business analyst
46.1K views | +2 today
Follow
business analyst
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Bloatware : des failles dans les logiciels préinstallés dans la plupart des PC du marché | #CyberSecurity #Awareness

Bloatware : des failles dans les logiciels préinstallés dans la plupart des PC du marché | #CyberSecurity #Awareness | business analyst | Scoop.it
On pourrait croire que depuis les scandales liés à Superfish et Edellroot, les fabricants d’ordinateurs ont renforcé les contrôles sur les logiciels préinstallés vendus avec leurs machines. Mais si l’on croit les chercheurs des équipes de Duo Security, la lutte contre les bloatwares n’est pas prête de se terminer.

Rappelons que les constructeurs proposent effet tous leurs machines avec des logiciels préinstallés, généralement qualifiés de bloatware ou crapware. Ces utilitaires à l’utilité parfois relative permettent généralement de contrôler l’état de la machine ou proposent certains services annexes à l’utilisateur.

L’étude menée par Duo Security porte sur une dizaine de machines achetées dans le commerce auprès de différents constructeurs : Lenovo, Dell, HP ainsi que Acer et Asus. Toutes sont livrées avec des logiciels préinstallés, que les chercheurs ont analysés afin de déterminer lesquels pouvaient présenter des failles de sécurité.

La conclusion est sans appel « Tous les constructeurs livraient leurs machines avec un logiciel présentant au moins une faille de sécurité permettant à une attaque de type man in the middle d’exécuter du code sur la machine avec un haut niveau de privilège » expliquent ainsi les chercheurs dans un post de blog.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Bloatware

 


Via Gust MEES
Gust MEES's curator insight, June 1, 2016 5:23 PM
On pourrait croire que depuis les scandales liés à Superfish et Edellroot, les fabricants d’ordinateurs ont renforcé les contrôles sur les logiciels préinstallés vendus avec leurs machines. Mais si l’on croit les chercheurs des équipes de Duo Security, la lutte contre les bloatwares n’est pas prête de se terminer.

Rappelons que les constructeurs proposent effet tous leurs machines avec des logiciels préinstallés, généralement qualifiés de bloatware ou crapware. Ces utilitaires à l’utilité parfois relative permettent généralement de contrôler l’état de la machine ou proposent certains services annexes à l’utilisateur.

L’étude menée par Duo Security porte sur une dizaine de machines achetées dans le commerce auprès de différents constructeurs : Lenovo, Dell, HP ainsi que Acer et Asus. Toutes sont livrées avec des logiciels préinstallés, que les chercheurs ont analysés afin de déterminer lesquels pouvaient présenter des failles de sécurité.

La conclusion est sans appel « Tous les constructeurs livraient leurs machines avec un logiciel présentant au moins une faille de sécurité permettant à une attaque de type man in the middle d’exécuter du code sur la machine avec un haut niveau de privilège » expliquent ainsi les chercheurs dans un post de blog.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Bloatware

 

 

Rescooped by michel verstrepen from E-Learning-Inclusivo (Mashup)
Scoop.it!

How to Destroy Creativity and Innovation

How to Destroy Creativity and Innovation | business analyst | Scoop.it
Creativity and innovation are the lifeblood of every organization. This poster describes 13 ways that creativity and innovation are destroyed every day.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=innovation

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Creativity

 

- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Sir+Ken+Robinson

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Frank+SONNENBERG

 


Via Gust MEES, juandoming
michel verstrepen's insight:
Creativity and innovation are the lifeblood of every organization. This poster describes 13 ways that creativity and innovation are destroyed every day.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=innovation

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Creativity

 

- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Sir+Ken+Robinson

 

- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Frank+SONNENBERG

 

Steve Wilhite's curator insight, April 2, 2016 3:00 AM
Share your insight
Silvia Nascimento's curator insight, April 4, 2016 8:21 PM
Creativity and innovation are the lifeblood of every organization. This poster describes 13 ways that creativity and innovation are destroyed every day.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=innovation

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Creativity

 

- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Sir+Ken+Robinson

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Frank+SONNENBERG

 

Felix Val's curator insight, April 5, 2016 3:21 AM
Creativity and innovation are the lifeblood of every organization. This poster describes 13 ways that creativity and innovation are destroyed every day.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=innovation

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Creativity

 

- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Sir+Ken+Robinson

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Frank+SONNENBERG

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Plus de 9.000 profils informatiques volés | VTech | CyberCrime | #IDTheft

Plus de 9.000 profils informatiques volés | VTech | CyberCrime | #IDTheft | business analyst | Scoop.it
La CNPD prévient d’une fuite de données d’une grande envergure au départ des jouets VTech, en raison d’une faille de sécurité. 9.204 profils sont touchés pour le Grand-Duché. Mode d’emploi pour les parents concernés.

