21st Century Tools for Teaching-People and Learners
102.9K views | +1 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit | 21st Century Tools for Teaching-People and Learners | Scoop.it
Share this news now.Share this news now.In a cybercrime ecosystem populated by commercially available WordPress brute-forcing and mass vulnerable WordPress installation scanning tools, cybercriminals continue actively capitalizing on the platform’s leading market share within the Content Management System’s market segment.


Successfully exploiting tens of thousands of installations on a daily basis, for the purpose of utilizing the legitimate infrastructure to achieve their fraudulent/malicious campaign objectives, the tactic is also largely driven by the over-supply of compromised/accounting data, usually embedded within sophisticated Web-based attack platforms like the ones we’ve profiled in the past.


We’ve recently intercepted a malicious campaign exclusively relying on rogue WordPress sites, ultimately serving client-side …Share this news now.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=WordPress-Security


No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Scooped by Gust MEES
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | 21st Century Tools for Teaching-People and Learners | Scoop.it
OpenVPN - The Open Source VPN
Gust MEES's insight:

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | 21st Century Tools for Teaching-People and Learners | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | 21st Century Tools for Teaching-People and Learners | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Tools for Teaching-People and Learners | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments | 21st Century Tools for Teaching-People and Learners | Scoop.it
Imation’s portable USB desktops transform any computer into an IT-managed workstation, so workers can take all their data, applications and systems with them, securely and reliably.

 

 

 

 

 

Read more:

http://www.imation.com/en-EU/Mobile-Security/Mobile-Security-Products/Secure-Mobile-Workspace/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Video: The expanded threat landscape

Video: The expanded threat landscape | 21st Century Tools for Teaching-People and Learners | Scoop.it
SC Magazine has various news articles and information for IT security professionals.

 

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to create a BYOD policy

How to create a BYOD policy | 21st Century Tools for Teaching-People and Learners | Scoop.it
A BYOD policy can eliminate a lot of the problems associated with bring your own device programs. Learn best practices for creating a BYOD policy.

 

BYOD isn’t a synonym for “free for all.” Once an organization decides to let employees use their own mobile devices and PCs for work, it must put a BYOD policy in place to control this usage.

 

===> Requires Free Membership to View

 

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Malicious phone apps and how to avoid them

Malicious phone apps and how to avoid them | 21st Century Tools for Teaching-People and Learners | Scoop.it

Your phone goes everywhere with you. You keep it at your desk at work, near your bed when you sleep, and in your pocket during dinner. Many people use their phones for mobile banking, keeping in close touch with friends and family over Facebook and Twitter, and sending countless text messages about their daily lives. But do our phones deserve the trust we place in the security of all the information we're giving them?

 

If you choose your apps carefully and give out your personal information sparingly, you'll have no problem at all. But if you download everything and give out your name and address every time you can, you'll be making a huge mistake.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac users 'just as easily duped by cybercriminals' as Windows users

Mac users 'just as easily duped by cybercriminals' as Windows users | 21st Century Tools for Teaching-People and Learners | Scoop.it
In the face of new threats aimed at OS X, a security expert has warned that Mac users may be even more vulnerable than Windows users.

 

Because Windows users are more likely to be running up-to-date anti-virus programs, Graham Cluley of Sophos says that many Mac users are missing a "valuable safety net".

 

In the face of several new threats targeting Mac OS X that have been discovered in recent weeks, Mac users should make sure that they have some form of protection, Cluley said. However, keeping your computer safe from cybercriminals isn't just a case of having anti-virus programs installed - it's about making sensible choices as well.

 

As we have seen on the Windows platform, the majority of the attacks do not exploit any weakness in the operating system but instead take advantage of the bug in people's brains.

 

===> Mac users can be just as easily duped as their Windows cousins into making poor choices, and could end up infected as a result, Cluley told Macworld. <===

 

Use antivirus programs!

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Free first aid kit for computer viruses

Free first aid kit for computer viruses | 21st Century Tools for Teaching-People and Learners | Scoop.it
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malw...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Scooped by Gust MEES
Scoop.it!

Startpage Web Search

Startpage Web Search | 21st Century Tools for Teaching-People and Learners | Scoop.it
Gust MEES's insight:

 

Check this URL for more information:

 

https://startpage.com/eng/protect-privacy.html

 

Learn also more about "Privacy" here:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Privacy

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Privacy

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | 21st Century Tools for Teaching-People and Learners | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Gust MEES's insight:

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackfest: Québec au coeur d'une cyberguerre virtuelle

Hackfest: Québec au coeur d'une cyberguerre virtuelle | 21st Century Tools for Teaching-People and Learners | Scoop.it
La ville de Québec sera cette semaine l'épicentre d'une cyberguerre mondiale où huit pays défendront leur infrastructure informatique tout en attaquant celle de leurs...

 

En savoir plus :

 

http://techno.lapresse.ca/nouvelles/internet/201210/29/01-4587968-quebec-au-coeur-dune-cyberguerre-virtuelle.php?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic]

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic] | 21st Century Tools for Teaching-People and Learners | Scoop.it
Mobile security firm TrustGo Mobile recently released a report that examined the Android threat landscape across 175 Android markets and 1.7 million Android apps.

 

Read more, a MUST:

http://www.securityweek.com/mobile-security-firm-analyzes-17-million-android-apps?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft Security PowerPoint Presentations

Microsoft Security PowerPoint Presentations | 21st Century Tools for Teaching-People and Learners | Scoop.it
Download free PowerPoint presentation templates from Microsoft that you can use to teach classes or groups about computer and Internet security.

 

 

 

Read more:

http://www.microsoft.com/security/resources/powerpoint.aspx

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Stop Think Connect

Stop Think Connect | 21st Century Tools for Teaching-People and Learners | Scoop.it

These posters are a great way to raise awareness about good online safety habits and tips.

 

Our 10 posters offer helpful reminders about everything from keeping a long, strong password to making sure your software is up-to-date.

We encourage you to download them, print them out and post them in your home, office, classroom community centers or religious establishments to get the word out!

 

You can download the posters by clicking on a thumbnail image below or in our Resource Center.

 

===> Gust MEES: great initiative, use it, please! <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The next step in #BYOD #security

The next step in #BYOD #security | 21st Century Tools for Teaching-People and Learners | Scoop.it

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments globally.

 

Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs.

 

===> On the other, there are increased security risks, management issues and even data and device ownership and governance issues. <===

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobility's Situational Unawareness

Mobility's Situational Unawareness | 21st Century Tools for Teaching-People and Learners | Scoop.it
Ignorance, as those in IT security know, is not bliss.

 

And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.

 

===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===

 

No comment yet.