21st Century Learning and Teaching
586.1K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Learning IT-Security'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Study finds 90 percent have no recent cybersecurity training

Study finds 90 percent have no recent cybersecurity training | 21st Century Learning and Teaching | Scoop.it
A new ESET study finds that only 1 in 10 consumers have had any classes or training about protecting their computer and/or their personal information during the last 12 months.

 

Indeed, a shocking 68 percent say they have never had any such training, ever. These and other findings, first revealed by ESET at the Virus Bulletin conference in Dallas, come just in time for National Cyber Security Awareness Month.

 

http://www.staysafeonline.org/ncsam

 

 

Frankly, I find these numbers alarming in their implications for cybersecurity, the protection of the data streams that have become the lifeblood of our digital economy and our nation’s critical infrastructure. These findings also cast doubt on the perennial assertion by some experts that security problems mainly arise from the stupidity of users.

 

In light of these survey results it is worth asking whether the stupidity lies more with those who expect to achieve system security without providing any education on the subject to the people who use the systems.

 

===========================================

 

Gust MEES

 

There is a need for Cyber-Hygiene, please read my blog:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

===========================================

 

Read more, a MUST:

http://blog.eset.com/2012/10/10/study-finds-90-percent-have-no-recent-cybersecurity-training

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Is Public WiFi Safe? [INFOGRAPHIC]

Is Public WiFi Safe? [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
In the past year public Wi-Fi usage has gone up 240%, but the questions we should be asking: do we need to protect ourselves when we use it and how can be keep ourselves secure?

 

Gust MEES

 

Read also my FREE course where YOU will find advice about it and also a FREE program who allows YOU to surf secure here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

European Cyber Security Month begins!

European Cyber Security Month begins! | 21st Century Learning and Teaching | Scoop.it

The European Cyber Security Month (ECSM), a pilot project across Europe, assessed and organised by the European Network and Information Security Agency (ENISA) begins today and takes place during the whole month of October.

 

The objectives of the European Cyber Security Month are promotion of cyber security awareness among citizens, modification of their perception of cyber threats, as well as provision of updated security information through education and competitions. The range of activities throughout Europe includes TV and daily radio advertisements; social media campaigns; news articles; conferences and student fairs.

 

The countries most engaged with the initiative are the Czech Republic,===>  Luxembourg <===, Norway, Romania, Slovenia, Spain, Portugal, and the United Kingdom which are participating with various activities and events to raise awareness of cyber security.

 

============================================

Gust MEES

 

Read also my FREE courses about basic IT-Security, Cybersecurity to learn on How To get best protection and best reflexes to stay secure:

 

1.) Why should I? Good question, isn't it? Check below, please...

 

- http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

2.) Why IT-Security? Why the need to secure my computer?

 

- http://gustmees.wordpress.com/2012/05/28/not-only-rights-but-also-responsibility/

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

3.) How can I help and How can I get best protection?

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/  lots of FREE courses, use them... Even thought provoking ones, good to get other ideas... Critical Thinking and Proactive Thinking explained...

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

               ===> Be aware of the malware!!! <===

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Searching for images on Bing? Beware malicious Blackhat SEO poisoning

Searching for images on Bing? Beware malicious Blackhat SEO poisoning | 21st Century Learning and Teaching | Scoop.it
Trust your search engine results? Read how image searches within Bing are being poisoned by attackers in order to drive web traffic to malicious sites.

 

Gust MEES

 

BTW: Never use a search engine (which ever one) without having installed special programs on your computer who give YOU advice if a website and/or image is trustful and/or infected!

 

Please read my FREE courses about basic IT-Security where YOu will find also these FREE programs which install in less than 5 minutes, YOU should to get best protection:

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity: Stop.Think.Connect. Campaign Materials | Homeland Security

Cybersecurity: Stop.Think.Connect. Campaign Materials | Homeland Security | 21st Century Learning and Teaching | Scoop.it

The Stop.Think.Connect. Online Toolkit is an all-inclusive, Campaign resource all in one box. This Toolkit contains downloadable materials and links to other resources you can use to give informal or formal presentations to a variety of audiences or groups.

