Education 2.0 & 3.0
149.1K views | +0 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
January 30, 2015 8:16 PM
Scoop.it!

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab | Education 2.0 & 3.0 | Scoop.it
Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.

 


Via Gust MEES
Gust MEES's curator insight, January 30, 2015 5:39 PM

Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.


Rescooped by Yashy Tohsaku from Learning & Mind & Brain
January 19, 2015 10:30 PM
Scoop.it!

10 Steps To CyberSecurity | Infographic [pdf]

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 


Via Gust MEES, Miloš Bajčetić
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
January 6, 2015 1:01 AM
Scoop.it!

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity | Education 2.0 & 3.0 | Scoop.it

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.

 

Learn more:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 


Via Gust MEES
Gust MEES's curator insight, January 5, 2015 4:05 PM

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Wron Ga's curator insight, January 18, 2015 1:44 PM

Kolejna walka z przęklętymi reklamami, artykuł opisuje reklamy w aplikacjach które wykorzystuja wolne luki, mnie osobiście sie to nie podoba psuja cały wizerunek aplikacji i przeszkadza uzotkownikom w uzytkowaniu ich .

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
December 26, 2014 10:40 PM
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Education 2.0 & 3.0 | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMG, AdaptiveMobile, Trend Micro, BAE Systems, WebSense, InfoSec Institute, Symantec, Kaspersky, Proofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff



Via Gust MEES
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
December 18, 2014 10:51 PM
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...

 

Learn more:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 


Via Gust MEES
Gust MEES's curator insight, December 18, 2014 5:16 PM
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
November 26, 2014 9:35 PM
Scoop.it!

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing | Education 2.0 & 3.0 | Scoop.it
Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.

Via Gust MEES
Gust MEES's curator insight, November 26, 2014 7:06 PM

Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.


Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
November 16, 2014 7:44 PM
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES, Dean J. Fusto
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
November 12, 2014 6:20 AM
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | Education 2.0 & 3.0 | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .

 

Learn more:

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 11, 2014 6:13 PM

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 29, 2014 5:21 PM
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 17, 2014 9:57 PM
Scoop.it!

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security | Education 2.0 & 3.0 | Scoop.it

Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???

 



Via Gust MEES
Gust MEES's curator insight, October 17, 2014 6:59 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Gust MEES's curator insight, October 17, 2014 7:08 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 15, 2014 11:19 AM
Scoop.it!

10 ans de cybersécurité en Europe ! | Cyber Security

10 ans de cybersécurité en Europe ! | Cyber Security | Education 2.0 & 3.0 | Scoop.it
Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.
 
Le Luxembourg est en effet l’un des pays pilotes en Europe quant à la sensibilisation du grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE-SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par "Security made in Lëtzebuerg" (SMILE), le groupement d’intérêt économique qui a été mandaté en 2010 par le ministère de l’Economie pour renforcer la sécurité de l’information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.
 
La table ronde a rassemblé des experts de l’industrie, comme Microsoft et Intel, ainsi que des représentants du "EU Code week ", "EU Kids online ", et de la "Grande coalition pour l’emploi numérique".

 

Learn more:

 

- http://www.cases.lu

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA

 

 


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 10:34 AM

Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.


Learn more:


http://www.cases.lu


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA





Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 14, 2014 5:22 AM
Scoop.it!

[Update] Hundreds of Dropbox passwords leaked online but Dropbox denies it was hacked

[Update] Hundreds of Dropbox passwords leaked online but Dropbox denies it was hacked | Education 2.0 & 3.0 | Scoop.it

A thread surfaced on Reddit today that contained links to files containing hundreds of usernames and passwords for Dropbox accounts in plain text, but it’s unclear where they were obtained from.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Dropbox

 


Via Gust MEES
Gust MEES's curator insight, October 14, 2014 2:26 AM

A thread surfaced on Reddit today that contained links to files containing hundreds of usernames and passwords for Dropbox accounts in plain text, but it’s unclear where they were obtained from.


