#CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
120.9K views | +5 today
Follow
#CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
All About #CyberSecurity #CyberSécurité #Security #Sécurité #CyberDefence #InfoSec #GDPR #RGPD #DevOps #DevSecOps
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Scammers in a Wi-Fi Wonderland

Scammers in a Wi-Fi Wonderland | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it

You’d better watch out, you’d better not cry—you’d better not use that public Wi-Fi. The holiday season is upon us and in addition to more flash sales, baked goods, and travel time—this meansmore online scams. A recent survey of American travelers revealed that the majority of us are not taking measures to protect ourselves when using public Wi-Fi. Numerous forms of malware can be delivered over unsecured connections, so when traveling for the holidays you’re more vulnerable than ever to a cyber break in.

 

That’s why on the road, in the air, or otherwise on the go this holiday season, it’s more important than ever that you watch where you connect.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Great !! LEGO Digital Designer 4.3.8

Great !! LEGO Digital Designer 4.3.8 | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
Get your kids to design LEGO models

Via Gust MEES
more...
Pippa Davies @PippaDavies 's curator insight, December 10, 2013 11:58 AM

Many of my students love this tool and it can be used for fine arts as well!  

Pippa Davies @PippaDavies 's curator insight, December 10, 2013 12:00 PM

Design and play all mixed in together to make learning fun and exciting!  Five stars for this design oriented game which your male students will love!

J Weidenbenner's curator insight, January 3, 2014 9:05 AM

Legos for learning, anyone?

Rescooped by Frederic GOUTH from 21st Century Tools for Teaching-People and Learners
Scoop.it!

8 free tools for creating infographics

8 free tools for creating infographics | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
Don't have hours to spare crafting something beautiful in Photoshop? Sarah James of The Infographic Design Company selects 8 tools that won't cost you a penny...

Via Gust MEES
more...
David Duncan's curator insight, November 29, 2013 11:49 AM

Here are some great aids if you are thinking of creating infographics

Elena Orlova's curator insight, November 30, 2013 9:32 PM

8 инструментов для создания инфографики

Alison Rostetter's curator insight, December 30, 2013 1:25 PM

I've never made one of these before but it looks like it might be fun to try out on a wintry night.

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Cyber Arms Race: Mikko Hypponen at TEDxBrussels

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Bee.lu : Bibi l’abeille fait découvrir l’Internet aux tout petits

Bee.lu : Bibi l’abeille fait découvrir l’Internet aux tout petits | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
BEE SECURE lance «  bee.lu », un site pédagogique destiné aux enfants à partir de 3 ans.Les nouvelles technologies nous servent de plus en plus, et de plus en plus tôt pour communiquer.

Via Gust MEES
more...
Gust MEES's curator insight, October 24, 2013 5:56 AM

 

L’ordinateur, le smartphone, la tablette : tous ces outils permettent de découvrir le monde merveilleux et mystérieux de la Toile. Mais mieux vaut connaître les règles de bonne conduite  pour éviter d’y perdre le fil…ou d’y laisser les plumes de nos petits poussins.

 

Gust MEES's curator insight, October 24, 2013 6:00 AM


L’ordinateur, le smartphone, la tablette : tous ces outils permettent de découvrir le monde merveilleux et mystérieux de la Toile. Mais mieux vaut connaître les règles de bonne conduite  pour éviter d’y perdre le fil…ou d’y laisser les plumes de nos petits poussins.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Complete Visual Guide To Technology For Children [Infographic]

The Complete Visual Guide To Technology For Children [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
This handy visual guide explores technology use by young children. How much and what do they use, and is it appropriate?

Via Gust MEES
more...
Paul's curator insight, October 13, 2013 9:16 AM

Great infographic - we always me to consider the human element when we integrate technology into the classroom.

AnnC's curator insight, October 13, 2013 7:37 PM

Lots of great information addressing access to and use of technology by children!

ThePlanetaryArchives/San Francisco CA's curator insight, September 12, 2017 10:18 AM

Less is more.....

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from Best Freeware Software
Scoop.it!

#TrueCrypt - Free Open-Source Disk #Encryption - #Documentation

#TrueCrypt - Free Open-Source Disk #Encryption - #Documentation | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
TrueCrypt - free open-source disk encryption - documentation...

Via Gust MEES
more...
Gust MEES's curator insight, July 23, 2013 8:49 AM

 

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

 

TrueCrypt - Free Open-Source Disk Encryption - Documentation

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic]

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
Everyone's worried about how their data can be collected through government programs, but maybe it's time to look at how your information is tracked in everyday life.

