21st Century Learning and Teaching
751.4K views | +1 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Security'. Clear
Scooped by Gust MEES
October 10, 2013 4:53 PM
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | 21st Century Learning and Teaching | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===


Gust MEES's insight:

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
September 19, 2013 5:58 PM
Scoop.it!

Apple's iOS 7 Update Fixes 80 Security Bugs

Apple's iOS 7 Update Fixes 80 Security Bugs | 21st Century Learning and Teaching | Scoop.it
Yesterday's iOS 7 update brought a slew of bug fixes, 80 in total, to Apple devices.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
September 5, 2013 4:15 AM
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | 21st Century Learning and Teaching | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet

 

http://gustmees.wordpress.com/

 

 

Scooped by Gust MEES
August 2, 2013 5:57 PM
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
July 31, 2013 3:22 PM
Scoop.it!

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses | 21st Century Learning and Teaching | Scoop.it

Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware. The (sad) winner is Android/Plankton.B!tr, with a record prevalence of 4.42% (note: prevalence is the number of new hits in a given time frame divided by the number of fortigates reporting during that same interval of time).


This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…


===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===



Gust MEES's insight:

 

This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…

 

===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===

 
No comment yet.
Scooped by Gust MEES
July 30, 2013 12:55 PM
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | 21st Century Learning and Teaching | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
July 7, 2013 5:01 AM
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | 21st Century Learning and Teaching | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
July 1, 2013 7:17 AM
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | 21st Century Learning and Teaching | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Scooped by Gust MEES
June 26, 2013 7:10 AM
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!

 

Gust MEES's curator insight, June 26, 2013 7:17 AM

 

Check it out and beware of the malware!!!


Scooped by Gust MEES
June 25, 2013 9:35 AM
Scoop.it!

Fake Antivirus Holds Android Phones for Ransom

Fake Antivirus Holds Android Phones for Ransom | 21st Century Learning and Teaching | Scoop.it
Fake antivirus, also called scareware, is a well-known Windows problem. Symantec researchers have found fake antivirus aimed at Android devices, and it's even nastier.
Gust MEES's insight:

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Gust MEES's curator insight, June 25, 2013 9:43 AM

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Scooped by Gust MEES
June 11, 2013 5:36 AM
Scoop.it!

Going BYOD [Infographic]

Going BYOD [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Credits to:

 

http://www.educatorstechnology.com/2013/06/dont-miss-these-two-fabulous-graphics.html

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Inge Quets's curator insight, June 16, 2013 5:33 AM

This creates the inmediate possibility to go forward in schools (in developed countries).

Scooped by Gust MEES
June 2, 2013 8:57 AM
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
May 23, 2013 5:00 PM
Scoop.it!

Mobile Malware - Security Spotlight Series: Episode Three

Tune in to watch Security Spotlight's third episode, on Mobile Malware. In 2012, we saw a 58% increase in mobile malware, and it continues to grow. Cybercrim...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
September 22, 2013 4:49 PM
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | 21st Century Learning and Teaching | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Gust MEES's insight:

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:47 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 17, 2013 6:59 AM
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | 21st Century Learning and Teaching | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Scooped by Gust MEES
August 16, 2013 8:37 AM
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | 21st Century Learning and Teaching | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Gust MEES's insight:

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
August 2, 2013 7:25 AM
Scoop.it!

Le nombre de piratages de smartphones explose

Le nombre de piratages de smartphones explose | 21st Century Learning and Teaching | Scoop.it
Les utilisateurs de smartphones ne sont pas à l'abri des pirates informatiques.

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

  
Gust MEES's insight:

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

 

Gust MEES's curator insight, August 2, 2013 7:28 AM

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

 

Scooped by Gust MEES
July 30, 2013 4:45 PM
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | 21st Century Learning and Teaching | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===


Gust MEES's insight:

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Scooped by Gust MEES
July 18, 2013 4:31 AM
Scoop.it!

Most BYOD businesses exposing data to cyber criminals

Most BYOD businesses exposing data to cyber criminals | 21st Century Learning and Teaching | Scoop.it
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber criminals by failing to implement effective BYOD strategies.
Gust MEES's insight:

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


Gust MEES's curator insight, July 18, 2013 4:34 AM

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
July 4, 2013 6:42 AM
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | 21st Century Learning and Teaching | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's insight:

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Scooped by Gust MEES
June 27, 2013 9:38 AM
Scoop.it!

Convenience or security: You can't have both when it comes to Wi-Fi

Convenience or security: You can't have both when it comes to Wi-Fi | 21st Century Learning and Teaching | Scoop.it
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them e
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, June 27, 2013 9:41 AM

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Zhao KQiang's curator insight, March 28, 2014 6:24 AM

consider about free wifi is security or not,  when you start to connect it ,just takes few seconds to check the security setting 

Scooped by Gust MEES
June 25, 2013 3:31 PM
Scoop.it!

Building a successful BYOD program-Education [pdf]

Building a successful BYOD program-Education [pdf] | 21st Century Learning and Teaching | Scoop.it
Shared with Dropbox
Gust MEES's insight:

 

A MUST read!!!

 

No comment yet.
Scooped by Gust MEES
June 11, 2013 5:40 AM
Scoop.it!

BYOD: The Good, The Bad and the Ugly [Infographic]

BYOD: The Good, The Bad and the Ugly [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Credits to:

 

http://www.educatorstechnology.com/2013/06/dont-miss-these-two-fabulous-graphics.html

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
June 3, 2013 3:19 PM
Scoop.it!

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own | 21st Century Learning and Teaching | Scoop.it
11 sample BYOT policies to help a school or district create their own.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Blue Jay Bridge's curator insight, June 6, 2013 8:59 PM

I've seen folks asking for this info on twitter. Hope this helps.

Scooped by Gust MEES
May 25, 2013 9:19 AM
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | 21st Century Learning and Teaching | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/