21st Century Learning and Teaching
586.1K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Mobile-Security'. Clear
Scooped by Gust MEES
Scoop.it!

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


Gust MEES's insight:

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
.
Learn more / Mehr erfahren:
.
.
Gust MEES's insight:
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
Learn more / Mehr erfahren:
No comment yet.
Scooped by Gust MEES
Scoop.it!

How to prevent mobile malware in 3 easy steps | eSkills

How to prevent mobile malware in 3 easy steps | eSkills | 21st Century Learning and Teaching | Scoop.it
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
Gust MEES's insight:

Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Viruslist.com - Der Feind in meinem Telefon | MobileSecurity | CyberSecurity | Awareness

Viruslist.com - Der Feind in meinem Telefon | MobileSecurity | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

Interessant ist, dass man sich vor allen hier beschriebenen mobilen Bedrohungen eigentlich recht problemlos schützen kann. Die Entwickler mobiler Plattformen haben sich ausreichend um die Sicherheit gekümmert, so dass der Anwender zum schwächsten Glied in der Kette geworden ist. Das ist gut und schlecht zugleich. Schlecht, weil sich viele Anwender einfach zu wenige Gedanken über ihre Sicherheit machen. Gut, weil Sie nur einige wenige einfache Ratschläge befolgen müssen, um sich vor allen oben beschriebenen Plagen zu schützen.


Wir empfehlen Ihnen, sich an die folgenden Regeln zu halten:

  • Hacken Sie Ihr Smartphone nicht. Sicherlich, ein Jailbreak auf dem iPhone und ein Root-Zugriff auf Android-Geräten eröffnet Ihnen zusätzliche Möglichkeiten auf Ihrem Telefon, aber Sie geben damit auch Cyberkriminellen grünes Licht.
  • Deaktivieren Sie bei Android die Möglichkeit der Installation von Programmen aus nicht vertrauenswürdigen Quellen.
  • Legen Sie sich ein mobiles Antivirus-Programm zu, das die Apps während des Installationsprozesses analysiert.
  • Versuchen Sie, keinen Links aus SMS zu folgen, selbst wenn sie sich in Nachrichten von Bekannten befinden.
  • Sollten Sie doch einmal einem Link in einer SMS gefolgt sein, stimmen Sie keinerlei Downloads oder Installationen zu.
  • Aktualisieren Sie Ihre Anwendungen nur über den Update-Download aus den offiziellen Shops, und nicht über irgendwelche Webseiten.


Learn more / Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


Gust MEES's insight:

Interessant ist, dass man sich vor allen hier beschriebenen mobilen Bedrohungen eigentlich recht problemlos schützen kann. Die Entwickler mobiler Plattformen haben sich ausreichend um die Sicherheit gekümmert, so dass der Anwender zum schwächsten Glied in der Kette geworden ist. Das ist gut und schlecht zugleich. Schlecht, weil sich viele Anwender einfach zu wenige Gedanken über ihre Sicherheit machen. Gut, weil Sie nur einige wenige einfache Ratschläge befolgen müssen, um sich vor allen oben beschriebenen Plagen zu schützen.

Wir empfehlen Ihnen, sich an die folgenden Regeln zu halten:

  • Hacken Sie Ihr Smartphone nicht. Sicherlich, ein Jailbreak auf dem iPhone und ein Root-Zugriff auf Android-Geräten eröffnet Ihnen zusätzliche Möglichkeiten auf Ihrem Telefon, aber Sie geben damit auch Cyberkriminellen grünes Licht.
  • Deaktivieren Sie bei Android die Möglichkeit der Installation von Programmen aus nicht vertrauenswürdigen Quellen.
  • Legen Sie sich ein mobiles Antivirus-Programm zu, das die Apps während des Installationsprozesses analysiert.
  • Versuchen Sie, keinen Links aus SMS zu folgen, selbst wenn sie sich in Nachrichten von Bekannten befinden.
  • Sollten Sie doch einmal einem Link in einer SMS gefolgt sein, stimmen Sie keinerlei Downloads oder Installationen zu.
  • Aktualisieren Sie Ihre Anwendungen nur über den Update-Download aus den offiziellen Shops, und nicht über irgendwelche Webseiten.


Learn more / Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


No comment yet.
Scooped by Gust MEES
Scoop.it!

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.




1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Gust MEES's insight:
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.


1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Elizabeth Milovidov's curator insight, December 1, 2014 9:24 AM

Is your phone secure?  Read these 10 tips for guidance.

Scooped by Gust MEES
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security




Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks | 21st Century Learning and Teaching | Scoop.it
Distributed denial-of-service (DDOS) attack protection solutions provider Prolexic has published its Global DDOS Attack Report for the fourth quarter ...

 

“The prevalence of mobile devices and the widespread availability of downloadable apps that can be used for DDoS is a game changer,” explained Stuart Scholly, president of Prolexic. 

 

Malicious actors now carry a powerful attack tool in the palm of their hands, which requires minimal skill to use. Because it is so easy for mobile device users to opt-in to DDoS attack campaigns, we expect to see a considerable increase in the use of these attack tools in 2014,” Scholly added.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile+Device+Security

 

No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke | 21st Century Learning and Teaching | Scoop.it
Security-SuperGAU für alle Nutzer von iPhones und iPads: Experten haben eine Lücke in iOS-Apps entdeckt, die es erlaubt, die komplette Kommunikation über fremde Server umzuleiten. Tausende Apps sollen betroffen sein.