La protection des données et, à l’inverse, les fuites possibles en cas de lacune des installations informatiques peuvent prendre des proportions importantes. La Commission nationale de protection des données (CNPD) indique en effet mercredi soir, dans un communiqué commun avec Securitymadein.lu, qu’une importante fuite de données a été détectée auprès de la société VTech.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Vtech


 http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES



Via Gust MEES
Gust MEES's curator insight, December 2, 2015 4:48 PM
La CNPD prévient d’une fuite de données d’une grande envergure au départ des jouets VTech, en raison d’une faille de sécurité. 9.204 profils sont touchés pour le Grand-Duché. Mode d’emploi pour les parents concernés.

La protection des données et, à l’inverse, les fuites possibles en cas de lacune des installations informatiques peuvent prendre des proportions importantes. La Commission nationale de protection des données (CNPD) indique en effet mercredi soir, dans un communiqué commun avec Securitymadein.lu, qu’une importante fuite de données a été détectée auprès de la société VTech.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Vtech


 http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Rescooped by michel verstrepen from Free Tutorials in EN, FR, DE
Scoop.it!

FAQ et conseils sur Windows 10 - Microsoft | ICT | FAQ's | eSkills

FAQ et conseils sur Windows 10 - Microsoft | ICT | FAQ's | eSkills | business analyst | Scoop.it
Trouvez les réponses aux questions fréquemment posées sur la mise à jour gratuite vers Windows 10 et le processus de mise à jour.

Via Gust MEES
Gust MEES's curator insight, July 28, 2015 10:47 AM

Trouvez les réponses aux questions fréquemment posées sur la mise à jour gratuite vers Windows 10 et le processus de mise à jour.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/free-tutorials-in-en-fr-de/?tag=windows10




Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Hacking Team, Surveillance and You | Digital Privacy

Hacking Team, Surveillance and You | Digital Privacy | business analyst | Scoop.it
The fact that a company called Hacking Team was hacked, combined with the disclosure of their shady clientele, has several diminished the credibility of previous denials the company has made about their engaging in this kind of profiteering. It also validates criticisms that groups like the EFF and Reporters Without Borders have thrown at Hacking Team – basically, that they provide agents around the globe with cyberweapons used for the suppression of democracy and the violation of human rights.

Hacking Team offers their clients a “Remote Control System” (RCS) that combines a variety of spyware technologies into one comprehensive surveillance suite. According to The Citizen Lab, this RCS product essentially allows users to do things like turn the microphones and cameras of their targets’ mobile phones on/off, monitor and record communications, and copy files and passwords.

While Hacking Team sells exclusively to governments, companies are designing products and services to give them similar capabilities.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Hacking+Team+breach


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
Gust MEES's curator insight, July 17, 2015 6:39 PM
The fact that a company called Hacking Team was hacked, combined with the disclosure of their shady clientele, has several diminished the credibility of previous denials the company has made about their engaging in this kind of profiteering. It also validates criticisms that groups like the EFF and Reporters Without Borders have thrown at Hacking Team – basically, that they provide agents around the globe with cyberweapons used for the suppression of democracy and the violation of human rights.

Hacking Team offers their clients a “Remote Control System” (RCS) that combines a variety of spyware technologies into one comprehensive surveillance suite. According to The Citizen Lab, this RCS product essentially allows users to do things like turn the microphones and cameras of their targets’ mobile phones on/off, monitor and record communications, and copy files and passwords.

While Hacking Team sells exclusively to governments, companies are designing products and services to give them similar capabilities.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Hacking+Team+breach


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things: Your worst nightmare | ICT | eSkills

The Internet of Things: Your worst nightmare | ICT | eSkills | business analyst | Scoop.it
Is life really going to be easier when you can’t use your toothbrush because it’s lost its Internet connection?


My problems started with an all-too-common occurrence: My Wi-Fi router burned out and I had to replace it. This happens regularly enough that I keep another router as backup. I turned it on, then connected it to my cable modem and Sonos bridge for wireless music streaming. I was feeling smug — I used the same SSID and password as the previous one, figuring that all the devices would automatically connect to it.


