21st Century Learning and Teaching
586.6K views | +36 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cyberespionage', 'Learning IT-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Destroying your hard drive is the only way to stop this super-advanced malware

Destroying your hard drive is the only way to stop this super-advanced malware | 21st Century Learning and Teaching | Scoop.it

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Geheimdienst überwacht Filesharer: Neue Enthüllung im Spionage-Skandal

Geheimdienst überwacht Filesharer: Neue Enthüllung im Spionage-Skandal | 21st Century Learning and Teaching | Scoop.it
Der kanadische Geheimdienst hat Geheimdokumenten zufolge gezielt Nutzer von Filehostern überwacht
Gust MEES's insight:

Der kanadische Geheimdienst hat Geheimdokumenten zufolge gezielt Nutzer von Filehostern überwacht


No comment yet.
Scooped by Gust MEES
Scoop.it!

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills | 21st Century Learning and Teaching | Scoop.it

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Gust MEES's insight:

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA shares 850 billion metadata records via Google-like tool

NSA shares 850 billion metadata records via Google-like tool | 21st Century Learning and Teaching | Scoop.it
The National Security Agency has a "Google-like" search engine designed to share 850 billion records about emails, phone calls, internet chats, and more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Quran Coaching's curator insight, August 27, 2014 1:24 PM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Scooped by Gust MEES
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Scooped by Gust MEES
Scoop.it!

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées | 21st Century Learning and Teaching | Scoop.it
Mets-en de côté, ça peut servir.


La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Gust MEES's insight:

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.

.


Gust MEES's curator insight, April 30, 2014 1:11 PM

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Scooped by Gust MEES
Scoop.it!

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage

Snoopy: The DIY drone that tracks your devices just about anywhere | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
DIY stalker device uniquely IDs people by tracking radio signals they emit.


The research pair first envisioned Snoopy more than two years ago to underscore how much data could be gathered by a collection of devices that are within the capability and budget of a die-hard hobbyist.


With a price tag of under $200 for the Snoopy spying node and $1,650 for the optional flying drone, the resulting proof-of-concept is even more instructive in the post-Snowden world that has since emerged.


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


Gust MEES's insight:


If Snoopy is the product of a researcher duo working in their spare time, just think what the National Security Agency, GCHQ of the UK, or Israel's Mossad can do.


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Has Been Hijacking the Botnets of Other Hackers

NSA Has Been Hijacking the Botnets of Other Hackers | 21st Century Learning and Teaching | Scoop.it
The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.
Gust MEES's insight:


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Gust MEES's curator insight, March 12, 2014 9:36 PM


This is military actions behind and NOT anymore on TOLERANCE!!!


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...


Scooped by Gust MEES
Scoop.it!

How to avoid digital dangers while traveling

How to avoid digital dangers while traveling | 21st Century Learning and Teaching | Scoop.it
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices it’s never been easier to find one’s way around, record memories, and stay in touch with friends back home.

 

But while technology makes traveling easier, a recent F-Secure survey pinpointed digital areas that need special consideration while on the road.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WiFi

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Scooped by Gust MEES
Scoop.it!

Are cyber attacks more dangerous than physical attacks?

Are cyber attacks more dangerous than physical attacks? | 21st Century Learning and Teaching | Scoop.it

Eighty percent of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Gust MEES's insight:

 

===> Eighty (80%) percent <=== of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

Gust MEES's curator insight, June 26, 2013 7:02 AM

 

===> Eighty (80%) percent <=== of C-level executives and IT security professionals believe that cyber-attacks pose a greater risk to their nation than physical attacks, while 51 percent believe a cyber-attacker is currently in their corporate network, or has been in the past year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: Targeted attacks via employee inboxes

INFOGRAPHIC: Targeted attacks via employee inboxes | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Targeted attacks via employee inboxes. Threat actors target enterprises and organizations for espionage and sabotage.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Canada Joins World Powers in Spying on Smartphone and Download Data

Canada Joins World Powers in Spying on Smartphone and Download Data | 21st Century Learning and Teaching | Scoop.it
In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It's the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming---at least in the surveillance realm.
Gust MEES's insight:

In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It's the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming---at least in the surveillance realm.