 

Read more:

http://www.dhs.gov/stopthinkconnect-campaign-materials

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring Your Own Device | The White House

Bring Your Own Device | The White House | 21st Century Learning and Teaching | Scoop.it

A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs


August 23, 2012

Product of the Digital Services Advisory Group and Federal Chief Information Officers Council

 

Read more:

http://www.whitehouse.gov/digitalgov/bring-your-own-device

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ghostshell leaks 120,000 records from top 100 universities

Ghostshell leaks 120,000 records from top 100 universities | 21st Century Learning and Teaching | Scoop.it
Summary: The hacktivist group behind Project Hellfire claims to have leaked records from 100 of the top universities around the world.

 

 

 

Read more:

http://www.zdnet.com/ghostshell-leaks-120000-records-from-top-100-universities-7000005118/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How You Can Get Involved in National Cyber Security Awareness Month

How You Can Get Involved in National Cyber Security Awareness Month | 21st Century Learning and Teaching | Scoop.it
Microsoft On the Issues is the Microsoft blog on technology policy and corporate affairs.

 

If each of us does our part—implementing stronger security practices, raising community awareness, educating young people to become good digital citizens and training employees—together we will be a more resilient and safer digital society.

Creating a safer and more secure Internet begins with STOP. THINK. CONNECT.

 

Take security measures, understand the potential consequences of your actions and behaviors and enjoy the benefits of the Internet. It also means:

 

· Keeping a Clean Machine and making sure your devices are malware- free and have updated software, Web browsers and operating systems.

 

· Owning Your Online Presence by setting security and privacy settings on websites to your comfort level for information sharing.

 

· Throwing Out Suspicious Links in emails, advertisements, social media posts and other communications.

 

· Being a Good Digital Citizen and posting only about others as you would have them post about you.

 

Getting involved in National Cyber Security Awareness Month is easy – even if you only have five minutes to spare. Here are some ways you can make a difference this National Cyber Security Awareness Month:

 

Read more:

http://blogs.technet.com/b/microsoft_on_the_issues/archive/2012/10/02/how-you-can-get-involved-in-national-cyber-security-awareness-month.aspx

 

Gust MEES (14 years of basic IT-Security praxis)

 

Check out also my FREE courses about basic IT-Security:

 

- https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Hackers infiltrate US government nuclear network

Hackers infiltrate US government nuclear network | 21st Century Learning and Teaching | Scoop.it

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.


According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.


A subsequent statement given to FoxNews.com appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2213690/hackers-infiltrate-us-government-nuclear-network?utm_campaign=V3_co_uk&amp;amp;utm_source=Twitter&amp;amp;utm_medium=Twitterfeed

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

European Cyber Security Month

Neelie Kroes launches European Cyber Security Month in October 2012 - a network of events in 8 European countries to highlight the importance of cybersecurity - and offer some simple tips for how to stay webwise and safe online. http://www.enisa.europa.eu/activities/cert/security-month/pilots. ;

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google schließt 44 Chrome-Lücken

Google schließt 44 Chrome-Lücken | 21st Century Learning and Teaching | Scoop.it
Google hat seinen Web-Browser Chrome in der neuen Version 22 bereit gestellt. Darin haben die Entwickler 44 Sicherheitslücken beseitigt. Außerdem enthält Chrome 22 eine neue Programmierschnittstelle für den Zugriff auf Mausdaten.

 

                                        ===> UPDATE!!! <===

 

No comment yet.
Suggested by Christino Martin
Scoop.it!

How to Be always Secured on Facebook [Infographic]

How to Be always Secured on Facebook [Infographic] | 21st Century Learning and Teaching | Scoop.it
Infographics on Facebook Security Guide to stay away from Spam and Hacking in Social Networking world with Facebook Spamming Apps with Implementing Security...

 

Read more, a MUST:

http://allinfographics.org/how-to-be-always-secured-on-facebook-a-to-z-security-guide/

 

Damian Urbowicz's curator insight, December 13, 2022 1:31 PM

jak byc chronionym przed cyber atakami podczas korzystania z  facebooka?

