21st Century Learning and Teaching
586.2K views | +4 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'IT-Admin', 'cybercrime'. Clear
Scooped by Gust MEES
Scoop.it!

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Scooped by Gust MEES
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | 21st Century Learning and Teaching | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Biggest ever Tor raid hits 410 underground sites; 17 arrested

Biggest ever Tor raid hits 410 underground sites; 17 arrested | 21st Century Learning and Teaching | Scoop.it
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why cyber criminals are winning: The secret weapon of the black hats

Why cyber criminals are winning: The secret weapon of the black hats | 21st Century Learning and Teaching | Scoop.it
Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...
Gust MEES's insight:

Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Education: Remove The Limits

Cyber Security Education: Remove The Limits | 21st Century Learning and Teaching | Scoop.it
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Expert international cybercrime taskforce is launched to tackle online crime | Europol

Expert international cybercrime taskforce is launched to tackle online crime | Europol | 21st Century Learning and Teaching | Scoop.it
1 September 2014

Today the Joint Cybercrime Action Taskforce (J-CAT) is launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3) at Europol, the J-CAT, which is being piloted for six months, will coordinate international investigations with partners working side-by-side to take action against key cybercrime threats and top targets, such as underground forums and malware, including banking Trojans.  The J-CAT will be led by Andy Archibald, Deputy Director of the National Cyber Crime Unit from the UK’s National Crime Agency (NCA).


The J-CAT was initiated by Europol's EC3, the EU Cybercrime Taskforce, the FBI and the NCA, and the J-CAT comprises a team composed of Cyber Liaison Officers from committed and closely involved Member States, non-EU law enforcement partners and EC3. Key contributors to the intelligence pool will be the EU Member States via EC3, and other law enforcement cooperation partners. Thus far, Austria, Canada, Germany, France, Italy, the Netherlands, Spain, the UK and the US are part of the J-CAT. Australia and Colombia have also committed to the initiative.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Gust MEES's insight:

Expert international cybercrime taskforce is launched to tackle online crime | Europol


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Pauline Kershaw's curator insight, September 4, 2014 4:26 AM

The Internet has introduced a whole new range of criminal activity and therefore the police are having to develop ways to combat this. Read this story to see how this is being done.

Scooped by Gust MEES
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee

September EMEA #SecChat – The Economic Impact of Cybercrime - McAfee | 21st Century Learning and Teaching | Scoop.it
Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …
Gust MEES's insight:

Each year between $2-3 trillion of the global economy is generated via the Internet. With cybercrime expected to extract roughly 15-20% of these funds – a total sum of roughly $500 billion – the impact of cybercrime will undoubtedly be felt in the wallets of businesses and individuals alike. Financial loss is just one component …

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Criminals Never Sleep, Nor Should Your Fraud Prevention

Cyber Criminals Never Sleep, Nor Should Your Fraud Prevention | 21st Century Learning and Teaching | Scoop.it
Cyber criminals have substantial capabilities, operate 24/7 and are counting on your lack of education and fraud prevention know-how as their allies.




Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercriminals' Phishing Methods

Cybercriminals' Phishing Methods | 21st Century Learning and Teaching | Scoop.it
In a recent YouTube video, software company Venafi reveals that PayPal phishing attacks are taking advantage of users' trust in wildcard certificates.


Learn more:



Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

OUI, vous êtes réellement une cible pour les cybercriminels ! [PDF]


En savoir plus :


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



Gust MEES's insight:


En savoir plus :


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked Twitter Accounts Can Be More Valuable Than Stolen Credit Cards

Hacked Twitter Accounts Can Be More Valuable Than Stolen Credit Cards | 21st Century Learning and Teaching | Scoop.it

Hackers operate by the same rules of economics as we all do. Thanks to a high profile breach like Target's, a glut of stolen credit cards has made them cheap cheap cheap.

.

So you know what's a more valuable target these days? Your Twitter account.


Gust MEES's insight:


So you know what's a more valuable target these days? Your Twitter account.


