Information Technology & Social Media News
131.0K views | +2 today
Follow
Information Technology & Social Media News
Mobile Marketing and Technology are my passions.... those are the ones I can confess ;-)
Your new post is loading...
Your new post is loading...
Rescooped by Jesús Hernández from Future of Cloud Computing, IoT and Software Market
Scoop.it!

Security Is Key To The Success Of Industry 4.0

Security Is Key To The Success Of Industry 4.0 | Information Technology & Social Media News | Scoop.it

The need to outperform competitors makes it imperative for manufacturing organizations to protect their intellectual property. Manufacturers need to raise the bar when it comes to security and in order to reap the benefits of Industry 4.0, leaders must support IT teams to help them secure networks.


Via JC Gaillard, massimo facchinetti
No comment yet.
Rescooped by Jesús Hernández from Future of Cloud Computing, IoT and Software Market
Scoop.it!

Cybersecurity landscape: How to thwart cyberattacks

Cybersecurity landscape: How to thwart cyberattacks | Information Technology & Social Media News | Scoop.it
Simon London speaks with McKinsey senior partner David Chinn and cybersecurity expert Robert Hannigan, formerly the head of GCHQ, about how to address the major gaps and vulnerabilities in the global cybersecurity landscape.

Via JC Gaillard, massimo facchinetti
No comment yet.
Rescooped by Jesús Hernández from Future of Cloud Computing, IoT and Software Market
Scoop.it!

Cybersecurity Threats in the Age of IoT

Cybersecurity Threats in the Age of IoT | Information Technology & Social Media News | Scoop.it
Everybody can appreciate cyber security and, in this current climate, must be knowledgeable of it.

Via compliance4all, massimo facchinetti
No comment yet.
Rescooped by Jesús Hernández from Technology in Business Today
Scoop.it!

Tips on how to Protect your Anonymity online

Tips on how to Protect your Anonymity online | Information Technology & Social Media News | Scoop.it
Staying anonymous online might seem impossible, but there are several measures that web users can take to protect their privacy

Via TechinBiz
No comment yet.
Rescooped by Jesús Hernández from visualizing social media
Scoop.it!

Social Media Security Tips [INFOGRAPHIC]

Social Media Security Tips [INFOGRAPHIC] | Information Technology & Social Media News | Scoop.it

In the past 5 years social media growth has exploded around the globe and, as platforms such as Twitter and Facebook expand and begin to increasingly mirror and reflect “real life”, they take on many of the problems of the offline world, too.

For example: security. With millions of social media views, updates and registrations taking place literally each and every minute, the potential for identify thieves, hackers and good, old-fashioned burglars to exploit your personal information has never been greater.

Which means it’s solely your responsibility to ensure you’re protecting yourself when using these channels...


Via Lauren Moss
aanve's curator insight, March 7, 2014 9:46 PM

www.aanve.com

 

Ajo Monzó's curator insight, March 27, 2014 4:08 AM

very interesting and clear, thanks!

Javier Antonio Bellina's curator insight, March 27, 2014 5:41 PM

Brechas de Seguridad en las Redes Sociales: Una Infografía:

Rescooped by Jesús Hernández from Security-And-Privacy
Scoop.it!

How To Avoid Getting Hacked!!!

How To Avoid Getting Hacked!!! | Information Technology & Social Media News | Scoop.it

Via TheSoulfulEMU
TheSoulfulEMU's curator insight, September 10, 2013 2:13 PM

Stay safe! Adopt the right practices towards tight security. You data is precious, dont let it get into wrong hands.

Rescooped by Jesús Hernández from Didactics and Technology in Education
Scoop.it!

INFOGRAPHIC: How A Data Breach Happens

INFOGRAPHIC: How A Data Breach Happens | Information Technology & Social Media News | Scoop.it
Data Breach: Here is an informative infographic reviewing data breaches as well as another one (below) created by the group at: cloudhance.com

Via Peter Azzopardi, Rui Guimarães Lima
Peter Azzopardi's curator insight, March 18, 2013 6:57 PM

Some interesting stats here.

 

Rescooped by Jesús Hernández from Future of Cloud Computing, IoT and Software Market
Scoop.it!

Cybersecurity Is Putting Customer Trust at the Center of Competition

Cybersecurity Is Putting Customer Trust at the Center of Competition | Information Technology & Social Media News | Scoop.it

If you’re selling a product, you’re now selling trust.


