Information Technology & Social Media News
131.0K views | +0 today
Information Technology & Social Media News
Mobile Marketing and Technology are my passions.... those are the ones I can confess ;-)
Your new post is loading...
Your new post is loading...
Rescooped by Jesús Hernández from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | Information Technology & Social Media News | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES, ABroaderView
Jhonathan Garcia's curator insight, July 10, 2013 9:33 PM

Social Media Security Post:  Be careful with all the things you post!

Michelle Gilstrap's curator insight, July 11, 2013 1:13 PM

Never show photos of your vacation while you are on vacation. Always show photos when you get back home.

Carmenne Kalyaniwala's curator insight, October 15, 2013 2:36 AM

An infographic with some important information we can share with students

Rescooped by Jesús Hernández from MarketingHits
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | Information Technology & Social Media News | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES, Brian Yanish - MarketingHits.com
Rescooped by Jesús Hernández from 21st Century Learning and Teaching
Scoop.it!

Infographic: How cyber-secure are public companies?

Infographic: How cyber-secure are public companies? | Information Technology & Social Media News | Scoop.it
This infographic presents some less-than-stellar numbers illustrating how well public companies are securing their web applications.

Via Gust MEES
Rescooped by Jesús Hernández from E-Learning-Inclusivo (Mashup)
Scoop.it!

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic]

Increase of Web Attacks 2010-2012 | mLearning - BYOD [Infographic] | Information Technology & Social Media News | Scoop.it

Via Gust MEES, juandoming
Rescooped by Jesús Hernández from Tecnología21
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | Information Technology & Social Media News | Scoop.it

Via Gust MEES, Gtr99
Rescooped by Jesús Hernández from Pedalogica: educación y TIC
Scoop.it!

20 ways to keep your internet identity safe from hackers

20 ways to keep your internet identity safe from hackers | Information Technology & Social Media News | Scoop.it
Cybercrime costs Britain £27bn a year, and it could cost you dear too if you don't take basic precautions. James Silver asked experts for their top tips

Via Gust MEES, Alazne González
Gust MEES's curator insight, May 12, 2013 7:58 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

Gust MEES's curator insight, May 12, 2013 8:02 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Gust MEES's curator insight, May 12, 2013 8:03 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Rescooped by Jesús Hernández from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

Are you a hacker's target? [infographic]

Are you a hacker's target? [infographic] | Information Technology & Social Media News | Scoop.it
No one dreams of becoming the victim of cybercrime, and the first step to protecting yourself is knowing more about the threats all of us face. Check out this infographic from Solera Networks to se...

Via Gust MEES, ABroaderView
Rescooped by Jesús Hernández from Geeky Tech-Curating
Scoop.it!

The Worldwide Virusmap from F-Secure

The Worldwide Virusmap from F-Secure | Information Technology & Social Media News | Scoop.it

Via Gust MEES, ThePinkSalmon
Gust MEES's curator insight, March 21, 2013 1:41 PM

 

Check it out and use it on your courses to learn about the virus and malware in real time with this interactive map. Watch it minimum 5-10 minutes!!!