21st Century Learning and Teaching
586.1K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

Cyber-Security: Advice for IoT, Smart-Home, Smart-TVs, etc. | #SID2020 #SIDLux #SaferInternet #CyberHygiene #CyberAwareness #InternetOfThings 

Cyber-Security: Advice for IoT, Smart-Home, Smart-TVs, etc. | #SID2020 #SIDLux #SaferInternet #CyberHygiene #CyberAwareness #InternetOfThings  | 21st Century Learning and Teaching | Scoop.it

Advice for IoT, Smart-Home, Smart-TVs, etc. As I already mentioned, years ago, in my tutorial <===> WHY Is It A MUST To Have Basics Knowledge Of Cyber-Security In A Connected Technology World!? <===> let us dig a bit deeper into IoT, Internet of Things and its implications of the users awareness AND responsibility. Actually…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

Gust MEES's insight:

Advice for IoT, Smart-Home, Smart-TVs, etc. As I already mentioned, years ago, in my tutorial <===> WHY Is It A MUST To Have Basics Knowledge Of Cyber-Security In A Connected Technology World!? <===> let us dig a bit deeper into IoT, Internet of Things and its implications of the users awareness AND responsibility. Actually…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SID2020: Safer Internet Day 2020-Participation – EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU by Gust MEES

SID2020: Safer Internet Day 2020-Participation – EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU by Gust MEES | 21st Century Learning and Teaching | Scoop.it

Safer Internet Day 2020 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

 

Gust MEES's insight:

Safer Internet Day 2020 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship | 21st Century Learning and Teaching | Scoop.it

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

Gust MEES's insight:

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

Scooped by Gust MEES
Scoop.it!

Securing the Internet of Things | #CyberSecurity #Coding #Arduino #IoT

Securing the Internet of Things | #CyberSecurity #Coding #Arduino #IoT | 21st Century Learning and Teaching | Scoop.it

Aside from cool cat feeders, it is possible to find multiple maker projects for controlling garage doors, blind windows, smart locks, tracking cars, control temperature and humidity levels, and so on. However, the security aspect of these devices needs to take some extra attention, starting from the connection between the device and the Cloud infrastructure.

 

Most microcontrollers today are not powerful enough to handle secure connections, like SSL or TLS, so all the communication between the device and the server is open to attacks, like sniffing values, tacking device credentials, faking values, granting unauthorized access to physical facilities, unlocking doors, and many other possibilities. This way, securing the communications for all the Internet-connected devices should be a priority, especially if they can jeopardize our security or privacy.

The security of the Internet of Things does not only rely on secure communications, but it is a great start. The maker community must be aware of the security concerns of untrusted communications, and must have the appropriate resources to handle it. This way it is common to see different alternatives to offer secure communications in the microcontrollers, like porting SSL/TLS libraries to cheap devices like ESP8266, or device vendors that already integrates a crypto chip that process all this stuff by hardware, like the recent Arduino MKR1000.

In thinger.io we are concerned about this security aspect, so our cloud supports secure connections for any device with this capability. In the recent Arduino library update, starting from version 2.4.1, we have introduced support for the Arduino MKR1000, including secure TLS connections by default. Just start with the following sample sketch for the MKR1000, and you will have encrypted connections by default.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=ARDUINO

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

Gust MEES's insight:

Aside from cool cat feeders, it is possible to find multiple maker projects for controlling garage doors, blind windows, smart locks, tracking cars, control temperature and humidity levels, and so on. However, the security aspect of these devices needs to take some extra attention, starting from the connection between the device and the Cloud infrastructure.

 

Most microcontrollers today are not powerful enough to handle secure connections, like SSL or TLS, so all the communication between the device and the server is open to attacks, like sniffing values, tacking device credentials, faking values, granting unauthorized access to physical facilities, unlocking doors, and many other possibilities. This way, securing the communications for all the Internet-connected devices should be a priority, especially if they can jeopardize our security or privacy.

