21st Century Learning and Teaching
635.5K views | +126 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Cybersecurity'. Clear
Scooped by Gust MEES
March 1, 2016 12:13 PM
Scoop.it!

Mac-Trojaner löst Spekulationen über Hacking-Team-Rückkehr aus | Apple | CyberSecurity

Mac-Trojaner löst Spekulationen über Hacking-Team-Rückkehr aus | Apple | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Auf Virus Total ist ein Trojaner für OS X aufgetaucht, der allem Anschein nach zu einem Spionage-Tool der Firma Hacking Team gehört. Sind die Italiener zurück und hacken wieder?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:
Auf Virus Total ist ein Trojaner für OS X aufgetaucht, der allem Anschein nach zu einem Spionage-Tool der Firma Hacking Team gehört. Sind die Italiener zurück und hacken wieder?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, March 1, 2016 12:19 PM
Auf Virus Total ist ein Trojaner für OS X aufgetaucht, der allem Anschein nach zu einem Spionage-Tool der Firma Hacking Team gehört. Sind die Italiener zurück und hacken wieder?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
February 22, 2016 3:24 PM
Scoop.it!

Transfert des ressources de mySchool! sur Office 365 | Luxembourg | EDUcation

Transfert des ressources de mySchool! sur Office 365 | Luxembourg | EDUcation | 21st Century Learning and Teaching | Scoop.it
Depuis des mois nous sommes régulièrement touchés par des cyberattaques qui font que le service mySchool! est ponctuellement perturbé sans pourtant impacter la sécurité. En effet, il ne nous est plus possible de mettre à jour les systèmes du portail intranet mySchool! car le logiciel du portail est surannée. Comme il en résulte que la disponibilité du service n’est plus garantie à cent pourcents, le CGIE s’est vu forcé de transférer au plus vite le répertoire des ressources de mySchool! dans...
Gust MEES's insight:

Depuis des mois nous sommes régulièrement touchés par des cyberattaques qui font que le service mySchool! est ponctuellement perturbé sans pourtant impacter la sécurité. En effet, il ne nous est plus possible de mettre à jour les systèmes du portail intranet mySchool! car le logiciel du portail est surannée. Comme il en résulte que la disponibilité du service n’est plus garantie à cent pourcents, le CGIE s’est vu forcé de transférer au plus vite le répertoire des ressources de mySchool! dans...


No comment yet.
Scooped by Gust MEES
February 15, 2016 9:42 AM
Scoop.it!

So tickt die Cloud - AWS, Azure und Docker auf der Überholspur | ICT

So tickt die Cloud - AWS, Azure und Docker auf der Überholspur | ICT | 21st Century Learning and Teaching | Scoop.it

1060 Unternehmen weltweit verraten, welche Cloud-Services sie am liebsten nutzen, welche Business-Vorteile sie realisiert haben und wo es Probleme gab. Der State-of-the-Cloud-Report 2016.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cloud


Gust MEES's insight:

1060 Unternehmen weltweit verraten, welche Cloud-Services sie am liebsten nutzen, welche Business-Vorteile sie realisiert haben und wo es Probleme gab. Der State-of-the-Cloud-Report 2016.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cloud


No comment yet.
Scooped by Gust MEES
February 14, 2016 6:41 PM
Scoop.it!

'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks | Apple | Nobody Is Perfect | CyberSecurity

'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks | Apple | Nobody Is Perfect | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Gust MEES's insight:
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, February 14, 2016 6:50 PM
Many of OS X’s most popular apps were recently revealed to be vulnerable to man-in-the-middle (MiTM) attacks.

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

A security engineer from Vulnsec, known as Radek, said the vulnerability works on both El Capitan and its predecessor, Yosemite.

