E-Learning-Inclusivo (Mashup)
1.1M views | +4 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE...

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE... | E-Learning-Inclusivo (Mashup) | Scoop.it
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

making better use of digital technology for teaching and learning;

developing the digital competences and skills needed for living and working in an age of digital transformation; and

improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 


Via Gust MEES
Gust MEES's curator insight, January 31, 2018 10:07 AM
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

  • making better use of digital technology for teaching and learning;

  • developing the digital competences and skills needed for living and working in an age of digital transformation; and

  • improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 

Rescooped by juandoming from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Hackerangriff auf Apple: Diese Apps sind betroffen | MobileSecurity

Hackerangriff auf Apple: Diese Apps sind betroffen | MobileSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Apple hat bekanntgegeben, dass der hauseigene App Store erfolgreich von Hackern angegriffen wurde. Im Rahmen des Angriffs wurden hunderte Apps mit schädlichem Code infiziert, die anschließend zum Download bereitstanden.


Learn more / En savoir plus / Mehr erfahren:

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

.

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XcodeGhost+malware+sneaks+into+the+App+Store...



Via Gust MEES
Gust MEES's curator insight, September 21, 2015 9:05 AM
Apple hat bekanntgegeben, dass der hauseigene App Store erfolgreich von Hackern angegriffen wurde. Im Rahmen des Angriffs wurden hunderte Apps mit schädlichem Code infiziert, die anschließend zum Download bereitstanden.


Learn more / En savoir plus / Mehr erfahren:

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

.

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XcodeGhost+malware+sneaks+into+the+App+Store...


Rescooped by juandoming from Wiki_Universe
Scoop.it!

Digitizing The World Could Be Worth $11 Trillion By 2025 | Privacy | CyberSecurity | Internet Of Things

Digitizing The World Could Be Worth $11 Trillion By 2025 | Privacy | CyberSecurity | Internet Of Things | E-Learning-Inclusivo (Mashup) | Scoop.it
Creating the "Internet of Things" by connecting everyday objects like factory machines, vehicles and buildings to the web could be worth between $3.9 trillion and $11.1 trillion by 2025,

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities

 


Via Gust MEES, NikolaosKourakos
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs | E-Learning-Inclusivo (Mashup) | Scoop.it

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it?

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.

In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Via Gust MEES
Gust MEES's curator insight, June 2, 2015 5:56 AM

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? 

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.


In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Rescooped by juandoming from Technology Advances
Scoop.it!

Internet of Everything: Technologies & Minds (How the future is happening now) | Internet Of Things

Internet of Everything: Technologies & Minds  (How the future is happening now) | Internet Of Things | E-Learning-Inclusivo (Mashup) | Scoop.it
The Internet of Everything (IoE) represents the next “world-changing” revolution, after the Industrial Revolution of 1750 – 1900, and following the Computer & Internet revolution which started in the 1950’s. It is an exciting scenario in which objects, personal devices, even animals communicate, take Intelligent decisions, and autonomous actions on their own without human interaction. This revolution will completely transform industrial sectors and the entire world, for all of us, in ways as powerful as the Industrial Revolution and even more. It is our future, and it is happening now.

How is it happening? For an Evolution of Technologies, and with a Revolution of Minds…

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 


Via Gust MEES, Lynnette Van Dyke
No comment yet.
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Internet of Things is Transforming Family Life | Internet Of Everything

Internet of Things is Transforming Family Life | Internet Of Everything | E-Learning-Inclusivo (Mashup) | Scoop.it
Internet of Things (IoT) is transforming family life through the wireless connection of devices in the home, such as smart meters and security systems, helping to save money and increase peace of mind.

The IoT report and highlights that approximately one in four people in Germany, Japan, the UK and the US already own a connected device such as a smart meter (28 percent), security system (23 percent), lighting system (23 percent), or health monitor (23 percent), underscoring the growing impact of wireless connectivity and the Internet of Things on the lives of consumers.

The research also indicates that the uptake of connected devices is set to grow rapidly over the coming years, with 89 percent of all respondents confirming that they would like all of their household devices to be seamlessly connected together in the future.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, March 3, 2015 10:06 AM
Internet of Things (IoT) is transforming family life through the wireless connection of devices in the home, such as smart meters and security systems, helping to save money and increase peace of mind.

