21st Century Learning and Teaching
586.3K views | +1 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Education-Evolution', 'Phishing'. Clear
Scooped by Gust MEES
Scoop.it!

#DigitalCitiZENship #eSkills | Tip 4: Avoid Scams | #Phishing #CyberSecurity #Awareness 

Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious. 

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

 

Gust MEES's insight:

Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious. 

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

 

 

Fernando de la Cruz Naranjo Grisales's curator insight, March 25, 2016 3:01 PM

Know how to identify scams online. If someone offers you some new shoes, a free iPad or an all expense paid trip to Hawaii, you should be suspicious. 

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

 

 

Scooped by Gust MEES
Scoop.it!

Take the Phishing-Quiz | Symantec | CyberSecurity

Take the Phishing-Quiz | Symantec | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Can you tell the difference between a real site and a fake one? 
Do you know how to stay safe online?

See how fast you can recognize the safe site and click on its picture. Learn what to look for when you browse, bank, or shop.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Gust MEES's insight:

Can you tell the difference between a real site and a fake one? 
Do you know how to stay safe online?

See how fast you can recognize the safe site and click on its picture. Learn what to look for when you browse, bank, or shop.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills

Jeder Fünfte wird Opfer von Cyber-Spionage | CyberSecurity | Phishing | eSkills | 21st Century Learning and Teaching | Scoop.it

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Gust MEES's insight:

Gezielte, gut getarnte Phishing-Attacken sind große Gefahr für Unternehmen.


Der Security-Software-Hersteller ESET rät Unternehmen zu einer verstärkten Sensibilisierung für Phishing-Attacken und damit einhergehend zu einer besseren IT-Weiterbildung. Nur so können die eigenen Mitarbeiter vor gezielten und gut getarnten Angriffen geschützt werden. Denn Attacken dieser Art sind mittlerweile geschickt auf ihre Zielgruppen zugeschnitten und nur mit großer Sorgfalt und Verständnis erkennbar.


Anlass für den Ratschlag ist das Ergebnis eines Tests, den das Center of Excellence for Research, Innovation, Education and Industrial Labs Partnership (CEFRIEL) im Auftrag von 15 internationalen Unternehmen kürzlich durchführte. Die Einrichtung prüfte die Anfälligkeit von Mitarbeitern für speziell auf Unternehmen gemünzte Betrugsversuche, so genannte „Spear-Phishing“-Attacken. Das Ergebnis: Jeder Fünfte ging den Testern ins Netz.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Phishing Deceives the Masses [Infographic]

Phishing Deceives the Masses [Infographic] | 21st Century Learning and Teaching | Scoop.it
Phishing attacks exploit the often weakest link in cyber defense—human behavior. Bypassing our best judgment can be as simple as creating urgency with a fake bank notice, or complex as assuming the persona of a known business partner – just to steal our information. Numerous high-profile breaches such as the theft of credit card data …


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Scooped by Gust MEES
Scoop.it!

Cybercriminals' Phishing Methods

Cybercriminals' Phishing Methods | 21st Century Learning and Teaching | Scoop.it
In a recent YouTube video, software company Venafi reveals that PayPal phishing attacks are taking advantage of users' trust in wildcard certificates.


Learn more:



Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Chain letter - Wikipedia, the free encyclopedia

Chain letter

A typical chain letter consists of a message that attempts to convince the recipient to make a number of copies of the letter and then pass them on to as many recipients as possible.

Gust MEES's insight:

 

I the digital age this could be very dangerous because of privacy and Cyber-Security!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

WHAT is Phishing?

Phishing - Wikipedia, the free encyclopedia

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Recognize and Avoid Phishing Emails and Links

How to Recognize and Avoid Phishing Emails and Links | 21st Century Learning and Teaching | Scoop.it
We talk about phishing a lot on SecurityWatch. While we regularly warn readers to not fall for phishing scams, it got us thinking: how many people know how to recognize a phishing scam?
Gust MEES's insight:

 

Great tips, check it out!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

L'hameçonnage : combien de personnes en sont victimes? [Infographic]

L'hameçonnage : combien de personnes en sont victimes? [Infographic] | 21st Century Learning and Teaching | Scoop.it
Transcription de l' infographie : L'hameçonnage : combien de personnes en sont victimes?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

Scooped by Gust MEES
Scoop.it!

Humans still the weakest link as phishing gets smarter and more focused

Humans still the weakest link as phishing gets smarter and more focused | 21st Century Learning and Teaching | Scoop.it

The latest figures from the APWG show a decline in phishing reports. Verizon, on the other hand, implies that almost all incidents of cyber espionage reported in the last year included some phishing...

 

An academic study into human susceptibility to phishing has found that 92% of people misclassify phishing emails, despite efforts to educate people about the dangers.

 

Educating users to keep a wary eye out for phishing attempts has been a major focus for security admins and providers, but it seems like the bad guys are managing to keep ahead of the curve.

 

Gust MEES's insight:

 

Learn more:

 

https://www.hfes.org/web/DetailNews.aspx?ID=312

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

 

Scooped by Gust MEES
Scoop.it!

New Skype phishing scam

New Skype phishing scam | 21st Century Learning and Teaching | Scoop.it
Our researchers discoveres a scam being spread via Skype that is designed to steal the log in credentials for Skype users by dangling free premium upgrades
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Skype

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Hackers To Manage Your Apple ID, If Caught From Phishing Bait

Hackers To Manage Your Apple ID, If Caught From Phishing Bait | 21st Century Learning and Teaching | Scoop.it
Phishers appear to have concentrated their fire on a relatively new target: Apple IDs.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Phishing

 

Scooped by Gust MEES
Scoop.it!