Via JC Gaillard, massimo facchinetti
No comment yet.
Rescooped by Jesús Hernández from Daily Magazine
Scoop.it!

Nanotechnology and The Future of Renewables

Nanotechnology and The Future of Renewables | Information Technology & Social Media News | Scoop.it

For many people, understanding the unique challenges of nanotechnology can feel a little overwhelming. After all, the general consensus is, that it will be quicker to list what nanotechnology won’t change. One element that this technology is likely to have a profound effect on though, is the usage and the popularity of renewable energy, which is further explained here.

 

Still seen today by many skeptics as a waste of time in regards to the challenge of climate change, renewable energy is set to become a major determining factor of our century and beyond. To this end, it appears that a major branch of technology influencing the fulfillment of this goal, will be nanotechnology.


Via THE OFFICIAL ANDREASCY
THE OFFICIAL ANDREASCY's curator insight, October 29, 2018 1:59 AM

The art of going small.

 

(Article by: @Andreas Christodoulou / aka ANDREASCY)

 

Andreas Christodoulou's comment, October 29, 2018 2:00 AM
Now, more than ever, we are faced against the major implications deriving from the uncontrollable use of non-renewable sources of energy. Our contemporary lifestyle, demands that we drive research and practice, towards alternative sources of energy, such that will deal with the current and future energy crisis. In this respect, nanotechnology, seems to be a promising tool to the future of sustainable and efficient renewable energy. Some of the premises from this branch of technology, are explored in this article.
Rescooped by Jesús Hernández from Cloud Technology
Scoop.it!

How to use enterprise Wi-Fi security in SMBs

How to use enterprise Wi-Fi security in SMBs | Information Technology & Social Media News | Scoop.it
No matter what size your business, using WPA2 security is a good first step to protecting your Wi-Fi network. Don't blow it by using the standard's not-so-secure PSK mode.

Via RingCentral
No comment yet.
Rescooped by Jesús Hernández from Technology in Business Today
Scoop.it!

Android adware 'infects Millions' of Phones and Tablets

Android adware 'infects Millions' of Phones and Tablets | Information Technology & Social Media News | Scoop.it

Via TechinBiz
No comment yet.
Rescooped by Jesús Hernández from Security-And-Privacy
Scoop.it!

Is Your Private Information Safe on Social Media? [Infographic]

Is Your Private Information Safe on Social Media? [Infographic] | Information Technology & Social Media News | Scoop.it
An infographic detailing which states have the most identity fraud complaints, the most popular strategies used, and some ways to protect yourself.

Via Gust MEES, TheSoulfulEMU
Gust MEES's curator insight, August 5, 2013 8:54 AM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

Gust MEES's curator insight, August 5, 2013 8:55 AM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

TheSoulfulEMU's curator insight, September 24, 2013 10:17 AM

"Eye-Brow raising Stats & Facts to Wake up & Protect your Privacy, & Stay Safe Online"

Rescooped by Jesús Hernández from Social Media 4 Education
Scoop.it!

Infographic: Hackers Create An Amazing, Illegal Portrait Of The Internet

Infographic: Hackers Create An Amazing, Illegal Portrait Of The Internet | Information Technology & Social Media News | Scoop.it

It wasn’t malicious. The file itself was the size of a small JPEG. It was given the absolute lowest priority. And it was set to self-destruct if anything went wrong. But this small file allowed one single hacker to measure the Internet activity of nearly half a million connected devices around the world, then share the results with everyone.

How was this even possible? The "hacker" barely hacked anything. In reality, they gained access to all these systems because each had the default "root" set as a password. With this access in hand, they ran several tests focusing on Internet structure and activity. And what they created from all this data is a spectacular map that captures a day in the life of the Internet (and all of its users).


Via Lauren Moss, Ivo Nový
Annenkov's comment, May 10, 2013 11:24 PM
США и Европа как очаги информатизации
Sakis Koukouvis's comment, May 11, 2013 3:17 AM
Wonderful
Nacho Vega's curator insight, May 11, 2013 12:18 PM

Creative power: hacking at the end of the world!

 

Using "root" as universal key :))

Scooped by Jesús Hernández
Scoop.it!

Samsung KNOX, seguridad en entornos empresariales con Android

Samsung KNOX, seguridad en entornos empresariales con Android | Information Technology & Social Media News | Scoop.it
Samsung KNOX es una plataforma destinada a mejorar la seguridad de dispositivos Android de Samsung que se usan en entornos laborales y también personales
No comment yet.