Technological Sparks
3.1K views | +0 today
Follow
Technological Sparks
Notable Ideas in Technology and General News About What's Happening On, Around and To the WEB
Your new post is loading...
Your new post is loading...
Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

This terrifying malware destroys your PC if detected

This terrifying malware destroys your PC if detected | Technological Sparks | Scoop.it
Rombertik is designed to steal any plain text entered into a browser window

Via Gust MEES
more...
Gust MEES's curator insight, May 10, 2015 5:25 PM

A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.

The malware, nicknamed Rombertik by Cisco Systems, is designed to intercept any plain text entered into a browser window. It is being spread through spam and phishing messages, according to Cisco’s Talos Group blog on Monday.


Rombertik goes through several checks once it is up and running on a Windows computer to see if it has been detected.

That behavior is not unusual for some types of malware, but Rombertik “is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis,” wrote Ben Baker and Alex Chiu of the Talos Group.


Such “wiper” malware has been used in the past, notably against South Korean targets in 2013 and against Sony Pictures Entertainment last year, an attack attributed to North Korea by the U.S. government.

The last check Rombertik does is the most dangerous one. It computes a 32-bit hash of a resource in memory, and if either that resource or the compile time had been changed, Rombertik triggers self-destruct.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Rombertik


Assignment Help's curator insight, May 11, 2015 6:38 AM

www.assignmenthelpsite.com

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Home | All you need is code

Home | All you need is code | Technological Sparks | Scoop.it


Learn more:


https://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/



Via Gust MEES
more...
Efrain Pena's curator insight, March 24, 2015 11:21 PM

Estas iniciativas deberían aplicarse a todos los niveles educativos, ya que logran facilitar la construcción del análisis y la lógica con diferentes herramientas pedagógicas

futureedge's curator insight, March 25, 2015 3:35 AM

Future Edge is the best coaching institute in Delhi NCR Medical coaching Centre, India's leading institute for IIT JEE, Preparing for competitive exam.

Tim Robinson's curator insight, March 25, 2015 7:03 PM

Code and you'll never be unemployed... :)

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

10 critical security habits you should be doing (but aren't)

10 critical security habits you should be doing (but aren't) | Technological Sparks | Scoop.it
Staying safe these digital days takes more than antivirus. Here are 10 fundamental things you do to protect your PC and other devices.

Via Gust MEES
Monica S Mcfeeters's insight:

You might want to look this over and make some adjustments.

more...
Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

5 Curation Habits That Can Change Your Content Marketing

I am inspired by curators—and it is a relevant idea for marketing. The business world has been increasingly turning towards curation as a way to add meaning to marketing. I often describe it as the forgotten side of content marketing. Amidst all the discussion about creating great content – who will take on the valuable role of just helping us to find the great content that already exists on the web or otherwise?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=SEO



Via Guillaume Decugis, Gust MEES
more...
eddy woj's curator insight, February 19, 2015 5:43 AM

La curation est un excellent moyen de partager l'information, de découvrir de nouvelles idées ou concepts, et d'influencer.

Pat Heffernan's curator insight, February 23, 2015 7:42 AM

Agreed. Curation is an under-appreciated skill, especially it seems, by marketers..

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Technological Sparks | Scoop.it
Will 2015 be a happy new year for internet...

Via Gust MEES
more...
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Dirk Cipido's curator insight, December 31, 2014 8:14 AM

up to a secure 2015

Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

What happens to Windows 7 on October 31, 2014? | ICT | EdTech

What happens to Windows 7 on October 31, 2014? | ICT | EdTech | Technological Sparks | Scoop.it
Microsoft is approaching the next cut-off date in Windows 7's lifecycle next month. Here's what is and isn't happening after October 31, 2014.

Via Gust MEES
Monica S Mcfeeters's insight:

Still using Windows 7.....Here is what will soon happen.

more...
Gust MEES's curator insight, September 24, 2014 12:04 PM

Microsoft is approaching the next cut-off date in Windows 7's lifecycle next month. Here's what is and isn't happening after October 31, 2014.


Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Internet of Things

The Internet of Things The ‘Internet of Things’ will generate $14,400,000,000 of value over the next decade1. There will be 40 times more devices than peo…


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
more...
Rescooped by Monica S Mcfeeters from Research Workshop
Scoop.it!

Nanorobot for transporting drugs in the body

Nanorobot for transporting drugs in the body | Technological Sparks | Scoop.it
Nanorobot for transporting drugs in the body

Via Gust MEES, Jocelyn Stoller
Monica S Mcfeeters's insight:

This is more on the continued update with what's happening in the nanotech R & D world.

more...
Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

World of Technology – What jobs will we have in the future?

World of Technology – What jobs will we have in the future? | Technological Sparks | Scoop.it
In recent decades, mankind has achieved an unprecedented breakthrough. Today, smartphone owners have access no matter where they are to more information that was available 30 years ago.