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks | 21st Century Learning and Teaching | Scoop.it
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG).
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?q=Phishing

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=Privacy

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Scooped by Gust MEES
Scoop.it!

Phishing Frenzy: The Good, The Bad, and How You Can Protect Yourself | Digital CitiZENship | eSkills | ICT

Phishing Frenzy: The Good, The Bad, and How You Can Protect Yourself | Digital CitiZENship | eSkills | ICT | 21st Century Learning and Teaching | Scoop.it
HOW TO PROTECT YOURSELF AGAINST PHISHING SCAMS

Given the wide variety of phishing attacks, it is important that we all know what to do when we come across what we suspect might be a phish. Hence, here are a few suggestions for how you can protect yourself against these phishing attacks.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Gust MEES's insight:
HOW TO PROTECT YOURSELF AGAINST PHISHING SCAMS

Given the wide variety of phishing attacks, it is important that we all know what to do when we come across what we suspect might be a phish. Hence, here are a few suggestions for how you can protect yourself against these phishing attacks.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing


Keven Hempel's curator insight, May 19, 2015 11:06 AM

interesting

Chua Wen Luo's curator insight, June 24, 2015 11:15 PM

Why is this resource useful for your presentation?

 - This website provides information about the phishing, how phishing is like and how can we prevent it.

How can you include it without plagiarizing or violating copyright law?

- By understand the information given.

Scooped by Gust MEES
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | 21st Century Learning and Teaching | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Gust MEES's insight:

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Scooped by Gust MEES
Scoop.it!

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing | 21st Century Learning and Teaching | Scoop.it
Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.
Gust MEES's insight:

Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.


Scooped by Gust MEES
Scoop.it!

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Gust MEES's insight:

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked EA Server Used to Host Apple Phishing Page

Hacked EA Server Used to Host Apple Phishing Page | 21st Century Learning and Teaching | Scoop.it
Apple phishing scams are not uncommon, but phishing pages hosted on the website of a major company are certainly worth looking at. Experts have found ...


“The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network.”

The problem with phishing pages hosted on the web servers of reputable companies is that it’s less likely that they’ll be flagged. Furthermore, some users might be tricked into thinking that the pages are legit considering that they’re on a trusted domain.

In this case, the attackers could have made up a story about a collaboration between EA and Apple and that would have truly made the phish efficient.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

WHAT is Spear-Phishing?

Phishing - Wikipedia, the free encyclopedia

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public.

Gust MEES's insight:

 

Learn more:

 

http://en.wikipedia.org/wiki/Spear_phishing#Phishing_techniques

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | 21st Century Learning and Teaching | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.
Gust MEES's insight:

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Phishing email fools Missouri university staff, compromises thousands

Phishing email fools Missouri university staff, compromises thousands | 21st Century Learning and Teaching | Scoop.it
Employees of Missouribased Saint Louis University fell victim to a phishing email that resulted in them providing account information, subsequently putting thousands at risk.

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Gust MEES's insight:

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

Gust MEES's curator insight, October 26, 2013 10:41 AM

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

Academic Writing Aid's curator insight, November 1, 2013 1:02 PM

Order custom written articles, essays, term papers, research papers, thesis papers, dissertations, book reviews, book reports, speeches and others.
.................NO PLAGIARISM.................... http://www.superiorpapers247.org/

Scooped by Gust MEES
Scoop.it!

Human Factors and Ergonomics Society : Profile of Likely E-mail Phishing Victims Emerges in Human Factors

Human Factors and Ergonomics Society : Profile of Likely E-mail Phishing Victims Emerges in Human Factors | 21st Century Learning and Teaching | Scoop.it

Human Factors and Ergonomics Society mission is to promote the discovery and exchange of knowledge concerning the characteristics of human beings that are applicable to the design of systems and devices of all kinds.

 

The author of a paper to be presented at the upcoming 2013 International Human Factors and Ergonomics Society Annual Meeting has described behavioral, cognitive, and perceptual attributes of e-mail users who are vulnerable to phishing attacks. Phishing is the use of fraudulent e-mail correspondence to obtain passwords and credit card information, or to send viruses.


 

 

Gust MEES's insight:

 

Learn more:

 

https://www.hfes.org/web/DetailNews.aspx?ID=312

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

Scooped by Gust MEES
Scoop.it!

PHISHING: See how easily freaks can take over your life

http://www.safeinternetbanking.be/ Would you panic while internet crooks took over your life? We put one real victim through the test. We scared the hell out...
Gust MEES's insight:

 

PHISHING: See how easily freaks can take over your life!!!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Jason Toy's curator insight, July 11, 2013 5:44 AM

People are still more scared of being mugged on the way home or fear that a burglar will break into their home while they are sleeping. This..THIS..right here is where the terror should be felt. The odds of this happening are much greater and people need to take the blinders off.

Christ Is My Savior Ministries's curator insight, July 19, 2013 9:58 PM

Please be careful while on-line.

Christ Is My Savior Ministries's comment, July 19, 2013 9:58 PM
Please be careful while on-line.
Scooped by Gust MEES
Scoop.it!

Phisher pupils hack class computers

Phisher pupils hack class computers | 21st Century Learning and Teaching | Scoop.it
A group of children in Alaska took over their classroom computers after phishing account details from teachers.

 

They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.


Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.scoop.it/t/securite-pc-et-internet?q=Phishing

 

Scooped by Gust MEES
Scoop.it!

Twitter warns of more hacks, threats to come; issues media memo

Twitter warns of more hacks, threats to come; issues media memo | 21st Century Learning and Teaching | Scoop.it
The microblogging giant has warned news outlets that "these attacks will continue," particularly against high profile media organizations.
Gust MEES's insight:

 

Learn more:

 

- - http://www.scoop.it/t/securite-pc-et-internet?tag=Phishing

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=Privacy

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/