Via Gust MEES
more...
Michelle Gilstrap's curator insight, June 27, 2013 10:40 AM

Just in case you were wondering how your information is being tracked.

Vincenzo Storti's curator insight, June 27, 2013 10:47 AM

Inquietante..

iPhonefixed's curator insight, June 30, 2013 2:39 AM

Frightning.  If this makes you think, take a look at Juan Enriquez talk on TED - Your online life, Permanent as a Tattoo. http://www.ted.com/talks/juan_enriquez_how_to_think_about_digital_tattoos.html


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Best Addresses To Stay Informed About IT-Security and Cyber-Security | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
. Introduction In previous articles WE discussed already about the responsibility that ===> everyone is responsible for a safer and more secure Internet <===, that the weakest link in the sec...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Which tech companies are looking out for your privacy?

Which tech companies are looking out for your privacy? | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
The Electronic Freedom Foundation calls out Sonic.net for actively protecting personal data from the government, and Verizon, AT&T and Apple for, well, not.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 2013 3:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 6:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

AnnC's curator insight, June 4, 2013 9:12 PM

see the math...

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Que peut coûter au gérant d'une société le piratage de son site web ?

Que peut coûter au gérant d'une société le piratage de son site web ? | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
Que peut coûter au gérant d'une société le piratage de son site web ?

Via Gust MEES
more...
Gust MEES's curator insight, December 5, 2013 9:50 AM

 

A MUST read!!!

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Junkware Removal Tool

Junkware Removal Tool | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.


Via Gust MEES
more...
Gust MEES's curator insight, November 9, 2013 11:50 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

 

Gust MEES's curator insight, November 9, 2013 11:54 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

Rescooped by Frederic GOUTH from Social Media and its influence
Scoop.it!

Twitter plans to encrypt its direct messaging service

Twitter plans to encrypt its direct messaging service | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
As a result of the growing NSA revelations, the social microblogging site is upping its defenses by planning to encrypt its direct messaging Service.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from Cyberdefense et actualité.
Scoop.it!

Cyberattaque en France et dans le monde : qui attaque qui ?

Cyberattaque en France et dans le monde : qui attaque qui ? | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
C'est de l'Asie et de l'Europe de l'Est que proviennent le plus grand nombre de cyber-attaques dans le monde selon l'étude et le plan interactif de FireEye.

Via Gust MEES, Veille sur le monde du Cyber ...
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécuriser son site web : les bases essentielles - Cases

Sécuriser son site web : les bases essentielles -  Cases | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Internet «Un enfant va cliquer sur tout ce qu il voit»

Internet «Un enfant va cliquer sur tout ce qu il voit» | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
LUXEMBOURG - La vigilance sur le Net, c est simple comme de regarder avant de traverser la route.

Via Gust MEES
more...
Gust MEES's curator insight, September 6, 2013 7:42 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp

 

 

Gust MEES's curator insight, September 6, 2013 7:46 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

7 Project Manager Personalities-Which Are YOU? [Infographic]

7 Project Manager Personalities-Which Are YOU? [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, August 12, 2013 9:45 AM

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=project-based-learning

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=PBL

 

Diane Goodman's curator insight, August 12, 2013 7:53 PM

Interesting infographic that maps 7 different approaches to leading a team or project

MURIEL LESELBAUM's curator insight, August 13, 2013 5:06 AM

Les typologies ont toujours du succès… pourquoi pas ?

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Where In the World Is the Internet? [Infographic]

Where In the World Is the Internet? [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
The Internet has become a major part of most people’s days and nights. It’s often the thing people check first thing in the morning, and the thing people do last with their smartphones before bedtime.

Via Gust MEES
more...
Gust MEES's curator insight, July 6, 2013 7:05 AM

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Michelle Gilstrap's curator insight, July 8, 2013 9:55 AM

Very good perspective on the use of the Internet around the world. What is the use in other countries? Now you can see quickly. If you are planning a business venture, it is wise to know the use.

Helena Capela's curator insight, July 8, 2013 1:54 PM

Interesting. Vatican City is very well positioned

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

What Is Web 3.0 And How Will It Change Education?

What Is Web 3.0 And How Will It Change Education? | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
We'll reach a new state of web skills when we reinvent technology tools to better enhance our personal learning. We'll be at 3.0 when schools are everywhere and not viewed as daycare.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...