The security of the Internet of Things does not only rely on secure communications, but it is a great start. The maker community must be aware of the security concerns of untrusted communications, and must have the appropriate resources to handle it. This way it is common to see different alternatives to offer secure communications in the microcontrollers, like porting SSL/TLS libraries to cheap devices like ESP8266, or device vendors that already integrates a crypto chip that process all this stuff by hardware, like the recent Arduino MKR1000.

In thinger.io we are concerned about this security aspect, so our cloud supports secure connections for any device with this capability. In the recent Arduino library update, starting from version 2.4.1, we have introduced support for the Arduino MKR1000, including secure TLS connections by default. Just start with the following sample sketch for the MKR1000, and you will have encrypted connections by default.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=ARDUINO

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

No comment yet.
Scooped by Gust MEES
Scoop.it!

BSIFB - Informationen - Mit sicheren Passwörtern private Daten schützen | #BSI #CyberSecurity #Awareness #Passwords

BSIFB - Informationen - Mit sicheren Passwörtern private Daten schützen | #BSI #CyberSecurity #Awareness #Passwords | 21st Century Learning and Teaching | Scoop.it

Mit sicheren Passwörtern private Daten schützen


Jedes Jahr erinnert der 1. Februar als "Ändere dein Passwort"-Tag Bürgerinnen und Bürger daran, ihre Passwörter zu wechseln. Passwörter sind aus dem digitalen Zeitalter nicht wegzudenken: Mit ihnen schützen wir Accounts für E-Mails und Online-Shops, Zugänge zum Online-Banking und zu sozialen Netzwerken, das eigene Smartphone und das WLAN zuhause.

 

Umso wichtiger ist es, all die dort hinterlegten privaten Daten mit sicheren Passwörtern vor dem Zugriff durch Dritte zu schützen – und sich diese Passwörter gut merken zu können.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Passwords

 

Gust MEES's insight:

Mit sicheren Passwörtern private Daten schützen


Jedes Jahr erinnert der 1. Februar als "Ändere dein Passwort"-Tag Bürgerinnen und Bürger daran, ihre Passwörter zu wechseln. Passwörter sind aus dem digitalen Zeitalter nicht wegzudenken: Mit ihnen schützen wir Accounts für E-Mails und Online-Shops, Zugänge zum Online-Banking und zu sozialen Netzwerken, das eigene Smartphone und das WLAN zuhause.

 

Umso wichtiger ist es, all die dort hinterlegten privaten Daten mit sicheren Passwörtern vor dem Zugriff durch Dritte zu schützen – und sich diese Passwörter gut merken zu können.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Passwords

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Education Companion | #CyberSecurity #Awareness #PracTICE

Security Education Companion | #CyberSecurity #Awareness #PracTICE | 21st Century Learning and Teaching | Scoop.it
The Security Education Companion is a resource for people teaching digital security to their friends and neighbors.
Lesson Topics 

These lesson modules are centered around specific learning objectives, and are divided into beginner, intermediate, and advanced lessons. Before jumping into using these modules, we recommend reading the articles from Security Education 101.
Within each of these modules, we have suggested prerequisites, warmups, activities, talking points, graphic materials, anticipated Q/A, as well as accompanying guides from Surveillance Self-Defensefor tool configurations and installs. As you get more practice with digital security workshops, we encourage you to remix or repurpose these lessons how you see fit.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=5+minutes

 

Gust MEES's insight:
The Security Education Companion is a resource for people teaching digital security to their friends and neighbors.
Lesson Topics 

These lesson modules are centered around specific learning objectives, and are divided into beginner, intermediate, and advanced lessons. Before jumping into using these modules, we recommend reading the articles from Security Education 101.
Within each of these modules, we have suggested prerequisites, warmups, activities, talking points, graphic materials, anticipated Q/A, as well as accompanying guides from Surveillance Self-Defensefor tool configurations and installs. As you get more practice with digital security workshops, we encourage you to remix or repurpose these lessons how you see fit.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=5+minutes

