21st Century Learning and Teaching
586.1K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Risks'. Clear
Scooped by Gust MEES
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

Byod : un risque et une opportunité en même temps

Byod : un risque et une opportunité en même temps | 21st Century Learning and Teaching | Scoop.it
De plus en plus d’employés emmènent leurs appareils au travail et se connectent sur le réseau de l’entreprise.
Gust MEES's insight:

 

Learn more:

 

https://www.cases.lu/fr/byod-un-risque-et-une-opportunite-en-meme-temps.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | 21st Century Learning and Teaching | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===


Gust MEES's insight:

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | 21st Century Learning and Teaching | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD

Infographic: The High Cost of BYOD | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=BYOD

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD | Trustwave

Infographic: The High Cost of BYOD | Trustwave | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic]

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

4 Big Concerns About BYOD In Schools

4 Big Concerns About BYOD In Schools | 21st Century Learning and Teaching | Scoop.it
There are a few snags that can get in the way of implementing BYOD in schools and are worth knowing about before setting out on a BYOD path.

 

   

 

 

 

1. Security

2. Safety

3. Affordability

4. Networking and Compatibility

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic]

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic] | 21st Century Learning and Teaching | Scoop.it
There has always been at least some sort of disconnect between how things like mobile learning are taught in a classroom and how things work in the 'real world'.
Gust MEES's insight:

Real World!???

 

There is STILL some skill to add to that list ===> Cyber-Security skills!!! As students need to get knowledge who is tailored to the Real-World, this skill is very important!!! When having Cyber-Security skills, their employer doesn't have to invest in special training, which saves him big money!

 

And in times where Economy doesn't look that good worldwide, this is certainly a bonus point to find a new job!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Wireless Network Design | IT Solutions Blog | BYOD

Wireless Network Design | IT Solutions Blog | BYOD | 21st Century Learning and Teaching | Scoop.it
IT Solutions blog covering Technology in the Classroom, Wireless Solutions and Hospital Wireless Network IT Solutions.
Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Check it out and find other related infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

5 Essential Insights About Mobile Learning

5 Essential Insights About Mobile Learning | 21st Century Learning and Teaching | Scoop.it
As mobile learning becomes more common, district leaders are working hard to juggle nimble adaptation in a changing environment and the desire to get it right.


Learn more:



Gust MEES's insight:

Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked EA Server Used to Host Apple Phishing Page

Hacked EA Server Used to Host Apple Phishing Page | 21st Century Learning and Teaching | Scoop.it
Apple phishing scams are not uncommon, but phishing pages hosted on the website of a major company are certainly worth looking at. Experts have found ...


“The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network.”

The problem with phishing pages hosted on the web servers of reputable companies is that it’s less likely that they’ll be flagged. Furthermore, some users might be tricked into thinking that the pages are legit considering that they’re on a trusted domain.

In this case, the attackers could have made up a story about a collaboration between EA and Apple and that would have truly made the phish efficient.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Smartphone pictures pose privacy risks

Smartphone pictures pose privacy risks | 21st Century Learning and Teaching | Scoop.it

..Did You Know: You and your kids could get easily tracked!.Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Digital+Citizen

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Like inviting your boss into your house when you're not home

BYOD: Like inviting your boss into your house when you're not home | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device (BYOD) movement is gaining traction, but before you bring your phone to work you'd better think it through.

 

What you must realize is that your employer may insist at some point to scrutinize what's on your BYOD phone. Perhaps there's a rumor that an employee is grabbing company information, or that someone is snapping photos of sensitive things in the office. Maybe your company simply wants to update your work apps or settings.

 

Whatever the reason, it's not outside the realm of possibility that one day your employer may analyze the information on your phone. Yes, it's your personal phone but the BYOD situation means it's also the same as a work-provided phone.

 

Maybe it's not a big deal if your boss asks you to hand your phone over, but it still won't be a comfortable situation. What personal photos have you taken that reside on the phone? What intimate text messages have you exchanged with your spouse? You get the picture. It would be sort of like inviting your boss to your home when you're not there. What might he find snooping around your hacienda?

Gust MEES's insight:

 

It's not just phones, either. Some folks are taking tablets to work and those may expose even more personal data. Tablet owners usually surf the web more heavily on a tablet than a phone.

 

===> What would your boss see if your web history was analyzed? <===

 

A MUST read!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Think Tank: BYOD security: policy, control, containment, and management

Security Think Tank: BYOD security: policy, control, containment, and management | 21st Century Learning and Teaching | Scoop.it
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

EdTech "vs." IT

EdTech "vs." IT | 21st Century Learning and Teaching | Scoop.it

Unfortunately, the "EdTech vs. IT" mindset is all too prevalent in many organizations.  Operational IT looks down disdainfully on their users from an ivory tower, viewing them as "threats" to be carefully controlled and monitored. 

 

Teachers view the IT department as a bunch of out of touch control freaks who hinder rather than facilitate their work. As a former teacher, I have seen it from both sides.

This sad situation is wrong on many levels. 

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Gust MEES's insight:

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Make IT-Admin's life easier (and the relationship with...) by Learning and Teaching the basics of Cyber-Security, check below!

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

Education and Security:

 

https://gustmees.wordpress.com/2013/04/22/i-got-interviewed-feeling-honored/

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Glimpse At The BYOD Device Of The Future [Infographic]

A Glimpse At The BYOD Device Of The Future [Infographic] | 21st Century Learning and Teaching | Scoop.it
BYOD has changed how the barriers of tech adoption are seen. First and foremost, they're now visible (the barriers). Many schools and districts are finding…
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD in Education

BYOD A practical guide that will get you thinking!

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Ness Crouch's curator insight, April 16, 2013 5:34 PM

Great explanation of Bring Your Own Device thinking. This can guide discussion about BYOD in schools. 

Scooped by Gust MEES
Scoop.it!

Fast 33 Millionen Android-Geräte sind mit Malware infiziert

Fast 33 Millionen Android-Geräte sind mit Malware infiziert | 21st Century Learning and Teaching | Scoop.it
Laut einer Studie von NQ Mobile hat sich die Anzahl der Malware 2012 gegenüber 2011 verdreifacht. Im vergangenen Jahr gab es über 65.000 Schadprogramme.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD | 21st Century Learning and Teaching | Scoop.it
Mobile service provider NQ Mobile today released a study of malware covering 2012, using data gathered from the company's Security Labs.

 

NQ’s data indicates that Android is a big risk for malware, but iOS has also recently come under fire for free apps that leak more personal data than on other platforms. Overall, mobile security is likely to be a growing concern, and one that could potentially become more complicated as the pace of improvements to mobile tech increases and our usage of those devices grows higher still.

 

===> For now, common sense is probably the best defense against security threats, but a more unified Android platform would help to limit malware problems as well as significantly improve developers’ lives. <===

 

Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Verify the security of your mobile apps

Verify the security of your mobile apps | 21st Century Learning and Teaching | Scoop.it
The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.

 

 

 

 

 

 

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 



Via Frederic GOUTH
Gust MEES's insight:

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 


Check also:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.