21st Century Learning and Teaching
586.2K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'IT-Admin', 'Nobody-is-perfect'. Clear
Scooped by Gust MEES
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | 21st Century Learning and Teaching | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic]

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Infographic

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds | 21st Century Learning and Teaching | Scoop.it
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.

A posse of German computer scientists has found that Apple's iOS passphrase generator may give yo...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Quicktime-Lücken: Sicherheitsupdate für die letzten drei Mac-OS-X-Versionen

Quicktime-Lücken: Sicherheitsupdate für die letzten drei Mac-OS-X-Versionen | 21st Century Learning and Teaching | Scoop.it
Apple hat ein Sicherheitsupdate für Snow Leopard, Lion und Mountain Lion veröffentlicht. Über HPs Zero Day Initiative wurden in den Mac-OS-X-Versionen gefährliche Sicherheitslücken in der
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Google Docs hijacked by Trojan.APT.Seinup malware

Google Docs hijacked by Trojan.APT.Seinup malware | 21st Century Learning and Teaching | Scoop.it
FireEye spots crooks using old tricks to avoid detection

 

A cyber attack that uses Google Docs to avoid detection in order to steal information has been spotted in the wild.

 

Security firm FireEye reported uncovering the campaign, warning that the crooks are using advanced malware to mount a targeted spear phishing campaign designed to steal corporate and personal data from a variety of victims.

 

FireEye researcher Chong Rong Hwa wrote: "The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN [Association of Southeast Asian Nations]. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."

 

Gust MEES's insight:

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Gust MEES's curator insight, June 23, 2013 10:28 AM

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Jason Toy's curator insight, June 23, 2013 11:04 AM

Interesting read. Looks like FireEye's sandboxing techniques paid off in this regard.