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Gust MEES's insight:
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Video Cybersecurity Awareness Month - YouTube | #ModernEDU #DigitalCitiZENship #ICT

Cybersecurity video produced in october 2013 by ISSA France Chapter in support of the European Cybersecurity Awareness Month. This crowd funded program, called CitiZENSec, goes beyond awareness for just employees and educates the general public.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

https://gustmees.wordpress.com/?s=cybersecurity

 

Gust MEES's insight:
Cybersecurity video produced in october 2013 by ISSA France Chapter in support of the European Cybersecurity Awareness Month. This crowd funded program, called CitiZENSec, goes beyond awareness for just employees and educates the general public.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

https://gustmees.wordpress.com/?s=cybersecurity

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT 

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT  | 21st Century Learning and Teaching | Scoop.it
Learn about the emerging smart city, the data privacy concerns that come with it, and the tools for data protection.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Smart+Cities

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

Gust MEES's insight:
Learn about the emerging smart city, the data privacy concerns that come with it, and the tools for data protection.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Smart+Cities

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Phishing-Know-How: So entlarven Sie bösartige Mails

Phishing-Know-How: So entlarven Sie bösartige Mails | 21st Century Learning and Teaching | Scoop.it
Jeder zweite Internetnutzer ist Opfer von Cybercrime. Wir zeigen, wie Sie solche Phishing-Attacken erkennen und sich schützen können.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Phishing

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Phishing

 

Gust MEES's insight:
Jeder zweite Internetnutzer ist Opfer von Cybercrime. Wir zeigen, wie Sie solche Phishing-Attacken erkennen und sich schützen können.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Phishing

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates 

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates  | 21st Century Learning and Teaching | Scoop.it

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

Gust MEES's insight:

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to secure your Raspberry Pi | #MakerED #Coding #CyberSecurity #IoT #InternetOfThings #Awareness

How to secure your Raspberry Pi | #MakerED #Coding #CyberSecurity #IoT #InternetOfThings #Awareness | 21st Century Learning and Teaching | Scoop.it
7 considerations to make when securing your Raspberry Pi.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Raspberry+PI

 

Gust MEES's insight:
7 considerations to make when securing your Raspberry Pi.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Raspberry+PI

 

Heather Mills's curator insight, March 20, 2017 10:23 PM

Maker: Raspberry Pi

Scooped by Gust MEES
Scoop.it!

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness | 21st Century Learning and Teaching | Scoop.it
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's insight:
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Cyber-Security: THE stupidity of companies to ask (force!!!) for a 2FA authentication… 

Cyber-Security: THE stupidity of companies to ask (force!!!) for a 2FA authentication…  | 21st Century Learning and Teaching | Scoop.it

THE stupidity of companies to ask (force!!!) for a 2FA authentication... BUT in the mood actually, WHY???!!! WE are in 2020: It is well known THAT a 2FA authentication ISN'T anymore secure, proven by Cyber-Security experts and EVEN the FBI reported and sent out awareness posts!!! SO, first of all let us find…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Two-factor+authentication

 

 

Gust MEES's insight:

THE stupidity of companies to ask (force!!!) for a 2FA authentication... BUT in the mood actually, WHY???!!! WE are in 2020: It is well known THAT a 2FA authentication ISN'T anymore secure, proven by Cyber-Security experts and EVEN the FBI reported and sent out awareness posts!!! SO, first of all let us find…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Two-factor+authentication

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene | 21st Century Learning and Teaching | Scoop.it

Let us talk about Hygiene... Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN'T it?!! Well, there is a reason behind: WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well...) WE need to take care of them! AND our body? The same: WE…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/21st-century-learning-and-teaching/?&tag=Cyber-Hygiene

 

https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

 

 

Gust MEES's insight:

Let us talk about Hygiene... Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN'T it?!! Well, there is a reason behind: WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well...) WE need to take care of them! AND our body? The same: WE…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/21st-century-learning-and-teaching/?&tag=Cyber-Hygiene

