Trustworthy Computing | 21st Century Learning and Teaching | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

 

Attackers’ motivations have changed since 2004 and now ===> financial gain is a primary motivation for the activity we see in the threat landscape. <===

 

Attackers have had to broaden the repertoire of tactics they use to attempt to compromise systems; most of the attacks we see today rely on social engineering - trying to get users to bring badness from the Internet through their host based firewalls via web browsers, peer to peer networks, document parsers, email, social networks, etc.

 

Gust MEES: #Internetsafety, #Onlinesafety and #itsecurity are part of 21st Century Learning!