpoint. Proactive protection involves a layered defense that includes Network Threat Protection...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/12/best-addresses-to-stay-informed-about-it-security-and-cyber-security/

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Ransomware & Malicious Software Threats - Security Spotlight Series: Episode One

Security Spotlight is a program highlighting threat trends in online protection. Our topic this week is Ransomware. This is the first of 5 top security trend...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Scooped by Gust MEES
Scoop.it!

Zero-based Vulnerabilities - Security Spotlight Series

Tune in to watch Security Spotlight's fourth episode on Zero-based Vulnerabilities. These vulnerabilities are simply a pathway cybercriminals find to infiltr...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Scooped by Gust MEES
Scoop.it!

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic]

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=BYOD

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac's are NOT a safer alternative to PC's! Rising number of unique threats for OS X in 2012

Mac's are NOT a safer alternative to PC's! Rising number of unique threats  for OS X in 2012 | 21st Century Learning and Teaching | Scoop.it

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Gust MEES's insight:

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Small Businesses are the Path of Least Resistance for Attackers [Infographic]

Small Businesses are the Path of Least Resistance for Attackers [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Microsoft et Symantec ferment un botnet touchant 8 millions de PC

Microsoft et Symantec ferment un botnet touchant 8 millions de PC | 21st Century Learning and Teaching | Scoop.it

Microsoft annonce avoir fermé un nouveau botnet en collaboration avec Symantec et affectant les requêtes des internautes sur les moteurs de recherche. 

 


Sur l'un de ses blogs officiels, Microsoft explique que le botnet en question, Bamital, était constitué d'environ huit millions d'ordinateurs zombies. Ces derniers étaient infectés d'un malware modifiant les liens cibles au sein des moteurs de recherche. Ce click jacking était opéré sur Google, Bing et Yahoo! ainsi que sur leurs plateformes publicitaires.


Gust MEES's insight:

Microsoft et Symantec ferment un botnet touchant 8 millions de PC


Gust MEES's curator insight, February 7, 2013 8:01 AM

Microsoft et Symantec ferment un botnet touchant 8 millions de PC


Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Malware uses Google Docs as proxy to command and control server | Computerworld New Zealand

Malware uses Google Docs as proxy to command and control server | Computerworld New Zealand | 21st Century Learning and Teaching | Scoop.it
Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order to hide the malicious traffic...

 

Read more, a MUST:

http://computerworld.co.nz/news.nsf/news/malware-uses-google-docs-as-proxy-to-command-and-control-server?opendocument=&amp;amp;utm_source=dlvr.it&amp;amp;utm_medium=twitter&amp;amp;utm_campaign=topnews

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a Global Problem; Increasingly Social and Mobile (2012 Norton Cybercrime Report) : It's Not A Con

Cybercrime is a Global Problem; Increasingly Social and Mobile (2012 Norton Cybercrime Report) : It's Not A Con | 21st Century Learning and Teaching | Scoop.it

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

 

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20% from last year, and that cybercrime impacted just under &frac12; of them in the previous 12 months.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/12/cybercrime-is-a-global-problem-increasingly-social-and-mobile-2012-norton-cybercrime-report/

 

No comment yet.