 

https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A peine sorti, macOS Mojave est déjà victime d’une grosse faille de sécurité | #CyberSecurity #Apple #NobodyIsPerfect

A peine sorti, macOS Mojave est déjà victime d’une grosse faille de sécurité | #CyberSecurity #Apple #NobodyIsPerfect | 21st Century Learning and Teaching | Scoop.it

Les contrôles d’accès censés protéger les données personnelles comme le carnet d’adresses peuvent être contournés, comme vient de le démontrer un chercheur en sécurité.
Depuis hier, 24 septembre, les utilisateurs d’ordinateurs Mac peuvent installer la dernière version du système d’exploitation macOS Mojave. Malheureusement, celle-ci est déjà impacté par une importante faille de sécurité qui met à mal la protection des données personnelles. Avec macOS Mojave, Apple a en effet musclé les contrôles d’accès aux fichiers et aux applications sensibles tels que le carnet d’adresses, l’historique des messages, la base de données d’email, le microphone, la caméra, etc. Mais ces contrôles d’accès peuvent être court-circuités, comme le démontre le chercheur en sécurité Patrick Wardle.

Cet expert a développé une application baptisée « breakMojave » capable de siphonner en douce le carnet d’adresses de l’utilisateur sans rien lui demander. Il a montré le déroulement du hack dans une vidéo Vimeo. Au départ, on constate qu’aucune application tierce n’a accès au carnet d’adresses. Le chercheur ouvre ensuite une fenêtre Terminal et tente d’accéder directement aux données du carnet d’adresses, sans succès. Le lancement de breakMojave provoque enfin l’extraction des données, qui se retrouvent copiées en vrac sur le bureau.     

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

 

Gust MEES's insight:

Les contrôles d’accès censés protéger les données personnelles comme le carnet d’adresses peuvent être contournés, comme vient de le démontrer un chercheur en sécurité.
Depuis hier, 24 septembre, les utilisateurs d’ordinateurs Mac peuvent installer la dernière version du système d’exploitation macOS Mojave. Malheureusement, celle-ci est déjà impacté par une importante faille de sécurité qui met à mal la protection des données personnelles. Avec macOS Mojave, Apple a en effet musclé les contrôles d’accès aux fichiers et aux applications sensibles tels que le carnet d’adresses, l’historique des messages, la base de données d’email, le microphone, la caméra, etc. Mais ces contrôles d’accès peuvent être court-circuités, comme le démontre le chercheur en sécurité Patrick Wardle.

Cet expert a développé une application baptisée « breakMojave » capable de siphonner en douce le carnet d’adresses de l’utilisateur sans rien lui demander. Il a montré le déroulement du hack dans une vidéo Vimeo. Au départ, on constate qu’aucune application tierce n’a accès au carnet d’adresses. Le chercheur ouvre ensuite une fenêtre Terminal et tente d’accéder directement aux données du carnet d’adresses, sans succès. Le lancement de breakMojave provoque enfin l’extraction des données, qui se retrouvent copiées en vrac sur le bureau.     

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet of Things (IoT) Network Architecture, Connectivity and Technology Solutions | Do you know what’s connecting? | #ModernSociety #Benefits | #CyberSecurity #Dangers | #Blockchain

Internet of Things (IoT) Network Architecture, Connectivity and Technology Solutions | Do you know what’s connecting? | #ModernSociety #Benefits | #CyberSecurity #Dangers | #Blockchain | 21st Century Learning and Teaching | Scoop.it

Do you know what’s connecting?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Gust MEES's insight:

Do you know what’s connecting?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE...

