MyTopic
15 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Zhao KQiang from Intellectual Property news, views and opinions
Scoop.it!

How does IP relate to cyber-security? - Intellectual Property - Microsoft Business UK

How does IP relate to cyber-security? - Intellectual Property - Microsoft Business UK | MyTopic | Scoop.it
Online security may be a concern to internet users, but it's a far bigger worry to companies whose most important assets are digital ones. Here, we focus on two IP assets that could be vulnerable to online attack - databases and software code.

Via Inngot
Zhao KQiang's insight:

there is other point focus on IP address relative with network security in business area. The article give some reasons for why IP address effect on network security. 

more...
No comment yet.
Rescooped by Zhao KQiang from Daily Magazine
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | MyTopic | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.

 


Via Gust MEES, TechinBiz, THE OFFICIAL ANDREASCY
Zhao KQiang's insight:

there is one example of smart phone security. focus on the mobile system Android

more...
Gust MEES's curator insight, July 4, 2013 6:42 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Cyber-Security Blogs To Follow

Cyber-Security Blogs To Follow | MyTopic | Scoop.it
. . WHY Should I Follow Security Blogs? . WHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!? Well, I will give YOU a q...

Via Gust MEES
Zhao KQiang's insight:

some useful information from this article that why we need to learn to the security of IT

more...
Gust MEES's curator insight, October 26, 2013 6:11 PM

 

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

 

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online.

 

Learn more:

 

http://gustmees.wordpress.com/

 

http://gustmeesen.wordpress.com/

 

 

Gust MEES's curator insight, October 26, 2013 6:17 PM

 

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

 

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online.

 

Learn more:

 

http://gustmees.wordpress.com/

 

http://gustmeesen.wordpress.com/

 

Second Star Technologies's curator insight, February 3, 2014 2:42 PM

You are vulnerable.  More so everyday.  These guys know why, how, and what you need to look out for.

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Beware of Malware: Mobile Security Apps to Safeguard Your Phone

Beware of Malware: Mobile Security Apps to Safeguard Your Phone | MyTopic | Scoop.it
Malware attacks on mobile devices are on the rise. Lookout and Avast can help protect your smartphone from hackers and thieves.

 

=================================================

 

Gust MEES

 

Check out also here:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

=================================================


Via Gust MEES
Zhao KQiang's insight:

focus on the how apps effect on the phone security

 it recall me to check the apps of my phone

more...
No comment yet.
Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Cyber Security Challenge UK announces first University Challenge

Cyber Security Challenge UK announces first University Challenge | MyTopic | Scoop.it
Four leading UK universities for Computer Science are taking part in a code-breaking competition as part of Cyber Security Challenge UK 2013

Via Gust MEES
more...
Gust MEES's curator insight, January 21, 2013 12:11 PM

Very good idea and initiative... Looks like EUROPE is leading in Cyber-Security Education ;)

 

A Challenge for other countries to catch up ;)

 

 

Gust MEES's curator insight, January 21, 2013 12:18 PM

Very good idea and initiative... Looks like EUROPE is leading in Cyber-Security Education ;)

A Challenge for other countries to catch up ;)


Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Don't be fooled by the name: cyber security is about people, not technology

Don't be fooled by the name: cyber security is about people, not technology | MyTopic | Scoop.it
When you hear the phrase 'cyber security', what springs to mind?

 

Human error

In cyber security we often say 'there is no such thing as a malicious machine'. Trace a cyber attack or information breach back to its source and you won't find code, you'll find a person.

 

In fact, most information breaches are the result of human error and a lack of awareness, and the 'human problem' appears to be increasing.

 


Via Gust MEES
more...
Gust MEES's curator insight, November 14, 2013 6:38 AM


Human error

In cyber security we often say 'there is no such thing as a malicious machine'. Trace a cyber attack or information breach back to its source and you won't find code, you'll find a person.

 

In fact, most information breaches are the result of human error and a lack of awareness, and the 'human problem' appears to be increasing.

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

 

Gust MEES's curator insight, November 14, 2013 6:41 AM

 

Human error

In cyber security we often say 'there is no such thing as a malicious machine'. Trace a cyber attack or information breach back to its source and you won't find code, you'll find a person.

 

In fact, most information breaches are the result of human error and a lack of awareness, and the 'human problem' appears to be increasing.

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

 

shirlyshabo's curator insight, April 22, 2014 8:05 AM

real problem...

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

WiFi-Hotspots security and privacy: Sophos Project Warbike

Sophos's cycling security expert took to the streets of London to see how many unsecured Wi-Fi hotspots he could find. Watch our video to see what we discove...