Via Gust MEES
more...
Gust MEES's curator insight, March 30, 2015 2:13 AM

In recent decades, mankind has achieved an unprecedented breakthrough. Today, smartphone owners have access no matter where they are to more information that was available 30 years ago. The automation


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=future


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Job+Seekers


Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Yahoo unveils sneak peek at end-to-end email encryption plugin | ZDNet

Yahoo unveils sneak peek at end-to-end email encryption plugin | ZDNet | Technological Sparks | Scoop.it
The web portal giant wants encryption in everyone's hands by the end of the year.

Via Gust MEES
more...
Gust MEES's curator insight, March 16, 2015 9:05 AM

The web portal giant wants encryption in everyone's hands by the end of the year.


Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Most vulnerable operating systems and applications in 2014

Most vulnerable operating systems and applications in 2014 | Technological Sparks | Scoop.it
An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

Via Gust MEES
more...
Gust MEES's curator insight, February 22, 2015 6:51 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched.IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Gust MEES's curator insight, February 22, 2015 7:08 PM

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

.


#Mac OS X and #Linux had more #vulnerabilities in 2014 than ALL #Windows Versions in sum.

.


Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years. Mozilla Firefox had the most vulnerabilities reported in 2009 and 2012; Google Chrome in 2010 and 2011; Internet Explorer was at the top for the last two years.



To keep systems secure, it is critical that they are fully patched. IT admins should focus on (patch them first):


  • Operating systems (Windows, Linux, OS X)
  • Web browsers
  • Java
  • Adobe free products (Flash Player, Reader, Shockwave Player, AIR).
.
Learn more:


Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte US | Deloitte Analytics

Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte US | Deloitte Analytics | Technological Sparks | Scoop.it
Take a below-the-surface look at Deloitte's 2015 Analytics Trends report.

Via Gust MEES
more...
Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

The Curator Job Is To Unpack Specialized Information To An Interested Audience

As the director of the Metropolitan Museum of Art in New York, Thomas P. Campbell thinks deeply about curating—not just selecting art objects, but placing them in a setting where the public can learn their stories.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation



Via Robin Good, Gust MEES
more...
Ajo Monzó's curator insight, September 26, 2014 7:20 AM

Muy interesante y profunda  charla sobre el concepto de "curación" .

ManufacturingStories's curator insight, September 26, 2014 8:47 AM

For more resources on Social Media & Content Curation visit http://bit.ly/1640Tbl

Jimena Acebes Sevilla's curator insight, October 18, 2014 6:25 PM

El curador de  el curador es el de presentar  información especializada a una audiencia interesada.

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud?

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud? | Technological Sparks | Scoop.it
Sometimes I wish the internet could just be a place to exchange wholesome information, such as cooking recipes and tips on Linux, but sadly, there is a dark side. There are deviant people lurking on the web doing all sorts of horrible things. Yesterday, a hacker leaked the private pictures and videos (nude and semi-nude) of many celebrities, and they have spread across the net. For these celebrities, who are real people, I am sure it has been a very trying time; their privacy has been destroyed and I offer my sympathies. For the many people (if they can be called that) viewing and spreading the pictures, the occasion has been dubbed


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud



Via Gust MEES
more...
Gust MEES's curator insight, September 1, 2014 7:24 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud



Gust MEES's curator insight, September 1, 2014 7:53 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Ammanda Daniher's curator insight, September 11, 2014 10:33 PM

It is pretty clear that iCloud has become a threat to most Apple users due to the recent "Celebrity nudes" scandal. I strongly believe that you shouldn't be worried about people being able to get a hold of photographs and videos of personal moments, such as family dinners and Christmas parties. This incident really makes you wonder just how easy it is to hack in to Apple's software systems, and how much Apple's developers have seen of our personal lives. Scandals such as thing will keep things talking, but will Apple release a statement regarding everything that has happened? 

Rescooped by Monica S Mcfeeters from 21st Century Learning and Teaching
Scoop.it!

Easily Avoid Wi-Fi Insecurity

Easily Avoid Wi-Fi Insecurity | Technological Sparks | Scoop.it
Wireless networks are often insecure, and are notorious havens for attackers, who hang out in coffee shops, hotel swimming pools and anywhere else people congregate to the closest Internet connection, as they are easy targets to breach systems anonymously and steal personal data.


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



Via Gust MEES
Monica S Mcfeeters's insight:

Handy info on our to stay private online….

more...
Gust MEES's curator insight, July 22, 2014 11:28 AM
Wireless networks are often insecure, and are notorious havens for attackers, who hang out in coffee shops, hotel swimming pools and anywhere else people congregate to the closest Internet connection, as they are easy targets to breach systems anonymously and steal personal data.


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/