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE... | 21st Century Learning and Teaching | Scoop.it
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

  • making better use of digital technology for teaching and learning;

  • developing the digital competences and skills needed for living and working in an age of digital transformation; and

  • improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 

Gust MEES's insight:
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

  • making better use of digital technology for teaching and learning;

  • developing the digital competences and skills needed for living and working in an age of digital transformation; and

  • improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How Blockchain is the Key to a Secure IoT | #CyberSecurity #InternetOfThings 

How Blockchain is the Key to a Secure IoT | #CyberSecurity #InternetOfThings  | 21st Century Learning and Teaching | Scoop.it
The solution for Smeets and his team though is not to pile on extra layers of authentication, but rather to distribute them. And that's where blockchain comes it. Because the blockchain functions via a distributed and encrypted ledger shared across all of a network's users and devices, it creates a network of authentication that is verifiable and not easily hacked.

 

With blockchain implemented, a device cannot access a network unless it is verified through the entire ledger. In this scenario attacks like Mirai become significantly more difficult, if not impossible, because a hacker would need to modify the entire ledger, and not just the credentials of any one device.

Ericcson Research demonstrated a proof-of-concept of this idea at the 2017 Mobile World Congress in Barcelona this past March. The researchers set up a small WiFi network that used blockchain authentication instead of a typical username/password setup.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Gust MEES's insight:
The solution for Smeets and his team though is not to pile on extra layers of authentication, but rather to distribute them. And that's where blockchain comes it. Because the blockchain functions via a distributed and encrypted ledger shared across all of a network's users and devices, it creates a network of authentication that is verifiable and not easily hacked.

 

With blockchain implemented, a device cannot access a network unless it is verified through the entire ledger. In this scenario attacks like Mirai become significantly more difficult, if not impossible, because a hacker would need to modify the entire ledger, and not just the credentials of any one device.

Ericcson Research demonstrated a proof-of-concept of this idea at the 2017 Mobile World Congress in Barcelona this past March. The researchers set up a small WiFi network that used blockchain authentication instead of a typical username/password setup.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom | 21st Century Learning and Teaching | Scoop.it
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

Gust MEES's insight:
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

European CyberSecurity Month | Take the QUIZ | Level 1 — ECSM

European CyberSecurity Month | Take the QUIZ | Level 1 — ECSM | 21st Century Learning and Teaching | Scoop.it

European CyberSecurity Month | Take the QUIZ | Level 1

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

Gust MEES's insight:

European CyberSecurity Month | Take the QUIZ | Level 1

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Wie Sie NICHT Teil eines Botnetzes werden | #Botnet #DigitalCitiZENship  #CyberSecurity

Wie Sie NICHT Teil eines Botnetzes werden | #Botnet #DigitalCitiZENship  #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Zombiecomputer und wie Sie sie vermeiden:

Sie haben wahrscheinlich das Wort Botnetz in letzter Zeit mehr als einmal gehört, und das überrascht kaum. Jedes verbundene Gerät kann zombifiziert werden — und Teil eines Botnetzes werden. Das schließt PCs, Smartphones, Tablets, Router, WLAN-Kühlschränke, Smart Toys und viele andere Geräte ein.

In diesem Post erklären wir, was ein Botnetz ist, was es anrichtet und wie Sie Ihre Geräte davor schützen, Teil eines Botnetzes zu werden.

Botnetze: Was sind sie?

Ein Botnetz ist eine Gruppe von Geräten, die mit dem Internet verbundenen sind und mit einer bestimmten Malware infiziert wurden. Die Art von Malware, die Bots, oder Zombies, erstellt, arbeitet verdeckt, erwirbt Administratorenrechte und übergibt den Cyberkriminellen die Kontrolle, ohne sich zu verraten. Das infizierte Gerät funktioniert wie gewöhnlich – aber es folgt auch gleichzeitig den Anweisungen des Kommandeurs des Botnetzes. Zusammen bilden die infizierten Geräte eine starke Infrastruktur, mit der Cyberverbrechen begangen werden können.