Ah, if life in the IoT age were only so simple.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, July 8, 2015 4:39 PM
Is life really going to be easier when you can’t use your toothbrush because it’s lost its Internet connection?


My problems started with an all-too-common occurrence: My Wi-Fi router burned out and I had to replace it. This happens regularly enough that I keep another router as backup. I turned it on, then connected it to my cable modem and Sonos bridge for wireless music streaming. I was feeling smug — I used the same SSID and password as the previous one, figuring that all the devices would automatically connect to it.


Ah, if life in the IoT age were only so simple.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Halina Ostańkowicz-Bazan's curator insight, July 11, 2015 2:30 PM

Living with the Internet.

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

World of Technology – What jobs will we have in the future?

World of Technology – What jobs will we have in the future? | business analyst | Scoop.it
In recent decades, mankind has achieved an unprecedented breakthrough. Today, smartphone owners have access no matter where they are to more information that was available 30 years ago. The automation


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=future


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Job+Seekers



Via Gust MEES
Gust MEES's curator insight, March 30, 2015 2:13 AM

In recent decades, mankind has achieved an unprecedented breakthrough. Today, smartphone owners have access no matter where they are to more information that was available 30 years ago. The automation


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=future


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Job+Seekers


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip | business analyst | Scoop.it

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand.

.

Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Or even worse a combination of all the above; plus a malware or trojan laden url embedded in it.

.

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.

.

Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Via Gust MEES
Gust MEES's curator insight, March 8, 2015 3:21 PM

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.


Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Seven Things to Watch for in 2015 | CyberSecurity | Awareness | CyberCrime

Seven Things to Watch for in 2015 | CyberSecurity | Awareness | CyberCrime | business analyst | Scoop.it
A new year begins at midnight and Threatpost highlights seven things you're bound to contend with in 2015.


===> Forewarned is Forearmed!!! <===



Via Gust MEES
Gust MEES's curator insight, January 2, 2015 1:25 PM
A new year begins at midnight and Threatpost highlights seven things you're bound to contend with in 2015.


===> Forewarned is Forearmed!!! <===


Rescooped by michel verstrepen from Daily Magazine
Scoop.it!

What is the right strategy for IT in 2014?

What is the right strategy for IT in 2014? | business analyst | Scoop.it
SmartCompany.com.au
What is the right strategy for IT in 2014?

Via TechinBiz, THE OFFICIAL ANDREASCY
No comment yet.
Rescooped by michel verstrepen from 21st Century Tools for Teaching-People and Learners
Scoop.it!

40 years of the microprocessor

40 years of the microprocessor | business analyst | Scoop.it

40 years of the microprocessor: a look back at the most significant microprocessor developments that have shaped the IT Industry (Infographic)...


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from E-Learning-Inclusivo (Mashup)
Scoop.it!

Lancement de la plateforme #udata du #Luxembourg | #OpenData #DigitalLuxembourg #ICT 

Lancement de la plateforme #udata du #Luxembourg | #OpenData #DigitalLuxembourg #ICT  | business analyst | Scoop.it

A l’occasion de l’événement Game of Code, les 8, 9 et 10 avril derniers, Digital Lëtzebuerg en collaboration avec le Centre des Technologies de l’Information de l’Etat Luxembourgeois et l’administration du Cadastre et de la topographie lançait en version bêta son portail de données ouvertes data.public.lu. Développé à partir de udata, le moteur de la plateforme data.gouv.fr, ce site est le fruit d’une collaboration initiée il y a quelques mois entre la France et le Luxembourg.

Un lancement marqué par l’importance des réutilisations open data

 

Learn more / En savoir plus / Mehr erfahren:

  

http://www.scoop.it/t/luxembourg-europe/?tag=Digital+L%C3%ABtzebuerg

 


Via Gust MEES, juandoming
Gust MEES's curator insight, May 19, 2016 10:22 AM

A l’occasion de l’événement Game of Code, les 8, 9 et 10 avril derniers, Digital Lëtzebuerg en collaboration avec le Centre des Technologies de l’Information de l’Etat Luxembourgeois et l’administration du Cadastre et de la topographie lançait en version bêta son portail de données ouvertes data.public.lu. Développé à partir de udata, le moteur de la plateforme data.gouv.fr, ce site est le fruit d’une collaboration initiée il y a quelques mois entre la France et le Luxembourg.