No comment yet.
Scooped by Gust MEES
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


Gust MEES's insight:
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime: What does it mean? | ICT | CyberSecurity

Cybercrime: What does it mean? | ICT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

|Explore different types of cybercrime with this collection of animated videos.

Gust MEES's insight:

Explore different types of cybercrime with this collection of animated videos.


Scooped by Gust MEES
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | 21st Century Learning and Teaching | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Gust MEES's insight:

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.

Scooped by Gust MEES
Scoop.it!

Who Costs the Company More? Employees or Cybercriminals?

Who Costs the Company More? Employees or Cybercriminals? | 21st Century Learning and Teaching | Scoop.it
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why you’re not as secure as you think you are

Why you’re not as secure as you think you are | 21st Century Learning and Teaching | Scoop.it
There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time and time again, we see these companies fail to effectively protect sensitive customer data.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen | 21st Century Learning and Teaching | Scoop.it
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Twitter Chat | The Economic Impact Of Cybercrime

Twitter Chat | The Economic Impact Of Cybercrime | 21st Century Learning and Teaching | Scoop.it
.   . Twitter Chat | The Economic Impact Of Cybercrime .   On Thursday, September 4th there will be #SecChat who will explore the  The Economic Impact Of Cybercrime and is an hour-long Tw...


Join as ===> lurkers <=== to learn from the experts!


Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security | The Economic Impact Of Cybercrime [pdf]

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How Much Money Do Cybercriminals Earn?

How Much Money Do Cybercriminals Earn? | 21st Century Learning and Teaching | Scoop.it
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


No comment yet.
Scooped by Gust MEES
Scoop.it!

JA, sie sind tatsächlich ein Angriffsziel für Cyber-Kriminelle! [PDF]

Warum gerade Sie?


Verbrechen wie Betrug, Identitätsdiebstahl oder Erpressung sind, seit zivilisierte Gesellschaften existieren, ein Teil unseres täglichen Lebens. Ziel eines Verbrechers ist immer das Gleiche: so viel Geld wie möglich, so einfach wie möglich und mit so wenig Risiko wie möglich erbeuten. Traditionell war dies schwierig, weil Kriminelle oft auf Ihren Standort beschränkt ,waren und sich körperlich mit ihren Opfern auseinandersetzen mussten.

Dies hat nicht nur den Opferkreis begrenzt sondern auch die Kriminellen einem höheren Risiko ausgesetzt. Allerdings hat sich das Verbrechen mit dem Aufkommen des Internet und der Online-Technologie radikal verändert.

Heutzutage können Cyber-Kriminelle ganz einfach fast jeden in der Welt mit wenig oder gar keinen Kosten und einem sehr geringem Risiko angreifen. Zusätzlich organisieren sich die .Cyber-Kriminellen immer besser und werden dadurch effizienter und effektiver als je zuvor.

Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Yes, YOU Actually Are A Target For Cyber Criminals! [PDF]

Why You Are Targeted
Crimes such as fraud, identity theft or extortion have existed for as long as there have been civilizations, they are a part of our daily lives.


A criminal’s goal has always been the same: to make as much money as possible, as easily as possible, and with as little risk as possible.


Traditionally, this was difficult because criminals were often limited by their location and had to physically interact with their intended victims.


This not only limited whom criminals could target, but also exposed criminals to a great deal of risk. However, crime has radically changed
with the advent of the Internet and online technology.


Now cyber criminals can easily target almost everyone in the world, with little or no cost, and at very little risk. Additionally, cyber criminals have become highly organized .and efficient, enabling them to be more effective than ever


Learn more:



Gust MEES's insight:


Yes, YOU Actually Are A Target For Cyber Criminals!


Learn more:




Stephanie Georgiadis's curator insight, August 25, 2014 7:04 AM

2. Yes You Are A Target is a great source of information. It gives an overview of the topic, reasons why you could be a target and ways on how you can prevent it from happening. It is very informative and gives a good amount of information so you don't have to read ten pages.