 

Über HTTP Request Hijacking sollen sich Hacker in iOS-Apps einschleichen und so den Datentraffic über eigene Server umleiten können. Nach erfolgreichem Angriff soll die Umleitung dann permanent aktiv sein.

 

===> Einzige Abhilfe schafft ein Update oder eine Neuinstallation der App. <===

 

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | 21st Century Learning and Teaching | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Gust MEES's insight:

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | 21st Century Learning and Teaching | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic]

Download with Caution! McAfee Identifies Risky Mobile App Sources [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Infographic

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

 

Scooped by Gust MEES
Scoop.it!

Fake Antivirus Holds Android Phones for Ransom

Fake Antivirus Holds Android Phones for Ransom | 21st Century Learning and Teaching | Scoop.it
Fake antivirus, also called scareware, is a well-known Windows problem. Symantec researchers have found fake antivirus aimed at Android devices, and it's even nastier.
Gust MEES's insight:

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Gust MEES's curator insight, June 25, 2013 9:43 AM

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Scooped by Gust MEES
Scoop.it!

600 Millionen Apps nicht sicher vor Hackern | ICT | MobileSecurity | CyberSecurity | DigitalCitiZEN | eSkills

600 Millionen Apps nicht sicher vor Hackern | ICT | MobileSecurity | CyberSecurity | DigitalCitiZEN | eSkills | 21st Century Learning and Teaching | Scoop.it
Sicherheitsforscher warnen Nutzer von Android- und iOS-Apps vor der Verwendung unsicherer Passwörter. Viele der getesteten Apps verfügen über keinen Schutz vor Wörterbuch-Attacken.


Viele App-Entwickler haben ihre Hausaufgaben nicht gemacht: Rund 53 der beliebtesten Android- und iOS-Apps bieten nach Angaben von Sicherheits-Forschern der Universität Cambridge keinen Schutz vor Brute-Force-Angriffen. Insgesamt seien diese Apps vermutlich 600 Millionen Mal heruntergeladen worden.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
Sicherheitsforscher warnen Nutzer von Android- und iOS-Apps vor der Verwendung unsicherer Passwörter. Viele der getesteten Apps verfügen über keinen Schutz vor Wörterbuch-Attacken.


Viele App-Entwickler haben ihre Hausaufgaben nicht gemacht: Rund 53 der beliebtesten Android- und iOS-Apps bieten nach Angaben von Sicherheits-Forschern der Universität Cambridge keinen Schutz vor Brute-Force-Angriffen. Insgesamt seien diese Apps vermutlich 600 Millionen Mal heruntergeladen worden.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT

Millionen Passwörter auf Android unsicher | Awareness | MobileSecurity | eSkills | ICT | 21st Century Learning and Teaching | Scoop.it
Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.
Gust MEES's insight:

Bis zu 500 Millionen Android-Smartphones sollen über einen fehlerhaft implementierten "Factory Reset" verfügen. Passwörter und Nutzerdaten seien dadurch auch nach dem Zurücksetzen des Geräts wiederherstellbar.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile botnets detected since 2010 [pdf] | MobileSecurity | CyberSecurity

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Apache Cordova Vulnerability: 10% of Android Banking Apps Vulnerable

Apache Cordova Vulnerability: 10% of Android Banking Apps Vulnerable | 21st Century Learning and Teaching | Scoop.it
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Gust MEES's insight:

The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Une belle faille de sécurité Android concerne un milliard de terminaux

Une belle faille de sécurité Android concerne un milliard de terminaux | 21st Century Learning and Teaching | Scoop.it

Le mécanisme de mise à jour d’Android souffre d’une importante faille de sécurité. Selon une étude menée à l’université de l’Indiana et chez Microsoft Research, plusieurs vulnérabilités critiques existent au sein du système de permissions gérant les nombreuses versions de l’OS mobile.


En faisant croire qu'elle avait jusque-là tous les droits, une application malveillante pourrait, après la mise à jour, accéder à toutes les données personnelles.


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


Gust MEES's insight:


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security Resolutions for the New Year

Mobile Security Resolutions for the New Year | 21st Century Learning and Teaching | Scoop.it
Here are some resolutions you can easily keep, and you will be glad you did! Our 5-point checklist to help you make essential improvements to your mobile security in 2014.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

2014 Predictions from Symantec [Infographic]

2014 Predictions from Symantec [Infographic] | 21st Century Learning and Teaching | Scoop.it
Whispers. The secret to predicting the future is to listen for the whisper.
No comment yet.
Scooped by Gust MEES
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | 21st Century Learning and Teaching | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===


Gust MEES's insight:

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses | 21st Century Learning and Teaching | Scoop.it

Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware. The (sad) winner is Android/Plankton.B!tr, with a record prevalence of 4.42% (note: prevalence is the number of new hits in a given time frame divided by the number of fortigates reporting during that same interval of time).


This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…


===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===



Gust MEES's insight:

 

This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…

 

===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===

 
No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | 21st Century Learning and Teaching | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's insight:

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Scooped by Gust MEES
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!

 

Gust MEES's curator insight, June 26, 2013 7:17 AM

 

Check it out and beware of the malware!!!