Scooped by Gust MEES
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | 21st Century Learning and Teaching | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets

Learning basics of IT-Security, Cybersecurity: How Cybercriminals Choose Their Targets | 21st Century Learning and Teaching | Scoop.it
Attackers look for companies with poor defenses and a lack of security skills, so no business, not even an SMB, is immune.

 

Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They're looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.


There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: No business, no individual is immune. Whether you're Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached.

 

Read more, a MUST:

http://www.informationweek.com/smb/security/how-cybercriminals-choose-their-targets/240007409

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac-focused malware is big and getting bigger

Mac-focused malware is big and getting bigger | 21st Century Learning and Teaching | Scoop.it
Despite the Mac reputation as being more secure because of Apple’s tight control over its vertically integrated ecosystem, Mac-specific malware and advanced persistent attacks (APTs) against human rights groups is on the rise, cautions Citizen Lab...

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28671/macfocused-malware-is-big-and-getting-bigger/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

National Cyber Security Awareness Month | Homeland Security

National Cyber Security Awareness Month | Homeland Security | 21st Century Learning and Teaching | Scoop.it
The cyber threat has become one of the most serious economic and national security challenges we face. America’s competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity.

============================================

 

Gust MEES

 

Read also my FREE courses about basic IT-Security, Cybersecurity to learn on How To get best protection and best reflexes to stay secure:

 

1.) Why should I? Good question, isn't it? Check below, please...

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

2.) Why IT-Security? Why the need to secure my computer?

 

http://gustmees.wordpress.com/2012/05/28/not-only-rights-but-also-responsibility/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

3.) How can I help and How can I get best protection?

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/   lots of FREE courses, use them... Even thought provoking ones, good to get other ideas... Critical Thinking and Proactive Thinking explained...

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

                       ===> Be aware of the malware!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker Group Breaches Thousands of University Records

Hacker Group Breaches Thousands of University Records | 21st Century Learning and Teaching | Scoop.it

A team of hackers claims to have broken into more than 120,000 computer accounts at dozens of universities to protest what it sees as the high cost and low quality of higher education.

The group, called “Team GhostShell,” claimed responsibility on Monday for the computer attacks in a post to an online bulletin board.

 

The post listed the universities that were the group’s targets, including Harvard University and the Universities of Cambridge and Tokyo.

 

Read more:

http://chronicle.com/blogs/wiredcampus/hacker-group-breaches-thousands-of-university-records-to-protest-higher-education/40348

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Europe 2012 : l'Europe s'entraîne à subir des attaques DDos

Cyber Europe 2012 : l'Europe s'entraîne à subir des attaques DDos | 21st Century Learning and Teaching | Scoop.it
L'Enisa mène chaque année des « stress test » destinés à tester les mesures de sécurité des réseaux européens. Ce jeudi, une attaque par déni de service d'envergure a été dirigée notamment c...

 

Après la constitution d'un centre européen d'intervention d'urgence (CERT-UE), l'Europe compte améliorer les collaborations entre Etats-membres.

 

===> La Commission indique également qu'à l'avenir, des exigences en matière de sécurité informatique devraient être imposées au secteur privé. <===

 

En savoir plus :

 

http://www.clubic.com/antivirus-securite-informatique/cyberpolice/actualite-514645-cyber-europe-2012.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Risk Calculator | Facebook

Risk Calculator | Facebook | 21st Century Learning and Teaching | Scoop.it

RSA, The Security Division of EMC, Bedford

 

What's YOUR Identity Risk Score? Take the TEST: ONLINE IDENTITY RISK CALCULATOR

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Presidential Proclamation -- National Cybersecurity Awareness Month, 2012 | The White House

Presidential Proclamation -- National Cybersecurity Awareness Month, 2012 | The White House | 21st Century Learning and Teaching | Scoop.it

NATIONAL CYBERSECURITY AWARENESS MONTH, 2012

- - - - - - -

BY THE PRESIDENT OF THE UNITED STATES OF AMERICA

A PROCLAMATION

 

Today, Americans are more connected to each other and to people around the world than ever before. Many of us depend on the Internet and digital tools in our daily lives -- from shopping at home and banking on our mobile devices to sharing information with friends across the globe. And America far outpaces the rest of the world in adoption of cutting-edge wireless broadband technology.