The total number of apps affected isn’t known, but Radek did estimate the number to be “huge.” Some of those confirmed as vulnerable are:

Camtasia 2 (v2.10.4)
DuetDisplay (v1.5.2.4)
uTorrent (v1.8.7)
Sketch (v3.5.1)
Additionally, security researcher Jonathan Zdziarski told Ars Technica that the ‘Hopper’ reverse engineering tool and ‘DXO Optics Pro’ are also susceptible.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
February 8, 2016 6:52 PM
Scoop.it!

Hacker says he's breached DHS and FBI, leaks claimed staff data

Hacker says he's breached DHS and FBI, leaks claimed staff data | 21st Century Learning and Teaching | Scoop.it
The facts aren't in yet, but if true, it seems that spear-phishing was involved. How safe is your staff data against a well-informed crook?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
The facts aren't in yet, but if true, it seems that spear-phishing was involved. How safe is your staff data against a well-informed crook?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
February 3, 2016 12:04 PM
Scoop.it!

Big Data Threat Landscape — ENISA

Big Data Threat Landscape — ENISA | 21st Century Learning and Teaching | Scoop.it
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


Gust MEES's insight:
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


No comment yet.
Scooped by Gust MEES
January 22, 2016 7:20 PM
Scoop.it!

SID2016: Safer Internet Day 2016-Participation | Luxembourg | Europe

SID2016: Safer Internet Day 2016-Participation | Luxembourg | Europe | 21st Century Learning and Teaching | Scoop.it
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2016 - Save the date! . . . Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2016 will…


[Gust MEES] I am participating since its START each year and YOU!???

Gust MEES's insight:
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2016 - Save the date! . . . Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2016 will…


[Gust MEES] I am participating since its START each year and YOU!???


No comment yet.
Scooped by Gust MEES
January 3, 2016 12:49 PM
Scoop.it!

CVE-Statistik: Viele Sicherheitslücken in Mac OS X, iOS und Flash gemeldet | CyberSecurity | Awareness | Apple

CVE-Statistik: Viele Sicherheitslücken in Mac OS X, iOS und Flash gemeldet | CyberSecurity | Awareness | Apple | 21st Century Learning and Teaching | Scoop.it
Eine Auswertung der CVE-Liste zeigt, für welche Programme und Betriebssysteme 2015 die meisten Sicherheitslücken gemeldet wurden. Wie sicher die Software ist, lässt sich daraus jedoch nicht ableiten.

Auf der wichtigsten Liste öffentlich bekannter Sicherheitslücken tauchten im Jahr 2015 besonders häufig Mac OS X, iOS und Flash auf. Das geht aus einer Auswertung von CVEDetails.com hervor, die auf der CVE-Liste (Common Vulnerabilities and Exposures) basiert.

Im Rahmen des CVE-Projektes vergeben wichtige Software-Hersteller wie Apple, Adobe, Microsoft und Mozilla eindeutige IDs für Sicherheitslücken, in Zusammenarbeit mit der Non-Profit-Organisation Mitre.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:
Eine Auswertung der CVE-Liste zeigt, für welche Programme und Betriebssysteme 2015 die meisten Sicherheitslücken gemeldet wurden. Wie sicher die Software ist, lässt sich daraus jedoch nicht ableiten.

Auf der wichtigsten Liste öffentlich bekannter Sicherheitslücken tauchten im Jahr 2015 besonders häufig Mac OS X, iOS und Flash auf. Das geht aus einer Auswertung von CVEDetails.com hervor, die auf der CVE-Liste (Common Vulnerabilities and Exposures) basiert.

Im Rahmen des CVE-Projektes vergeben wichtige Software-Hersteller wie Apple, Adobe, Microsoft und Mozilla eindeutige IDs für Sicherheitslücken, in Zusammenarbeit mit der Non-Profit-Organisation Mitre.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


No comment yet.
Scooped by Gust MEES
December 20, 2015 11:25 AM
Scoop.it!