 

Gust MEES: see the dangers of WiFi and Hotspots as also my Tips to surf secure here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Watch the video here:

http://www.youtube.com/watch?v=NaPdSiX0Aho

 


Via Gust MEES
Zhao KQiang's insight:

why there are so many unsecured wi-fi hotspots? when we connect free wifi, we should have the awareness  to ask ourselves it is security or not. the companies owner should check the security of wifi setting 

more...
David's curator insight, March 19, 2014 6:30 PM

amazing wardriving

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Learning basics of Cyber-Security: Cybercrime Goes Mobile

With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...

Via Gust MEES
Zhao KQiang's insight:

one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful 

more...
Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Why Cyber Security is Important [Infographic]

Why Cyber Security is Important [Infographic] | MyTopic | Scoop.it
Today's infographic is about the AlienVault Open Threat Exchange or OTX, which is a multinational effort to aggregate, and disseminate the fingerprints and  forensics of the latest cyber attacks. The infographic is full of statistics on malware, hack attacks and such.

Via Gust MEES
Zhao KQiang's insight:

the graph shows the  information about lots of internet connector of the majority countries have the risk of lost information of finance or personal information

more...
Gust MEES's curator insight, April 17, 2013 11:39 AM

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Angela Watkins's curator insight, April 18, 2013 1:04 PM

Sharing only for information ....  ............. As much as I love the digital avenues there are pros and cons so be careful/watchful .... Watch & Pray ...... 

Paula Correia's curator insight, April 19, 2013 5:15 AM

Porque é que a cibersegurança é importante?

O infográfico mostra estatísticas relacionadas com a falta de segurança no universo cibernético e nas redes de comunicação (malware, ataques de hackers etc.) e chama a atenção para os riscos dos ataques cibernéticos (Propriedade intelectual, privacidade pessoal, etc..)

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security | MyTopic | Scoop.it

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security . What should get be taught and learned more in the 21st Century while using ICT?

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

  


Via Gust MEES
Zhao KQiang's insight:

give some opinions of that why teachers and education should learn network secutity

more...
Andrrey Yatsenko's curator insight, February 6, 2014 10:00 PM

The   needful   information  about  Learning  and Teaching  Cyber -  Security .

Dean J. Fusto's curator insight, July 31, 2015 10:12 AM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Jean-Pierre Blanger's curator insight, August 1, 2015 4:19 PM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Mobile security: Defending your devices

Mobile security: Defending your devices | MyTopic | Scoop.it

===> The days when IT security was solely focused on desktop PCs are long gone. <===

 

Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Zhao KQiang from ICT Security-Sécurité PC et Internet
Scoop.it!

Data Security Is a Classroom Worry, Too

Data Security Is a Classroom Worry, Too | MyTopic | Scoop.it
Experts warn that educators may be embracing technology without doing enough to secure student data.

 

Mr. Porterfield, an engineer at Cisco Systems, examined Edmodo’s data security practices by registering himself on the site as a fictional home-school teacher.

 

“Anyone at a local cafe with Wi-Fi will have access to the information that the student is viewing or transmitting,” he told me. “I would consider that potentially sensitive information from the perspective of parents.”


Via Gust MEES
Zhao KQiang's insight:

one example of network security in education area

 

more...
Gust MEES's curator insight, June 23, 2013 7:54 AM

 

Mr. Porterfield, an engineer at Cisco Systems, examined Edmodo’s data security practices by registering himself on the site as a fictional home-school teacher.


“Anyone at a local cafe with Wi-Fi will have access to the information that the student is viewing or transmitting,” he told me. “I would consider that potentially sensitive information from the perspective of parents.”


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



Gust MEES's curator insight, June 23, 2013 12:07 PM

 

Mr. Porterfield, an engineer at Cisco Systems, examined Edmodo’s data security practices by registering himself on the site as a fictional home-school teacher.

 

“Anyone at a local cafe with Wi-Fi will have access to the information that the student is viewing or transmitting,” he told me. “I would consider that potentially sensitive information from the perspective of parents.”

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Grégory Petit's curator insight, April 14, 2014 11:14 AM

La sécurité des réseaux scolaires remise en doute par M. Porterfield, un ingénieur réseau à Cisco Networks. Source de New York Times.

Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Convenience or security: You can't have both when it comes to Wi-Fi

Convenience or security: You can't have both when it comes to Wi-Fi | MyTopic | Scoop.it
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them e

Via Gust MEES
Zhao KQiang's insight:

consider about free wifi is security or not,  when you start to connect it ,just takes few seconds to check the security setting 

more...
Rescooped by Zhao KQiang from 21st Century Learning and Teaching
Scoop.it!

Mobile Security: Prevent Mobile Application Code Security Risks | Veracode

Mobile Security: Prevent Mobile Application Code Security Risks | Veracode | MyTopic | Scoop.it
Free Mobile Security Guide that shows you how to find and prevent code security risks for mobile applications.

Via Gust MEES
more...