 

Our growing reliance on technology reminds us that our digital infrastructure is not just a convenience; it is a strategic national asset. During National Cybersecurity Awareness Month, we recommit to ensuring our information and infrastructure remain secure, reliable, and resilient.

 

Read more, a MUST:

http://www.whitehouse.gov/the-press-office/2012/10/01/presidential-proclamation-national-cybersecurity-awareness-month-2012

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Hackers Try to Infiltrate White House Computers

Hackers Try to Infiltrate White House Computers | 21st Century Learning and Teaching | Scoop.it
At the start of National Cyber Security Awareness month, the White House is the latest target of a cyberattack, according to a new report.m...

 

Read more, a MUST:

http://mashable.com/2012/10/01/white-house-hacked-computers/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basic IT-Security visually + with music: Ich bin online

Im Rahmen einer Präventionsmaßnahme zur Online Sicherheit des LKA Sachsen-Anhalt ist dieses Lied/Video entstanden.
Neben der ehem. angelas park Sängerin und Udo Lindenberg Panikpreisträgerin, ist im Video die Band in my days zu sehen.

No comment yet.
Scooped by Gust MEES
Scoop.it!

E-Safety – the role for educators

E-Safety – the role for educators | 21st Century Learning and Teaching | Scoop.it

The Network Information Security in Education, 2012 report by the European Network and Information Security Agency outlines the role educators can play in teaching positive and responsible online behaviour to students.

 

The report stresses the importance of not making assumptions about children’s knowledge on e-Safety issues due to the many misconceptions which exist about appropriate use of the Internet. Issues which educators are likely to be aware of, such as keeping passwords secure and not downloading copyright material, may be viewed quite differently by students. Many teenagers share passwords with each other as a sign of true friendship and many see internet content as public property and download music, videos and images without a thought of the legal issues of copyright.

 

The report sets out ways educators can help children use technology wisely and safely:

 

Gianfranco D'Aversa's comment September 26, 2012 9:38 AM
Ok Gust. I'm sorry for the mistake :(
Gust MEES's comment, September 26, 2012 12:18 PM
Hi Gianfranco, no problem. It happens also sometimes to me, don't worry ;) When I make a typo error I am always happy when somebody else reports it to me... Have a great day :)
Suggested by Christino Martin
Scoop.it!

Mobile Apps Permission - Find out what Your Apps are doing [Infographic]

Mobile Apps Permission - Find out what Your Apps are doing [Infographic] | 21st Century Learning and Teaching | Scoop.it
Infographics on Case study at Mobile Android Apps Permission vulnerability, starting Apps integration at 2AM on Google Play Store with malware attack on tablet...

 

You might be wondering what this Title means. But it’s the fact of today. While many of us might not know this but this has become a good security point to talk on. Most of the time when we just download any kind of Apps from the Google Play or Android Market, it always prompt to give permission to access the device, and most people including us, actually don’t pay attention to it and simply go ahead to download the app.

 

However, this is just equal to a Bad idea of giving the entire access of your Phone contents to the app which could lead to possible data theft, spam, malware and what not! According to the Research done by us, found us a good evidence that an average Android app always asks for 124 different types of permissions. While we have also found one shocking fact that almost 33% of the App asks for more permissions than the actual required.

 

Read more, a MUST:

http://allinfographics.org/mobile-apps-permission-find-out-what-your-apps-are-doing-at-2-am/

 

 

Christino Martin's comment, September 27, 2012 8:51 AM
And please could you just remove the warning now..since all the warnings has been removed now ... just got confirmation from the owner(friend)
Gust MEES's comment, September 27, 2012 8:58 AM
Hi, OK it's removed now, thx.
Christino Martin's comment, September 27, 2012 9:01 AM
thanks