No comment yet.
Scooped by Gust MEES
Scoop.it!

PressTV-Canada monitors all internet downloads all around the world

PressTV-Canada monitors all internet downloads all around the world | 21st Century Learning and Teaching | Scoop.it
Canada’s electronic spy agency reportedly tracks and analyzes up to 15 million file downloads from all around the world per day.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...


Gust MEES's insight:
Canada’s electronic spy agency reportedly tracks and analyzes up to 15 million file downloads from all around the world per day.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit"

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit" | 21st Century Learning and Teaching | Scoop.it
Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.
Gust MEES's insight:

Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.


No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS: Sicher vor Hackern – aber nicht vor Apple | Versteckte Dienste lesen private Daten aus | Privacy | Cyberespionage

iOS: Sicher vor Hackern – aber nicht vor Apple | Versteckte Dienste lesen private Daten aus | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
Über bislang nicht bekannte Hintertüren in iOS kann Apple sämtliche Daten einsehen und weitergeben, etwa an Strafverfolgungsbehörden. Sie umgehen dabei jede Sicherheitsmaßnahme auf dem Gerät


Learn more:



Gust MEES's insight:
Learn more:


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon | 21st Century Learning and Teaching | Scoop.it

Nations must be ready for a remote attack on critical infrastructure, including power and transport systems, says security expert. 




- Risk one: DDoS attack


Risk two: attacking critical data


Risk three: damaging infrastructure



In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.

Gust MEES's curator insight, May 1, 2014 9:42 AM

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.


Scooped by Gust MEES
Scoop.it!

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | 21st Century Learning and Teaching | Scoop.it
The Heartbleed bug is unusually worrisome because it could possibly be used by the NSA or other spy agencies to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — as well as the private keys that vulnerable web sites use to encrypt your traffic to them.


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.

Gust MEES's insight:


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!


Gust MEES's curator insight, April 10, 2014 11:03 AM


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!



Learn more:



Scooped by Gust MEES
Scoop.it!

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No.

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No. | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Yes, you do have something to hide

Yes, you do have something to hide | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

- - http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...

 

http://www.scoop.it/t/securite-pc-et-internet/?q=NSA

 

Scooped by Gust MEES
Scoop.it!

Three Steps You Can Take to Protect Yourself From Online Spying

Three Steps You Can Take to Protect Yourself From Online Spying | 21st Century Learning and Teaching | Scoop.it
The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe element's accusations about Big Brother's online behavior.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Guccifer hacks U.S. nuclear security agency chief

Guccifer hacks U.S. nuclear security agency chief | 21st Century Learning and Teaching | Scoop.it

The hacker that goes by the online moniker "Guccifer" continues his crusade agains U.S. current and former government officials, and his latest victim is Neile Miller, acting administrator of the U.S. National Nuclear Security Administration.

Gust MEES's insight:

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???

 

I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...

 
Gust MEES's curator insight, June 17, 2013 6:35 PM

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???


I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...


 

Scooped by Gust MEES
Scoop.it!

Increase in Cyberespionage – Including Threefold Increase in Small Business Attacks | SYMANTEC Report

Increase in Cyberespionage – Including Threefold Increase in Small Business Attacks | SYMANTEC Report | 21st Century Learning and Teaching | Scoop.it

LAS VEGAS, Symantec Vision 2013 – April 16, 2013 

 

Symantec Corp.’s (Nasdaq: SYMC) Internet Security Threat Report, Volume 18 (ISTR) today revealed a 42 percent surge during 2012 in targeted attacks compared to the prior year.

 

Designed to steal intellectual property, these targeted cyberespionage attacks are increasingly hitting the manufacturing sector as well as small businesses, which are the target of 31 percent of these attacks.

 

Small businesses are attractive targets themselves and a way in to ultimately reach larger companies via “watering hole” techniques.

 

===> In addition, consumers remain vulnerable to ransomware and mobile threats, particularly on the Android platform. <===

 

Gust MEES's insight:

 

===> In addition, consumers remain vulnerable to ransomware and mobile threats, particularly on the Android platform. <===


Check also:


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/