Un lancement marqué par l’importance des réutilisations open data

 

Learn more / En savoir plus / Mehr erfahren:

  

http://www.scoop.it/t/luxembourg-europe/?tag=Digital+L%C3%ABtzebuerg

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

7 tips for securing the Internet of Things | IoT | IoE | CyberSecurity

7 tips for securing the Internet of Things | IoT | IoE | CyberSecurity | business analyst | Scoop.it
Can you join the IoT craze without having your devices turned against you? Here are 7 tips for protecting yourself...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 


Via Gust MEES
michel verstrepen's insight:
Can you join the IoT craze without having your devices turned against you? Here are 7 tips for protecting yourself...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

 

Gust MEES's curator insight, March 7, 2016 11:27 AM
Can you join the IoT craze without having your devices turned against you? Here are 7 tips for protecting yourself...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Nouvelles vulnérabilités découvertes dans Android | MobileSecurity

Nouvelles vulnérabilités découvertes dans Android | MobileSecurity | business analyst | Scoop.it
Des chercheurs de Check Point ont identifié de nouvelles vulnérabilités dans les dispositifs Android. Certifi-gate permet à des hackers de prendre le contrôle d'un appareil.
«Certifi-gate», tel est le nom donné à un vulnérabilité découverte par des chercheurs de Check Point  au sein du système d'exploitation Android. Elle permet à des applications pour offrir aux pirates un accès sans restriction à l'appareil et ainsi, selon Check Point, «dérober des données personnelles, localiser les appareils, activer le microphone pour enregistrer des conversations, et plus encore».


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Certifi-gate


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android



Via Gust MEES
michel verstrepen's insight:
Des chercheurs de Check Point ont identifié de nouvelles vulnérabilités dans les dispositifs Android. Certifi-gate permet à des hackers de prendre le contrôle d'un appareil.

«Certifi-gate», tel est le nom donné à un vulnérabilité découverte par des chercheurs de Check Point  au sein du système d'exploitation Android. Elle permet à des applications pour offrir aux pirates un accès sans restriction à l'appareil et ainsi, selon Check Point, «dérober des données personnelles, localiser les appareils, activer le microphone pour enregistrer des conversations, et plus encore».


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Certifi-gate


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android


Gust MEES's curator insight, August 8, 2015 7:15 AM
Des chercheurs de Check Point ont identifié de nouvelles vulnérabilités dans les dispositifs Android. Certifi-gate permet à des hackers de prendre le contrôle d'un appareil.

«Certifi-gate», tel est le nom donné à un vulnérabilité découverte par des chercheurs de Check Point  au sein du système d'exploitation Android. Elle permet à des applications pour offrir aux pirates un accès sans restriction à l'appareil et ainsi, selon Check Point, «dérober des données personnelles, localiser les appareils, activer le microphone pour enregistrer des conversations, et plus encore».


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Certifi-gate


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android


Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect | business analyst | Scoop.it
A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Via Gust MEES
Gust MEES's curator insight, July 17, 2015 7:12 PM

A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Epic Games forum hacked – change your online passwords, and beware of phishing | ICT | eSkills

Epic Games forum hacked – change your online passwords, and beware of phishing | ICT | eSkills | business analyst | Scoop.it
If you're an avid video gamer, chances are that you know of Epic Games. They're the developers of popular games such as Infinity Blade, Gears of War, Unreal Tournament… and – if you’re as old as me – you might even remember their founder Tim Sweeney’s classic DOS era shareware gameZZT.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing



Via Gust MEES
Gust MEES's curator insight, July 15, 2015 8:12 AM
If you're an avid video gamer, chances are that you know of Epic Games. They're the developers of popular games such as Infinity Blade, Gears of War, Unreal Tournament… and – if you’re as old as me – you might even remember their founder Tim Sweeney’s classic DOS era shareware gameZZT.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

A checklist for efficient competitive intelligence

A checklist for efficient competitive intelligence | business analyst | Scoop.it

 

As a competitive intelligence manager, you’ve probably grappled with multiple challenges over the years. Common challenges include, how do we develop our company’s internal competitive intelligence network; how can we gain insights in a broad range of specialized topics; how do we share market signals with key stakeholders effectively; how can we maximize the output from internal resources, and more. These are questions we help our clients address with the Intelligence Plaza all the time. here is a quick 10 point checklist for an efficient and trusted competitive intelligence program:


Via ismokuhanen, Gust MEES
Gust MEES's curator insight, July 4, 2015 11:17 AM

As a competitive intelligence manager, you’ve probably grappled with multiple challenges over the years. Common challenges include, how do we develop our company’s internal competitive intelligence network; how can we gain insights in a broad range of specialized topics; how do we share market signals with key stakeholders effectively; how can we maximize the output from internal resources, and more. These are questions we help our clients address with the Intelligence Plaza all the time. here is a quick 10 point checklist for an efficient and trusted competitive intelligence program:


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Smart cities will have almost 10 billion connected devices by 2020

Smart cities will have almost 10 billion connected devices by 2020 | business analyst | Scoop.it
What is a smart city?