The IoT report and highlights that approximately one in four people in Germany, Japan, the UK and the US already own a connected device such as a smart meter (28 percent), security system (23 percent), lighting system (23 percent), or health monitor (23 percent), underscoring the growing impact of wireless connectivity and the Internet of Things on the lives of consumers.

The research also indicates that the uptake of connected devices is set to grow rapidly over the coming years, with 89 percent of all respondents confirming that they would like all of their household devices to be seamlessly connected together in the future.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Julie Williams's curator insight, March 3, 2015 1:29 PM

So now you have to worry about keeping your 'house' of the internet as well as you kids ! 

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, February 9, 2015 10:12 AM
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Spencer Tan's curator insight, February 20, 2015 11:49 AM

Thus with the above news from Cisco one can be sure that with the increase of devices, internet security will be the next big thing and top investment from Small Business to Large Scale Enterprises? One could deny the need of investing in as simple as SSL certificates to DOS prevention  or even large scale hardware and Software firewall.


I deem ICT companies will make a big ding investing in specialization of deploying and implementing in Internet Security.


Also Read up on how to verify that the Website you visit or intend to make purchases is secure. 


Insights from Spencer Tan

Rescooped by juandoming from Luxembourg (Europe)
Scoop.it!

Le gouvernement annonce la création d'une nouvelle agence de cybersécurité | CyberSecurity | ANSSI

Le gouvernement annonce la création d'une nouvelle agence de cybersécurité | CyberSecurity | ANSSI | E-Learning-Inclusivo (Mashup) | Scoop.it

Le Conseil de gouvernement a adopté, ce mercredi 21 janvier, un projet d’arrêté grand-ducal destiné à fixer la gouvernance en matière de gestion de la sécurité de l’information et modifiant l’arrêté grand-ducal déterminant l’organisation et les attributions du CERT gouvernemental.

 

Le projet propose la création d’une Agence nationale de la sécurité des systèmes d’information (ANSSI) pour le secteur public et les infrastructures critiques, avec, en parallèle, "une amélioration de la collaboration avec les services se trouvant en dehors du périmètre couvert par l’Agence, qui se traduira par la conclusion d’accords de coopération".




Via Gust MEES
Gust MEES's curator insight, January 28, 2015 5:12 AM

Le Conseil de gouvernement a adopté, ce mercredi 21 janvier, un projet d’arrêté grand-ducal destiné à fixer la gouvernance en matière de gestion de la sécurité de l’information et modifiant l’arrêté grand-ducal déterminant l’organisation et les attributions du CERT gouvernemental.

 

Le projet propose la création d’une Agence nationale de la sécurité des systèmes d’information (ANSSI) pour le secteur public et les infrastructures critiques, avec, en parallèle, "une amélioration de la collaboration avec les services se trouvant en dehors du périmètre couvert par l’Agence, qui se traduira par la conclusion d’accords de coopération".


Rescooped by juandoming from business analyst
Scoop.it!

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
The New Security Landscape of IoT


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES, michel verstrepen
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

La maison connectée | Internet Of Things | YouTube

Au salon International CES qui se tient à Las Vegas du 6 au 9 janvier 2015, une large place est consacrée à la "maison intelligente", avec beaucoup d'électroménag...


En savoir plus :



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks | E-Learning-Inclusivo (Mashup) | Scoop.it
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Via Gust MEES
Gust MEES's curator insight, December 30, 2014 9:22 AM
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip | E-Learning-Inclusivo (Mashup) | Scoop.it

Software sollte generell immer auf dem neuesten Stand sein. Manche Programme sind aber besonders gefährdet – Virenbefall und Hacker-Angriffe drohen. Aktualisieren Sie sie schnellstmöglich!


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Via Gust MEES
Rescooped by juandoming from Trending Intelligence
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | E-Learning-Inclusivo (Mashup) | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES, Next Level
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers discover many more Cisco routers infected with malicious firmware | CyberSecurity

Researchers discover many more Cisco routers infected with malicious firmware | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Attackers have installed malicious firmware on nearly 200 Cisco routers used by businesses from over 30 countries.

Via Gust MEES
Gust MEES's curator insight, September 22, 2015 6:35 AM

Attackers have installed malicious firmware on nearly 200 Cisco routers used by businesses from over 30 countries.