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To | 21st Century Learning and Teaching | Scoop.it

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…

Gust MEES's insight:

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…


No comment yet.
Scooped by Gust MEES
December 15, 2015 10:35 AM
Scoop.it!

Quels risques de sécurité se cachent dans vos cadeaux de Noël cette année ? | Internet of Things | IoT

Quels risques de sécurité se cachent dans vos cadeaux de Noël cette année ? | Internet of Things | IoT | 21st Century Learning and Teaching | Scoop.it

Selon gizmag, nos chères têtes blondes s’attendent aujourd’hui à ce que les jouets offerts puissent se connecter à Internet et être couplés à des appareils intelligents, leur permettant ainsi d’accéder aux dernières tendances technologiques en date, parfois même avant leurs parents. Toutefois, chers parents, bien que nous ne puissions que vous recommander de réfléchir à deux fois avant d’acheter à vos enfants un jouet connecté, soyez vous aussi vigilants car, comme vous pourrez le lire ci-dessous, les risques de sécurité ne concernent pas uniquement les gadgets pour enfants.

L’Internet des objets (IdO) devient rapidement partie intégrante de notre réalité car un plus grand nombre de nos objets du quotidien renferment maintenant de l’électronique, des logiciels, des capteurs ou sont capables de se connecter au réseau, leur permettant ainsi de recueillir et d’échanger des données. Combien de ces objets, pensez-vous alors, peuvent se transformer en vrais chevaux de Troie ? La guerre de Troie prit fin quand les Grecs firent preuve de malice pour entrer dans la ville de Troie, cachant des soldats dans un énorme cheval de bois. Les Grecs firent semblant d’embarquer sur leurs navires et de prendre le large tandis que les Troyens, peu méfiants, s’emparaient du cheval en signe de victoire, le faisant entrer dans la ville. Plus tard cette nuit-là, les Grecs sortirent tant bien que mal dudit cheval de bois et ouvrirent les portes de la ville au reste de l’armée grecque afin que cette dernière pénètre dans la ville et la détruise. Quels attaquants peuvent potentiellement surgir de vos cadeaux de Noël ?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Selon gizmag, nos chères têtes blondes s’attendent aujourd’hui à ce que les jouets offerts puissent se connecter à Internet et être couplés à des appareils intelligents, leur permettant ainsi d’accéder aux dernières tendances technologiques en date, parfois même avant leurs parents. Toutefois, chers parents, bien que nous ne puissions que vous recommander de réfléchir à deux fois avant d’acheter à vos enfants un jouet connecté, soyez vous aussi vigilants car, comme vous pourrez le lire ci-dessous, les risques de sécurité ne concernent pas uniquement les gadgets pour enfants.

L’Internet des objets (IdO) devient rapidement partie intégrante de notre réalité car un plus grand nombre de nos objets du quotidien renferment maintenant de l’électronique, des logiciels, des capteurs ou sont capables de se connecter au réseau, leur permettant ainsi de recueillir et d’échanger des données. Combien de ces objets, pensez-vous alors, peuvent se transformer en vrais chevaux de Troie ? La guerre de Troie prit fin quand les Grecs firent preuve de malice pour entrer dans la ville de Troie, cachant des soldats dans un énorme cheval de bois. Les Grecs firent semblant d’embarquer sur leurs navires et de prendre le large tandis que les Troyens, peu méfiants, s’emparaient du cheval en signe de victoire, le faisant entrer dans la ville. Plus tard cette nuit-là, les Grecs sortirent tant bien que mal dudit cheval de bois et ouvrirent les portes de la ville au reste de l’armée grecque afin que cette dernière pénètre dans la ville et la détruise. Quels attaquants peuvent potentiellement surgir de vos cadeaux de Noël ?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



No comment yet.
Scooped by Gust MEES
December 14, 2015 6:47 PM
Scoop.it!

