21st Century Learning and Teaching
586.2K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD', 'IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security / Smartphones sind AUCH Mini-Computer!

Mobile Security / Smartphones sind AUCH Mini-Computer! | 21st Century Learning and Teaching | Scoop.it

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm

Gust MEES's insight:

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm


No comment yet.
Scooped by Gust MEES
Scoop.it!

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:28 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy? | 21st Century Learning and Teaching | Scoop.it
. . WHAT Are Apps? [START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile dev...
Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's curator insight, March 12, 2014 6:25 PM


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

Jacqueline Taylor-Adams's curator insight, March 27, 2014 11:55 AM

We rescooped this article from our (the Urban Tech Fair's) Czar of Education, Bonnie Bracey Sutton who shared this thought provoking article. What say, ye?


______________________

Be part of the Access, Education, and Commerce movement, the Urban Tech Fair www.UrbanTechFair.org

Scooped by Gust MEES
Scoop.it!

When BYOD Equals Bring Your Own Malware

When BYOD Equals Bring Your Own Malware | 21st Century Learning and Teaching | Scoop.it
Lookout's analysis of the mobile threat landscape suggests businesses should focus on curbing risky online behavior.


Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Byod : un risque et une opportunité en même temps

Byod : un risque et une opportunité en même temps | 21st Century Learning and Teaching | Scoop.it
De plus en plus d’employés emmènent leurs appareils au travail et se connectent sur le réseau de l’entreprise.
Gust MEES's insight:

 

Learn more:

 

https://www.cases.lu/fr/byod-un-risque-et-une-opportunite-en-meme-temps.html

 

No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke | 21st Century Learning and Teaching | Scoop.it
Security-SuperGAU für alle Nutzer von iPhones und iPads: Experten haben eine Lücke in iOS-Apps entdeckt, die es erlaubt, die komplette Kommunikation über fremde Server umzuleiten. Tausende Apps sollen betroffen sein.

 

Über HTTP Request Hijacking sollen sich Hacker in iOS-Apps einschleichen und so den Datentraffic über eigene Server umleiten können. Nach erfolgreichem Angriff soll die Umleitung dann permanent aktiv sein.

 

===> Einzige Abhilfe schafft ein Update oder eine Neuinstallation der App. <===

 

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | 21st Century Learning and Teaching | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Gust MEES's insight:

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:47 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | 21st Century Learning and Teaching | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Scooped by Gust MEES
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | 21st Century Learning and Teaching | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Gust MEES's insight:

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Le nombre de piratages de smartphones explose

Le nombre de piratages de smartphones explose | 21st Century Learning and Teaching | Scoop.it
Les utilisateurs de smartphones ne sont pas à l'abri des pirates informatiques.

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

  
Gust MEES's insight:

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

 

Gust MEES's curator insight, August 2, 2013 7:28 AM

 

De mars 2012 à mars 2013, le nombre de programmes malveillants introduits subrepticement dans les smartphones a bondi de 614%, a calculé le cabinet Juniper, basé en Californie.

 

Celui-ci montre, dans une étude, que le système d'exploitation de Google, Android, est particulièrement touché par ces attaques informatiques: il est concerné par 92% des attaques.

 

Scooped by Gust MEES
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | 21st Century Learning and Teaching | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===


Gust MEES's insight:

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Scooped by Gust MEES
Scoop.it!

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity | 21st Century Learning and Teaching | Scoop.it
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Gust MEES's insight:
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


No comment yet.
Scooped by Gust MEES
Scoop.it!

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.




1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Gust MEES's insight:
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.


1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Elizabeth Milovidov's curator insight, December 1, 2014 9:24 AM

Is your phone secure?  Read these 10 tips for guidance.

Scooped by Gust MEES
Scoop.it!

How to Hack a Mobile App: It's Easier than You Think!

How to Hack a Mobile App: It's Easier than You Think! | 21st Century Learning and Teaching | Scoop.it
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked EA Server Used to Host Apple Phishing Page

Hacked EA Server Used to Host Apple Phishing Page | 21st Century Learning and Teaching | Scoop.it
Apple phishing scams are not uncommon, but phishing pages hosted on the website of a major company are certainly worth looking at. Experts have found ...


“The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network.”

The problem with phishing pages hosted on the web servers of reputable companies is that it’s less likely that they’ll be flagged. Furthermore, some users might be tricked into thinking that the pages are legit considering that they’re on a trusted domain.

In this case, the attackers could have made up a story about a collaboration between EA and Apple and that would have truly made the phish efficient.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Studie: BYOD-Trend hält an - Sicherheitskultur weiter mangelhaft

Studie: BYOD-Trend hält an - Sicherheitskultur weiter mangelhaft | 21st Century Learning and Teaching | Scoop.it
datensicherheit,de - Studie von Absolute Software: BYOD-Trend hält an, aber Sicherheitskultur bleibt mangelhaft.
Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks | 21st Century Learning and Teaching | Scoop.it
Distributed denial-of-service (DDOS) attack protection solutions provider Prolexic has published its Global DDOS Attack Report for the fourth quarter ...

 

“The prevalence of mobile devices and the widespread availability of downloadable apps that can be used for DDoS is a game changer,” explained Stuart Scholly, president of Prolexic. 

 

Malicious actors now carry a powerful attack tool in the palm of their hands, which requires minimal skill to use. Because it is so easy for mobile device users to opt-in to DDoS attack campaigns, we expect to see a considerable increase in the use of these attack tools in 2014,” Scholly added.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Another Android “master key” bug revealed

BYOD: Another Android “master key” bug revealed | 21st Century Learning and Teaching | Scoop.it
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a....
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

More than 80% of Smartphones Remain Open to Malware

More than 80% of Smartphones Remain Open to Malware | 21st Century Learning and Teaching | Scoop.it
There has been a veritable parade of headlines and news stories in even the mainstream consumer press about the increasing security risk presented by smartphones – a.k.a. the small yet powerful computers that most of us carry around in our pockets.

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===


Gust MEES's insight:

 

===> Trend Micro recently released data showing that there will be more than one million malware variants in the market by the end of this year.  <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple's iOS 7 Update Fixes 80 Security Bugs

Apple's iOS 7 Update Fixes 80 Security Bugs | 21st Century Learning and Teaching | Scoop.it
Yesterday's iOS 7 update brought a slew of bug fixes, 80 in total, to Apple devices.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | 21st Century Learning and Teaching | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet

 

http://gustmees.wordpress.com/

 

 

Scooped by Gust MEES
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses

News and Threat Research: Mobile Malware Gets in the Top 10 Viruses | 21st Century Learning and Teaching | Scoop.it

Up to now, mobile malware were certainly growing, but still minor compared to PC malware. Well, this is about to change. We have recently acknowledged a mobile malware getting in our top 10 virus activity, where usually there were only PC malware. The (sad) winner is Android/Plankton.B!tr, with a record prevalence of 4.42% (note: prevalence is the number of new hits in a given time frame divided by the number of fortigates reporting during that same interval of time).


This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…


===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===



Gust MEES's insight:

 

This would currently rank it as the 6th most active virus - PC malware included. Actually, Plankton (also known as Counterclank and NewyearL) is a very intrusive form of advertisement which changes your browser’s home page, adds bookmarks, shortcuts or records your search queries. Some other AV vendors classify it as an adware, anyway, what’s for sure is that end-users won’t want it on their phones… and the fact is that it is more and more wide spread…

 

===> This definitely is a new milestone in mobile malware’s history. I take the opportunity to draw your attention on the mobile world. <===

 
No comment yet.