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

'Sometimes I'm terrified' of the Internet of Things, says father of the Internet | CyberSecurity

'Sometimes I'm terrified' of the Internet of Things, says father of the Internet | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

"Sometimes I'm terrified by it," he said in a news briefing Monday at the Heidelberg Laureate Forum in Germany. "It's a combination of appliances and software, and I'm always nervous about software -- software has bugs."

The Internet of Things will offer the ability to manage many of the appliances we depend on, acknowledged Cerf, who won the Turing Award in 2004. With its ability to continuously monitor such devices, it also promises new insight into our use of resources, he said.

Devices such as Google's Nest thermostat, for instance, can "help me decide how well or poorly I've chosen my lifestyle to minimize cost and my use of resources -- it can be an important tool," he said.

As with so many technological tools, however, there are plenty of potential downsides. Safety is one of them.

Cerf is now vice president and chief Internet evangelist at Google, but you won't find him enjoying any of the massage chairs the company provides for its employees. "I know they're run by software -- I worry they will fold up on me," he quipped.

As more such appliances are run by software, people will be increasingly reliant on programmers' ability to write good code, he pointed out.

"It's fraught with issues, some technical and some legislative," he said. "Who is liable when an appliance doesn't work the way it should, and what if that's a software question?"


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



Via Gust MEES
Gust MEES's curator insight, August 26, 2015 11:09 AM

Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

"Sometimes I'm terrified by it," he said in a news briefing Monday at the Heidelberg Laureate Forum in Germany. "It's a combination of appliances and software, and I'm always nervous about software -- software has bugs."

The Internet of Things will offer the ability to manage many of the appliances we depend on, acknowledged Cerf, who won the Turing Award in 2004. With its ability to continuously monitor such devices, it also promises new insight into our use of resources, he said.

Devices such as Google's Nest thermostat, for instance, can "help me decide how well or poorly I've chosen my lifestyle to minimize cost and my use of resources -- it can be an important tool," he said.

As with so many technological tools, however, there are plenty of potential downsides. Safety is one of them.

Cerf is now vice president and chief Internet evangelist at Google, but you won't find him enjoying any of the massage chairs the company provides for its employees. "I know they're run by software -- I worry they will fold up on me," he quipped.

As more such appliances are run by software, people will be increasingly reliant on programmers' ability to write good code, he pointed out.


"It's fraught with issues, some technical and some legislative," he said. "Who is liable when an appliance doesn't work the way it should, and what if that's a software question?"


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Did you know that the "Internet of Things" means Integration Test Hell? | ICT | eSkills

Did you know that the "Internet of Things" means Integration Test Hell? | ICT | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it
In “Building the Web of Things”[1] Dominique Guinard and Vlad Trifa give the following definition:

The Internet of Things is a system of physical objects that can be discovered, monitored, controlled or interacted with by electronic devices which communicate over various networking interfaces, and eventually can be connected to the wider Internet

This definition approaches the set of ideas given in the diagram.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities


Via Gust MEES
Gust MEES's curator insight, June 11, 2015 9:07 AM
In “Building the Web of Things”[1] Dominique Guinard and Vlad Trifa give the following definition:

The Internet of Things is a system of physical objects that can be discovered, monitored, controlled or interacted with by electronic devices which communicate over various networking interfaces, and eventually can be connected to the wider Internet

This definition approaches the set of ideas given in the diagram.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Digital (4) Education : Die Schule von morgen | EDUcation | Luxembourg | eLEADERship | eSkills

Digital (4) Education : Die Schule von morgen | EDUcation | Luxembourg | eLEADERship | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it
Um die Schüler auf die Arbeitsplätze von morgen optimal vorzubereiten, muss die Schule sich der modernen Informations- und Kommunikationstechnologien bedienen. Am Mittwoch stellte Bildungsminister Claude Meisch die Strategie "Digital (4) Education" vor, mit der die Schüler von heute, deren Lebenswirklichkeit bereits in weiten Teilen eine digitale ist, auf morgen vorbereitet werden sollen.

Via Gust MEES
Gust MEES's curator insight, May 20, 2015 10:51 AM

Um die Schüler auf die Arbeitsplätze von morgen optimal vorzubereiten, muss die Schule sich der modernen Informations- und Kommunikationstechnologien bedienen. Am Mittwoch stellte Bildungsminister Claude Meisch die Strategie "Digital (4) Education" vor, mit der die Schüler von heute, deren Lebenswirklichkeit bereits in weiten Teilen eine digitale ist, auf morgen vorbereitet werden sollen.