Welche Sicherheitsrisiken verbergen sich dieses Jahr in Ihren Weihnachtsgeschenken? | Internet Of Things | Privacy

Welche Sicherheitsrisiken verbergen sich dieses Jahr in Ihren Weihnachtsgeschenken? | Internet Of Things | Privacy | 21st Century Learning and Teaching | Scoop.it
Ihre tolle Smartwatch oder Spielerei könnte eine gewaltige Sicherheitslücke aufweisen ...


Früher lockte ein Weihnachtsbaum mit aufwändig verpackten Geschenken verführerisch Einbrecher an, von denen gerade in dieser Zeit des Jahres viele unterwegs waren. Heutzutage jedoch stecken unter dem bunten Geschenkpapier unter dem Baum technische Spielereien und mobile Geräte, die ein weitaus weniger offensichtliches und darüber hinaus kostspieligeres Risiko darstellen.

Technische Spielereien, Spiele mit WLAN, Wearables, Tablets, Smartphones, Fitness-Tracker, Smartwatches, Handys und sogar größere Geräte wie Laptops zählen voraussichtlich zu den beliebtesten Präsenten dieses Jahr zu Weihnachten.

Laut der britischen Spielzeughändlervereinigung sind in Großbritannien folgende 12 Spielzeuge die beliebtesten Weihnachtsgeschenke 2015; anfgeführt wird diese Liste von “Baby Toot-Toot Friends Busy Sounds Discovery House” des Herstellers Vtech. Sagt Ihnen Vtech etwas?

Laut gizmag erwarten die Kinder von heute, dass sich ihre Spielzeuge mit dem Internet verbinden, mit smarten Geräten koppeln und oftmals noch vor ihren Eltern an den neuesten Trends in der Technologie teilhaben lassen. Allerdings sollten Eltern aus gutem Grunde sich wohl überlegen, bevor sie ihren Kindern technische Spielereien kaufen; denn wie Sie weiter unten sehen werden, weisen diese Risiken nicht nur Kinderspielzeuge auf.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/





DigCom10's curator insight, December 15, 2015 4:38 PM

(Deutsch) Letzte Woche hatten wir schön über das Internet der Dinge gesprochen. Kann das gefährlich sein? Das denkt der Autor dieses Artikels.

 

(Español) La semana pasada ya habíamos hablado del Internet de las cosas. Puede ser peligroso? Es lo que piensa el autor de este artículo!

Scooped by Gust MEES
December 8, 2015 9:23 AM
Scoop.it!

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Information systems – computing resources such as networks and databases that enable essential services, businesses and the internet to function – are affected by an increasing number of security incidents. These incidents can have different origins, including technical failures, unintentional mistakes, natural disasters or malicious attacks. They could disrupt the supply of essential services we take for granted such as electricity, water, healthcare, or transport services.
It is a priority for the Commission to help prevent these incidents, and in case they occur, provide the most efficient response. This is why the Commission put forward in 2013 a proposal for a Directive to ensure a high common level of network and information security (NIS) in the EU. The European Parliament and the Luxembourg Presidency of the EU Council of Ministers last night reached an agreement on the rules which will:
improve cybersecurity capabilities in Member States
improve Member States' cooperation on cybersecurity
require operators of essential services in the energy, transport, banking and healthcare sectors, and providers of key digital services like search engines and cloud computing, to take appropriate security measures and report incidents to the national authorities
Gust MEES's insight:

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Information systems – computing resources such as networks and databases that enable essential services, businesses and the internet to function – are affected by an increasing number of security incidents. These incidents can have different origins, including technical failures, unintentional mistakes, natural disasters or malicious attacks. They could disrupt the supply of essential services we take for granted such as electricity, water, healthcare, or transport services.
It is a priority for the Commission to help prevent these incidents, and in case they occur, provide the most efficient response. This is why the Commission put forward in 2013 a proposal for a Directive to ensure a high common level of network and information security (NIS) in the EU. The European Parliament and the Luxembourg Presidency of the EU Council of Ministers last night reached an agreement on the rules which will:
improve cybersecurity capabilities in Member States
improve Member States' cooperation on cybersecurity
require operators of essential services in the energy, transport, banking and healthcare sectors, and providers of key digital services like search engines and cloud computing, to take appropriate security measures and report incidents to the national authorities


No comment yet.
Scooped by Gust MEES
November 19, 2015 5:06 PM
Scoop.it!