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Dropbox


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 6, 2014 11:53 AM
Scoop.it!

Public Private Partnerships in Network and Information Security Education — ENISA

Public Private Partnerships in Network and Information Security Education — ENISA | Education 2.0 & 3.0 | Scoop.it
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/

 


Via Gust MEES
Gust MEES's curator insight, October 6, 2014 10:27 AM
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
January 27, 2015 10:21 PM
Scoop.it!

How can WE create a BETTER internet together!? | Infographic

How can WE create a BETTER internet together!? | Infographic | Education 2.0 & 3.0 | Scoop.it

Learn more:

 

https://gustmees.wordpress.com/2015/01/06/sid2015-safer-internet-day-2015-participation/

 

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES, Dean J. Fusto
Rescooped by Yashy Tohsaku from Learning & Mind & Brain
January 6, 2015 1:01 AM
Scoop.it!

World's Biggest Data Breaches | Selected losses greater than 30,000 records

World's Biggest Data Breaches | Selected losses greater than 30,000 records | Education 2.0 & 3.0 | Scoop.it

 

Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.


Via Gust MEES, Miloš Bajčetić
Iva Santos's curator insight, January 5, 2015 7:55 PM

Segurança e educação devem andar juntos.

 

Oksana Borukh's curator insight, January 7, 2015 2:15 AM

Nice visualization of data breaches by year, by type, by industry etc.

Wron Ga's curator insight, January 18, 2015 1:46 PM

Ukazuje wizualizacje najwiekszych danych,sztuczek oraz przecieków  dotyczacych róznych premier danego producenta

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
December 30, 2014 10:52 PM
Scoop.it!

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT | Education 2.0 & 3.0 | Scoop.it

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Via Gust MEES
Gust MEES's curator insight, December 30, 2014 3:33 PM

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
December 21, 2014 10:49 PM
Scoop.it!

Why You Need Antivirus Software

Why You Need Antivirus Software | Education 2.0 & 3.0 | Scoop.it
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.

 

Learn more:

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 


Via Gust MEES
Gust MEES's curator insight, December 21, 2014 4:15 PM
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Wron Ga's curator insight, January 18, 2015 1:54 PM

Trojany, botnety, ransomware, narzędzia rootkity-antywirusowe chronią przed wszystkimi rodzajami zagrożeń, nie tylko wirusy. Naprawdę  potrzebują ochrony antywirusowej

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
December 17, 2014 8:06 PM
Scoop.it!

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity | Education 2.0 & 3.0 | Scoop.it
A LOOK BACK AT 25 CYBER THREATS 

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 


Via Gust MEES
Gust MEES's curator insight, December 17, 2014 1:27 PM
A LOOK BACK AT 25 CYBER THREATS

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
November 17, 2014 5:01 PM
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Via Gust MEES
Gust MEES's curator insight, November 17, 2014 9:30 AM

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
November 16, 2014 7:46 PM
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
November 4, 2014 9:57 AM
Scoop.it!

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills | Education 2.0 & 3.0 | Scoop.it
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.

 

===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 4, 2014 9:36 AM
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.


===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 29, 2014 9:42 PM
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 15, 2014 6:44 PM
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.

 

http://grahamcluley.com/2014/10/poodle-b..

.


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 5:46 PM
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 14, 2014 5:02 PM
Scoop.it!

The Human Side of IT Security [PDF]


Via Gust MEES
Gust MEES's curator insight, October 14, 2014 4:39 PM

The Human Side of IT Security [PDF]


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
October 13, 2014 10:48 AM
Scoop.it!

What is Browser Hijacking? | Cyber Security

What is Browser Hijacking? | Cyber Security | Education 2.0 & 3.0 | Scoop.it

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/

 


Via Gust MEES
Gust MEES's curator insight, October 13, 2014 9:41 AM

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Roger Smith's curator insight, October 13, 2014 7:03 PM

Another sneaky way that the bad guys get ya!

mbeva's curator insight, October 14, 2014 7:21 AM

hack!!!!