Gust MEES's curator insight, May 20, 2015 10:53 AM

Um die Schüler auf die Arbeitsplätze von morgen optimal vorzubereiten, muss die Schule sich der modernen Informations- und Kommunikationstechnologien bedienen. Am Mittwoch stellte Bildungsminister Claude Meisch die Strategie "Digital (4) Education" vor, mit der die Schüler von heute, deren Lebenswirklichkeit bereits in weiten Teilen eine digitale ist, auf morgen vorbereitet werden sollen.


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip | E-Learning-Inclusivo (Mashup) | Scoop.it

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand.

.

Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Or even worse a combination of all the above; plus a malware or trojan laden url embedded in it.

.

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.

.

Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Via Gust MEES
Gust MEES's curator insight, March 8, 2015 3:21 PM

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.


Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Rescooped by juandoming from Best Freeware Software
Scoop.it!

Enhanced Mitigation Experience Toolkit | CyberSecurity Tools

Enhanced Mitigation Experience Toolkit | CyberSecurity Tools | E-Learning-Inclusivo (Mashup) | Scoop.it
Das Hilfsprogramm Enhanced Mitigation Experience Toolkit (EMET) versucht zu verhindern, dass Sicherheitsrisiken unter Windows ausgenutzt werden.

Via Gust MEES
Gust MEES's curator insight, February 22, 2015 9:52 AM

Das Hilfsprogramm Enhanced Mitigation Experience Toolkit (EMET) versucht zu verhindern, dass Sicherheitsrisiken unter Windows ausgenutzt werden.


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Infographic on Data Breaches in the US in 2014 | CyberSecurity

Infographic on Data Breaches in the US in 2014 | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
The 27001 Academy has produced an informative infographic that illustrates key details of the nearly 800 reported data breaches in the U.S. that occurred in 2014 - up about 20% from 2013.

Surprisingly, despite the sharp increase in the number of breaches seen last year, the actual number of records that were compromised was down more than


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES



Via Gust MEES
Gust MEES's curator insight, January 31, 2015 10:14 AM
The 27001 Academy has produced an informative infographic that illustrates key details of the nearly 800 reported data breaches in the U.S. that occurred in 2014 - up about 20% from 2013.

Surprisingly, despite the sharp increase in the number of breaches seen last year, the actual number of records that were compromised was down more than


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it

Following Edward Snowden's leaks unveiling NSA and GCHQ surveillance, privacy has become a hot topic - and the IoT could pose great challenges...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesfr.wordpress.com/



Via Gust MEES
Gust MEES's curator insight, January 7, 2015 10:26 AM

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesde.wordpress.com/



Mony Chávez's curator insight, January 8, 2015 1:35 PM

Súper importante, considerarlo a cualquier edad.

Wron Ga's curator insight, January 18, 2015 1:41 PM

Kolejny post który temat opiera sie na biezpiecznym internecie, twórzmy go razem i zabiezpieczajmy przed skażonymi treściami i niedozwolonymi dla tych najmlodzsych

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

World's Biggest Data Breaches | Selected losses greater than 30,000 records | Learning basics of CyberSecurity

World's Biggest Data Breaches | Selected losses greater than 30,000 records | Learning basics of CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES



Via Gust MEES
Iva Santos's curator insight, January 5, 2015 7:55 PM

Segurança e educação devem andar juntos.

 

Oksana Borukh's curator insight, January 7, 2015 2:15 AM

Nice visualization of data breaches by year, by type, by industry etc.

Wron Ga's curator insight, January 18, 2015 1:46 PM

Ukazuje wizualizacje najwiekszych danych,sztuczek oraz przecieków  dotyczacych róznych premier danego producenta

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World | E-Learning-Inclusivo (Mashup) | Scoop.it
The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Via Gust MEES
Gust MEES's curator insight, December 21, 2014 10:44 AM

The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Regin: Top-tier espionage tool enables stealthy surveillance

Regin: Top-tier espionage tool enables stealthy surveillance | E-Learning-Inclusivo (Mashup) | Scoop.it
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from Symantec, Backdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.

Via Gust MEES
Gust MEES's curator insight, November 23, 2014 12:52 PM

An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from SymantecBackdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/