7 reasons why IoT device hacks keep happening | Internet Of Things | CyberSecurity | Privacy

7 reasons why IoT device hacks keep happening | Internet Of Things | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it

Let’s skip the part where we talk about how many fancy IoT devices people will have in 5 years. We can also skip the part where we talk about the benefits of these devices.


Why is it that these connected devices are being hacked over and over again?


The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future.

  1. MVP mindset
  2. Usability > security
  3. Lack of skills and resources
  4. Ship and forget mindset
  5. You (the user)
  6. Complex supply chain
  7. Cybercrime as a service


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

Let’s skip the part where we talk about how many fancy IoT devices people will have in 5 years. We can also skip the part where we talk about the benefits of these devices.


Why is it that these connected devices are being hacked over and over again?


The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future.

  1. MVP mindset
  2. Usability > security
  3. Lack of skills and resources
  4. Ship and forget mindset
  5. You (the user)
  6. Complex supply chain
  7. Cybercrime as a service


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
February 28, 2016 5:07 PM
Scoop.it!

Computer Viruses & Malware: Facts & FAQs | Kaspersky Lab US | #CyberSecurity | #EdTech

Computer Viruses & Malware: Facts & FAQs | Kaspersky Lab US | #CyberSecurity | #EdTech | 21st Century Learning and Teaching | Scoop.it
Computer viruses and malware are a constant danger to every internet user. Get a leg up on these pesky threats. Learn all you need to know about modern malware, so you can stay safe online.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/




Gust MEES's insight:
Computer viruses and malware are a constant danger to every internet user. Get a leg up on these pesky threats. Learn all you need to know about modern malware, so you can stay safe online.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/


Stephania Savva, Ph.D's curator insight, March 2, 2016 7:12 AM
Computer viruses and malware are a constant danger to every internet user. Get a leg up on these pesky threats. Learn all you need to know about modern malware, so you can stay safe online.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/


Dennis Swender's curator insight, March 13, 2016 9:48 AM
Computer viruses and malware are a constant danger to every internet user. Get a leg up on these pesky threats. Learn all you need to know about modern malware, so you can stay safe online.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/


Fernando de la Cruz Naranjo Grisales's curator insight, March 14, 2016 4:13 PM
Computer viruses and malware are a constant danger to every internet user. Get a leg up on these pesky threats. Learn all you need to know about modern malware, so you can stay safe online.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/


Scooped by Gust MEES
February 20, 2016 10:48 AM
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 2016 4:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Scooped by Gust MEES
February 15, 2016 9:07 AM
Scoop.it!

Big data privacy must be fixed before the revolution can begin | Digital CitiZENship | eSkills

Big data privacy must be fixed before the revolution can begin | Digital CitiZENship | eSkills | 21st Century Learning and Teaching | Scoop.it


There won't be a 'big data revolution' until the public can be reassured that their data won't be misused.

Big data is an asset which can create tens of thousands of jobs and generate hundreds of billions for the economy, but the opportunity can't be taken until concerns about privacy and security have been overcome.

The Power of IoT and Big Data

We delve into where IoT will have the biggest impact and what it means for the future of big data analytics.

That's according to the newly released The Big Data Dilemmareport which is based on evidence from technologists, open data enthusiasts, medical research organisations and privacy campaigners.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...



Gust MEES's insight:

There won't be a 'big data revolution' until the public can be reassured that their data won't be misused.