Einige Botnetzkommandeure spezialisieren sich nur auf den Support und die Verbreitung des Botnetzes. Sie vermieten diese schädlichen Tools an andere Kriminelle, die mit ihnen Angriffe und andere kriminale Taten durchführen. Hier sind die vier gängigsten Wege, um ein Botnetz zu verwenden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Botnet

 

https://twitter.com/search?src=typd&q=%23fscd

 

 

Gust MEES's insight:

Zombiecomputer und wie Sie sie vermeiden:

Sie haben wahrscheinlich das Wort Botnetz in letzter Zeit mehr als einmal gehört, und das überrascht kaum. Jedes verbundene Gerät kann zombifiziert werden — und Teil eines Botnetzes werden. Das schließt PCs, Smartphones, Tablets, Router, WLAN-Kühlschränke, Smart Toys und viele andere Geräte ein.

In diesem Post erklären wir, was ein Botnetz ist, was es anrichtet und wie Sie Ihre Geräte davor schützen, Teil eines Botnetzes zu werden.

Botnetze: Was sind sie?

Ein Botnetz ist eine Gruppe von Geräten, die mit dem Internet verbundenen sind und mit einer bestimmten Malware infiziert wurden. Die Art von Malware, die Bots, oder Zombies, erstellt, arbeitet verdeckt, erwirbt Administratorenrechte und übergibt den Cyberkriminellen die Kontrolle, ohne sich zu verraten. Das infizierte Gerät funktioniert wie gewöhnlich – aber es folgt auch gleichzeitig den Anweisungen des Kommandeurs des Botnetzes. Zusammen bilden die infizierten Geräte eine starke Infrastruktur, mit der Cyberverbrechen begangen werden können.

Einige Botnetzkommandeure spezialisieren sich nur auf den Support und die Verbreitung des Botnetzes. Sie vermieten diese schädlichen Tools an andere Kriminelle, die mit ihnen Angriffe und andere kriminale Taten durchführen. Hier sind die vier gängigsten Wege, um ein Botnetz zu verwenden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Botnet

 

https://twitter.com/search?src=typd&q=%23fscd

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Botnetze: The Connected Dead | #ICT #CyberSecurity #Botnet #IoT #InternetOfThings 

Botnetze: The Connected Dead | #ICT #CyberSecurity #Botnet #IoT #InternetOfThings  | 21st Century Learning and Teaching | Scoop.it
Botnetze steuern Computer und IoT-Geräte, um einflussreiche Websites vom Netz zu nehmen und online für Chaos zu sorgen. Gehören Ihre Geräte dazu?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

Gust MEES's insight:
Botnetze steuern Computer und IoT-Geräte, um einflussreiche Websites vom Netz zu nehmen und online für Chaos zu sorgen. Gehören Ihre Geräte dazu?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Lernlabor Cybersicherheit - Fraunhofer AISEC | #CyberSecurity #ICT

Lernlabor Cybersicherheit -  Fraunhofer AISEC | #CyberSecurity #ICT | 21st Century Learning and Teaching | Scoop.it

Das Kursangebot des Weiterbildungsprogramms Lernlabor Cybersicherheit für Mai 2017 wurde veröffentlicht.

Anmeldungen nimmt gerne Dr. Daniela Pöhn entgegen.

Hier können Sie das Kursprogramm downloaden.

 

Gust MEES's insight:

Das Kursangebot des Weiterbildungsprogramms Lernlabor Cybersicherheit für Mai 2017 wurde veröffentlicht.

Anmeldungen nimmt gerne Dr. Daniela Pöhn entgegen.

Hier können Sie das Kursprogramm downloaden.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness

Quand les malwares ne s’en prennent pas qu’à Microsoft | #CrossPlatform #Apple #Linux #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:
Les malwares Windows sont souvent plus connus et fréquemment mis en avant dans les différents rapports d'experts en sécurité. Néanmoins, les menaces sont bien réelles et tout aussi dangereuses dans les environnement Linux, MacOS et Android.

Les experts en sécurité ont tendance à mettre l’accent sur les malwares de Windows, qui est traditionnellement plus visé par les activités malveillantes. Mais alors que certains rapports ne se concentrent que sur l’environnement Microsoft, les menaces sont bien présentes sur Linux, MacOS et les équipements Android, et moins bien appréhendées.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.