A smart city is as an urban area where sensors have been implemented across public infrastructure in order to monitor traffic and usage of public services, such as lighting and parking spaces.

The contextual analysis of the real-time information gained from the sensors can help governments and companies in many sectors to make cities more sustainable and efficient, as well as being better able to cater to the needs of citizens living in the smart city.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


- http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities



Via Gust MEES
Gust MEES's curator insight, March 19, 2015 6:33 AM
What is a smart city?

A smart city is as an urban area where sensors have been implemented across public infrastructure in order to monitor traffic and usage of public services, such as lighting and parking spaces.

The contextual analysis of the real-time information gained from the sensors can help governments and companies in many sectors to make cities more sustainable and efficient, as well as being better able to cater to the needs of citizens living in the smart city.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities

Rescooped by michel verstrepen from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

16 million mobile devices hit by malware in 2014: Alcatel-Lucent | Mobile Security

16 million mobile devices hit by malware in 2014: Alcatel-Lucent | Mobile Security | business analyst | Scoop.it
Around 16 million mobile devices worldwide was hit by malware as at the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.

.

Less than 1 percent of infections came from iPhone and Blackberry smartphones. Although, new vulnerabilities, such as the 'Find My iPhone' exploit discovered last year, have emerged in the past 12 months, showing that they are not immune from malware threats.


Via Gust MEES
Gust MEES's curator insight, February 14, 2015 3:05 AM
Around 16 million mobile devices worldwide was hit by malware as at the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.

.

Less than 1 percent of infections came from iPhone and Blackberry smartphones. Although, new vulnerabilities, such as the 'Find My iPhone' exploit discovered last year, have emerged in the past 12 months, showing that they are not immune from malware threats.

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Free – good or bad? | Safe and Savvy

Free – good or bad? | Safe and Savvy | business analyst | Scoop.it

It’s always nice to get something for free. Or is it? There are really some free lunches on the net. But what appears to be free can have a hidden price, which often is paid by other means than money.

 

Internet did for a long time lack payment models and everything on the net was truly free. This was fine on a net that was an academic tool and playground for enthusiasts. Our Internet of today is totally different, and to a large extent business driven. But the culture of getting stuff for free on the net is deeply rooted. People are used to free stuff, or are hesitant to use payment on the net in fear of fraud.

 

This has created a lot of new business models based on free products and services. Either genuinely free or with a hidden compensation. One of the important skills for today’s cybercitizens is to recognize these business models and understand the hidden risks and compensations.

 

Read on to learn how.


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from Daily Magazine
Scoop.it!

How can I stop my wireless router getting hacked?

How can I stop my wireless router getting hacked? | business analyst | Scoop.it
Set up a longer passkey and change or hide the SSID, suggests Rick Maybury (Useful tip - How can I stop my wireless router getting hacked?

Via TechinBiz, THE OFFICIAL ANDREASCY
No comment yet.
Rescooped by michel verstrepen from The 21st Century
Scoop.it!

Launch of the UNESCO ICT Competency Framework for Teachers | United Nations Educational, Scientific and Cultural Organization

Launch of the UNESCO ICT Competency Framework for Teachers | United Nations Educational, Scientific and Cultural Organization | business analyst | Scoop.it

UNESCO in partnership with industry leaders and global subject experts has elaborated the ICT Competency Framework for Teachers which sets out the competencies required to teach effectively.


Via Dr. Susan Bainbridge
Claude Almansi's comment, October 31, 2011 3:24 AM
Thank you for the scoop, Susan: it is important because this framework is Unesco's. However the PDF of this framework (1) is strangely repetitive in its emptiness. The very few examples of possible activities were already run-of-the-mill in the former millennium, except for one foreseeing the use of the interactive whiteboards: but how many schools in emerging countries can afford them?

Also: how does a 94-page, multi-column, A4-formatted PDF read on a smart cell phone?

(1) http://unesdoc.unesco.org/images/0021/002134/213475E.pdf