Big data is an asset which can create tens of thousands of jobs and generate hundreds of billions for the economy, but the opportunity can't be taken until concerns about privacy and security have been overcome.


The Power of IoT and Big Data

We delve into where IoT will have the biggest impact and what it means for the future of big data analytics.


That's according to the newly released The Big Data Dilemmareport which is based on evidence from technologists, open data enthusiasts, medical research organisations and privacy campaigners.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


No comment yet.
Scooped by Gust MEES
February 14, 2016 3:43 PM
Scoop.it!

'I have nothing to hide' is killing the privacy argument

'I have nothing to hide' is killing the privacy argument | 21st Century Learning and Teaching | Scoop.it
We all have something to hide.
The problem with the “nothing to hide” argument is: we’ve all got plenty to hide.


Just today, did you pick your nose? Change clothes? Have sex? Take a shower? Go to the bathroom? Sing off-key in the car on the way to work? Or, maybe you sent an email or text message, a racy photo on Snapchat, or said something inflammatory about your boss.

I bet, if pressed, you’d prefer that most, if not all, of these actions remained private.

And that’s okay. 

Privacy is a key part of all our lives. But now that our lives are drifting into the online space, and more with each passing year, why the disconnect between offline and online privacy? The former is desired and expected, while the latter is lauded as wrong and sometimes even criminal.

Separating the desire for privacy from the desire to do something illegal is where it all starts. Too often the two are interwoven into a blanket statement that all those who desire privacy online are doing so out of the necessity to hide nefarious actions.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:
We all have something to hide.
The problem with the “nothing to hide” argument is: we’ve all got plenty to hide.


Just today, did you pick your nose? Change clothes? Have sex? Take a shower? Go to the bathroom? Sing off-key in the car on the way to work? Or, maybe you sent an email or text message, a racy photo on Snapchat, or said something inflammatory about your boss.

I bet, if pressed, you’d prefer that most, if not all, of these actions remained private.

And that’s okay. 

Privacy is a key part of all our lives. But now that our lives are drifting into the online space, and more with each passing year, why the disconnect between offline and online privacy? The former is desired and expected, while the latter is lauded as wrong and sometimes even criminal.

Separating the desire for privacy from the desire to do something illegal is where it all starts. Too often the two are interwoven into a blanket statement that all those who desire privacy online are doing so out of the necessity to hide nefarious actions.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


No comment yet.
Scooped by Gust MEES
February 8, 2016 10:59 AM
Scoop.it!

2 GByte Gratisspeicher für Google Drive sichern | Safer Internet Day 2016 | #SID2016

2 GByte Gratisspeicher für Google Drive sichern | Safer Internet Day 2016 | #SID2016 | 21st Century Learning and Teaching | Scoop.it
Google spendiert zur Feier des Safer Internet Day 2016 allen Nutzern für die Absolvierung eines Sicherheitschecks 2 GByte zusätzlichen Cloud-Speicher auf Google Drive.





Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2016/01/18/sid2016-safer-internet-day-2016-participation/


Gust MEES's insight:
Google spendiert zur Feier des Safer Internet Day 2016 allen Nutzern für die Absolvierung eines Sicherheitschecks 2 GByte zusätzlichen Cloud-Speicher auf Google Drive.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2016/01/18/sid2016-safer-internet-day-2016-participation/


No comment yet.
Scooped by Gust MEES
January 27, 2016 6:52 PM
Scoop.it!

Get smart on government surveillance | Privacy | Human Rights

Get smart on government surveillance | Privacy | Human Rights | 21st Century Learning and Teaching | Scoop.it



Decide where you think the line should be – and keep others from crossing it. Get smart on government surveillance.



Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:

Decide where you think the line should be – and keep others from crossing it. Get smart on government surveillance.



Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


No comment yet.
Scooped by Gust MEES
January 11, 2016 3:17 PM
Scoop.it!

