Web 2.0 for juandoming
274.5K views | +9 today
Web 2.0 for juandoming
Una Nueva Sociedad, un nuevo orden de las cosas!
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

NSA infected 50,000 computer networks with malicious software

NSA infected 50,000 computer networks with malicious software | Web 2.0 for juandoming | Scoop.it
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information.

Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | Web 2.0 for juandoming | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES
Jhonathan Garcia's curator insight, July 10, 2013 9:33 PM

Social Media Security Post:  Be careful with all the things you post!

Michelle Gilstrap's curator insight, July 11, 2013 1:13 PM

Never show photos of your vacation while you are on vacation. Always show photos when you get back home.

Carmenne Kalyaniwala's curator insight, October 15, 2013 2:36 AM

An infographic with some important information we can share with students

Rescooped by juandoming from Cloud Central
Scoop.it!

Picking Cloud Platforms: What Is Right for Your Business?

Picking Cloud Platforms: What Is Right for Your Business? | Web 2.0 for juandoming | Scoop.it
NEWS ANALYSIS: Don't follow the herd when making your technology choices. And don't make the same old assumptions about the capabilities of cloud computing.

Via Peter Azzopardi
Peter Azzopardi's curator insight, April 1, 2013 11:11 AM

Although security is no longer a major issue, it is going to be very difficult to convince certain entities, whose business it is to deal with sensitve client data, to switch to the Public cloud. On the other hand, a Private cloud is not going to be lowering costs enough to entice a switch. Enter the Hybrid, the best solution for companies that still mistrust the Public cloud.

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | Web 2.0 for juandoming | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.

Via Gust MEES
Gust MEES's curator insight, February 4, 2013 8:32 AM

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Google Web History vor dem 1. März 2012 löschen

Google Web History vor dem 1. März 2012 löschen | Web 2.0 for juandoming | Scoop.it
Datenschützer empfehlen den Usern die Löschung der Google Web History bevor die neuen Datenschutz-Regeln bei Google am 1. März in Kraft treten. So funktioniert es.

Via Gust MEES
No comment yet.
Rescooped by juandoming from e-Xploration
Scoop.it!

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness | Web 2.0 for juandoming | Scoop.it
D'anciens juges de la cour censée surveiller l'agence de renseignement américaine ont dénoncé à plusieurs reprises des collectes illégales de données.

Via luiy
luiy's curator insight, November 20, 2013 4:39 AM

DONNÉES COLLECTÉES ILLÉGALEMENT, EXPLOITÉES LÉGALEMENT


Dans son ordonnance, Colleen Kollar-Kotelly s'interroge notamment sur deux techniques, qui permettent d'enregistrer les informations entrantes et sortantes des communications téléphoniques (et potentiellement internet) : le "pen register"et les "trap & trace devices". Des méthodes de collecte jamais clairement définies par la loi, qui englobent selon elle "un spectre exceptionnellement large de collecte" de données.


Le juge John Bates, qui lui a succédé en 2006, abonde dans son sens : "La NSA a continuellement outrepassé les limites de l'acquisition légale" d'informations."Presque chaque" enregistrement réalisé par le programme "comprenait des données dont la collecte n'était pas autorisée", écrit-il. Or, le quotidien britannique rapportait en août qu'un vide juridique permettait à l'agence américaine d'exploiterdes informations collectées illégalement (en dehors de tout mandat), mais "par inadvertance". Quelques jours plus tard, l'actuel président de la FISC, Reggie B. Walton, reconnaissait dans le Washington Post manquer de moyens pour menersa mission de surveillance de la NSA.

Rescooped by juandoming from Didactics and Technology in Education
Scoop.it!

Startpage Web Search

Startpage Web Search | Web 2.0 for juandoming | Scoop.it

Via Gust MEES, Rui Guimarães Lima
Scooped by juandoming
Scoop.it!

Big Data and a Renewed Debate Over Privacy

Big Data and a Renewed Debate Over Privacy | Web 2.0 for juandoming | Scoop.it
The dawn of mainframe computers offered huge technological benefits, but also challenged notions of privacy. Now Big Data is bringing similar expectations and concerns.
Intriguing Networks's curator insight, March 25, 2013 7:22 AM

Mainframe and Big Data Privacy the debate continues but is it any dfferent?

Rescooped by juandoming from Life @ Work
Scoop.it!

Twitter Attacked: Quarter-Million Accounts May Be Compromised

Twitter Attacked: Quarter-Million Accounts May Be Compromised | Web 2.0 for juandoming | Scoop.it

Twitter issued a blog post late Friday announcing a possible security breach and live attack that may have given hackers access to 250,000 users' information. 


Via Barb Jemmott
Barb Jemmott's curator insight, February 1, 2013 8:48 PM

This post shows a sample of email communications from Twitter to users who may have been compromised by this attack. As a Twitter user you may find this information helpful.