21st Century Learning and Teaching
586.1K views | +2 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'cybercrime'. Clear
Scooped by Gust MEES
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Gust MEES's insight:
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness | 21st Century Learning and Teaching | Scoop.it
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's insight:
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness 

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness  | 21st Century Learning and Teaching | Scoop.it
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity 

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum 

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum  | 21st Century Learning and Teaching | Scoop.it
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Gust MEES's insight:
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.
Gust MEES's insight:

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Willem Kuypers's curator insight, January 21, 2015 2:54 AM

Le vidéo vaut la peine. Nous allons entrer dans la histoire comme la génération qui a inventé internet. Mais selon le spécialiste, nous avons créé un monstre. 

Dimonekene Ditutala's curator insight, January 21, 2015 8:33 AM

A nice and very important trends analysis.

Polly A. Sheppard's curator insight, January 23, 2015 6:00 PM

This really gives you something to think about!

Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Opération " #Mousetrap " : les #Cybergendarmes s'attaquent aux "petits" criminels du

Opération " #Mousetrap " : les #Cybergendarmes s'attaquent aux "petits" criminels du | 21st Century Learning and Teaching | Scoop.it
Europol a annoncé vendredi matin avoir mené une action coordonnée sur le continent européen. Les suspects sont essentiellement des "débutants".


"Quelques dizaines d'euros" pour un kit

Les suspects utilisaient des codes malicieux prêts à l'emploi "pour commettre différents types de délits, dont le vol de données personnelles, des attaques en déni de service et des extorsions", précise le colonel Freyssinet. "Souvent, ces kits (de piratage, NDLR) sont achetés pour quelques dizaines d'euros" sur Internet, explique-t-il. "L'usage de ces RAT (Remote Administration Tools, outils de prise de contrôle à distance, NDLR) va de l'immixtion dans la vie privée en allumant la webcam ou en fouillant les documents personnels, par exemple, à du détournement de données bancaires en s'attaquant au compte PayPal ou au numéro de carte bancaire", ajoute Éric Freyssinet. 


Via Frederic GOUTH
Gust MEES's insight:
Europol a annoncé vendredi matin avoir mené une action coordonnée sur le continent européen. Les suspects sont essentiellement des "débutants".


"Quelques dizaines d'euros" pour un kit

Les suspects utilisaient des codes malicieux prêts à l'emploi "pour commettre différents types de délits, dont le vol de données personnelles, des attaques en déni de service et des extorsions", précise le colonel Freyssinet. "Souvent, ces kits (de piratage, NDLR) sont achetés pour quelques dizaines d'euros" sur Internet, explique-t-il. "L'usage de ces RAT (Remote Administration Tools, outils de prise de contrôle à distance, NDLR) va de l'immixtion dans la vie privée en allumant la webcam ou en fouillant les documents personnels, par exemple, à du détournement de données bancaires en s'attaquant au compte PayPal ou au numéro de carte bancaire", ajoute Éric Freyssinet. 

Stephane Manhes's curator insight, November 21, 2014 7:34 AM

Pilotée par la France et la Roumanie, l'action des dernières semaines a été coordonnée par le Centre européen de lutte contre la cybercriminalité d'Europol (EC3), de plus en plus actif. Cinq autres pays du continent européen ont été impliqués : la Lettonie, l'Estonie, le Royaume-Uni, la Norvège (qui n'est pas membre de l'UE mais dispose d'un accord de coopération avec Europol) et l'Italie. 

Stephane Manhes's curator insight, November 25, 2014 2:48 AM

Les suspects utilisaient des codes malveillants prêts à l'emploi pour commettre différents types de délits, dont le vol de données personnelles, des attaques en déni de service et des extorsions (...) L'usage de ces RAT va de l'immixtion dans la vie privée en allumant la webcam ou en fouillant les documents personnels, par exemple, à du détournement de données bancaires en s'attaquant au compte PayPal ou au numéro de carte bancaire.

Scooped by Gust MEES
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | 21st Century Learning and Teaching | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Biggest ever Tor raid hits 410 underground sites; 17 arrested

Biggest ever Tor raid hits 410 underground sites; 17 arrested | 21st Century Learning and Teaching | Scoop.it
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Raids by law enforcement agencies in the U.S. and 16 European nations have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why cyber criminals are winning: The secret weapon of the black hats

Why cyber criminals are winning: The secret weapon of the black hats | 21st Century Learning and Teaching | Scoop.it
Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...
Gust MEES's insight:

Another day. Another hack. One day it’s black hats making headlines with a massive hack on Home Depot. The next, it’s the theft of 4.5 million U.S. hospital records or 1.2 billion web credentials. ...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security Education: Remove The Limits

Cyber Security Education: Remove The Limits | 21st Century Learning and Teaching | Scoop.it
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:
Low-level technical and high-level strategic education must come together to achieve cyber security goals.


Learn more:


http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates 

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates  | 21st Century Learning and Teaching | Scoop.it

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

Gust MEES's insight:

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

VeraCrypt | #Encryption #Privacy #ICT #EdTech

VeraCrypt | #Encryption #Privacy #ICT #EdTech | 21st Century Learning and Teaching | Scoop.it
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

Gust MEES's insight:
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

Gust MEES's insight:

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic | 21st Century Learning and Teaching | Scoop.it
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
“There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


Gust MEES's insight:
There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


No comment yet.
Scooped by Gust MEES
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


Gust MEES's insight:
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering


No comment yet.
Scooped by Gust MEES
Scoop.it!

DLD-Konferenz: Das Internet ist "kaputt und antisozial" | Social Media | Privacy | Cyberespionage

DLD-Konferenz: Das Internet ist "kaputt und antisozial" | Social Media | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
Die Kritiker kommen zu Wort: Auf der DLD-Konferenz blies Andrew Keen Internetmillionären wie Mark Zuckerberg den Marsch. Und Mikko Hypponen trug das freie Netz zu Grabe.
Gust MEES's insight:

Die Kritiker kommen zu Wort: Auf der DLD-Konferenz blies Andrew Keen Internetmillionären wie Mark Zuckerberg den Marsch. Und Mikko Hypponen trug das freie Netz zu Grabe.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime: What does it mean? | ICT | CyberSecurity

Cybercrime: What does it mean? | ICT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

|Explore different types of cybercrime with this collection of animated videos.

Gust MEES's insight:

Explore different types of cybercrime with this collection of animated videos.


Scooped by Gust MEES
Scoop.it!

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms".


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Tor (anonymity network) - Wikipedia, the free encyclopedia

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms".

No comment yet.
Scooped by Gust MEES
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | 21st Century Learning and Teaching | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Gust MEES's insight:

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.

Scooped by Gust MEES
Scoop.it!

Who Costs the Company More? Employees or Cybercriminals?

Who Costs the Company More? Employees or Cybercriminals? | 21st Century Learning and Teaching | Scoop.it
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.