How-To To Incorporate ICT within Physical EDUcation

How-To To Incorporate ICT within Physical EDUcation | 21st Century Learning and Teaching | Scoop.it

Two authors WHO have collaborated already since looong (see below links, please) on Global-Collaboration and learning together about ICT and everything around it, Cyber Security, Privacy , Digital CitiZenship are trying to show YOU, dear readers, THE possibilities on THE How-To to integrate Physical EDUcation within ICT and Social Media...


You will find as well links to software chosen by renowned Universities...

Gust MEES's insight:

Two authors WHO have collaborated already since looong (see below links, please) on Global-Collaboration and learning together about ICT and everything around it, Cyber Security, Privacy , Digital CitiZenship are trying to show YOU, dear readers, THE possibilities on THE How-To to integrate Physical EDUcation within ICT and Social Media...


You will find as well links to software chosen by renowned Universities...


No comment yet.
Scooped by Gust MEES
January 1, 2016 11:39 AM
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | 21st Century Learning and Teaching | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's curator insight, January 1, 2016 5:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 2016 11:09 AM

Good to know..

Dennis Swender's curator insight, March 13, 2016 10:07 AM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Scooped by Gust MEES
December 17, 2015 10:05 AM
Scoop.it!

Future of the Connected Home: Security in the Internet of Things | CyberSecurity | IoT

Guarding against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks …


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
Guarding against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks …


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


delmy's curator insight, December 17, 2015 10:27 AM

#sceuned15 interesante , para poner en practica

delmy's curator insight, December 18, 2015 6:31 PM

#SCEUNED15 , hablando de seguridad en la red.

Scooped by Gust MEES
December 15, 2015 9:27 AM
Scoop.it!

What security risks are hidden in your Christmas presents this year? | CyberSecurity | Internet of Things

What security risks are hidden in your Christmas presents this year? | CyberSecurity | Internet of Things | 21st Century Learning and Teaching | Scoop.it

According to gizmag, today’s kids expect their toys to connect to the internet, pair with smart devices, and let them join in the latest tech trends, often before their parents. However, while there are good reasons parents should think twice before buying tech toys for their kids, as you will read below, security risks aren’t just confined to gadgets for children.

As the concept of the Internet of Things (IoT) rapidly becomes reality as more and more objects are embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, how many of your Christmas gifts could be the equivalent of the Trojan Horse? It was a decisive end to the Trojan War when the Greeks used subterfuge to enter the city of Troy, hiding some of their army inside a huge wooden horse. After pretending to sail away, the unsuspecting Trojans pulled the horse into their city as a victory trophy. Later that night the Greek force crept out of the horse and opened the city gates for the rest of the Greek army to enter and destroy the city. What attackers could be potentially unleashed in your Christmas gifts?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

According to gizmag, today’s kids expect their toys to connect to the internet, pair with smart devices, and let them join in the latest tech trends, often before their parents. However, while there are good reasons parents should think twice before buying tech toys for their kids, as you will read below, security risks aren’t just confined to gadgets for children.

As the concept of the Internet of Things (IoT) rapidly becomes reality as more and more objects are embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, how many of your Christmas gifts could be the equivalent of the Trojan Horse? It was a decisive end to the Trojan War when the Greeks used subterfuge to enter the city of Troy, hiding some of their army inside a huge wooden horse. After pretending to sail away, the unsuspecting Trojans pulled the horse into their city as a victory trophy. Later that night the Greek force crept out of the horse and opened the city gates for the rest of the Greek army to enter and destroy the city. What attackers could be potentially unleashed in your Christmas gifts?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
December 8, 2015 11:15 AM
Scoop.it!

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Gust MEES's insight:
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Tony Guzman's curator insight, December 9, 2015 3:32 PM

This "new" malware may present a significant challenge to IT teams in the coming months.

Scooped by Gust MEES
December 4, 2015 8:15 AM
Scoop.it!

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


Gust MEES's insight:

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


No comment yet.