21st Century Learning and Teaching
586.7K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Government', 'eLearning'. Clear
Rescooped by Gust MEES from Effective Education
Scoop.it!

A Guide to Competency-Based Education Model

A Guide to Competency-Based Education Model | 21st Century Learning and Teaching | Scoop.it
Competency based education focuses on a model aimed at allowing students to make progress ONLY when they demonstrate a desired competency or skill.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Competency-based+Learning

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Competency

 


Via Collection of First, Mark E. Deschaine, PhD
Gust MEES's insight:
Competency based education focuses on a model aimed at allowing students to make progress ONLY when they demonstrate a desired competency or skill.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Competency-based+Learning

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Competency

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | 21st Century Learning and Teaching | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Scooped by Gust MEES
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | 21st Century Learning and Teaching | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.


For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


Gust MEES's insight:

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:06 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Scooped by Gust MEES
Scoop.it!

Your Mobile Device Is a Hack Waiting to Happen: Pros

Your Mobile Device Is a Hack Waiting to Happen: Pros | 21st Century Learning and Teaching | Scoop.it
Many users don't take steps to protect themselves and their data on their smartphones and tablets.

 

When it comes to keeping their mobile devices safe and secure, consumers are playing a game of cat-and-mouse with cybercriminals.

 

Although most users are aware that mobile devices can be hacked, just as desktops or laptops can, many still don't take steps to protect themselves and the data on their smartphones and tablets, according to a study released Wednesday at the CTIA conference in Las Vegas.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Fast 33 Millionen Android-Geräte sind mit Malware infiziert

Fast 33 Millionen Android-Geräte sind mit Malware infiziert | 21st Century Learning and Teaching | Scoop.it
Laut einer Studie von NQ Mobile hat sich die Anzahl der Malware 2012 gegenüber 2011 verdreifacht. Im vergangenen Jahr gab es über 65.000 Schadprogramme.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Keep Your Pesky Hands Off my Mobile Data! [Infographic]

Keep Your Pesky Hands Off my Mobile Data! [Infographic] | 21st Century Learning and Teaching | Scoop.it
Where's your mobile been hooking up lately? Follow our tips to keep your data secure.
Gust MEES's insight:

A MUST have...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | 21st Century Learning and Teaching | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.
Gust MEES's insight:

A MUST have Infographic to understand the risks!!!

SHOULD be pinned in any schools!

 

Gust MEES's curator insight, February 4, 2013 8:32 AM

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Facebook shows its support for joint EU-US online safety declaration

Facebook shows its support for joint EU-US online safety declaration | 21st Century Learning and Teaching | Scoop.it
Sheryl Sandberg confirms Facebook's commitment to keeping people safe online with support for the joint declaration today between the European Commission and US Department of Homeland Security.

 

=============================================

 

Gust MEES

 

Check out ALSO 

 

My curation about "World efforts for a more secure Internet":

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Worldwide+efforts+4+more+secure+Internet

 

=============================================

 

Read more:

http://www.zdnet.com/facebook-shows-its-support-for-joint-eu-us-online-safety-declaration-7000007664/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

7 Myths About BYOD Debunked

7 Myths About BYOD Debunked | 21st Century Learning and Teaching | Scoop.it
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.

 

Organizations that do not invest in security education for their employees put themselves at risk.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

Check out also "Security Education Services" from Trustwave:
- https://www.trustwave.com/security-education-services/

 

 

Read more:

http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx?m=2&amp;amp;utm_source=buffer&amp;amp;buffer_share=4eae5

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&amp;amp;et_rid=454853272&amp;amp;linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

BYOD reality: Missing mobile device usage policies

BYOD reality: Missing mobile device usage policies | 21st Century Learning and Teaching | Scoop.it

Coalfire recently conducted a survey on the BYOD to work trend. The findings reveal many companies are not discussing mobile device cybersecurity issues with their employees and lack policies to protect sensitive company data.

 

The survey was conducted last month among 400 individuals in a variety of industries across North America that do not work in IT departments.

 

“The BYOD trend is not slowing down, and while it has many benefits, it’s also introducing a number of new security risks that may be foreign to many companies,” said Rick Dakin, CEO and chief security strategist with Coalfire.

 

===> “The results of this survey demonstrate that companies must do much more to protect their critical infrastructure as employees work from their own mobile devices, such as tablets and smartphones, in the workplace. Companies need to have security and education policies in place that protect company data on personal devices.” <===

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=13424

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mooc | e-Learning-Projektmanagement [pdf]

Mooc | e-Learning-Projektmanagement [pdf]. GRATIS Kursus: 

Sie haben Fragen oder möchten sich bereits vorab für den MOOC registrieren? Dann wenden Sie sich an den deutschen ECO-Partner
Sünne Eichler
Beratung für Bildungsmanagement
Schloßgasse 4
35423 Lich/Hessen
Tel. 06404-66 55 44
eichler@eichler-beratung.de


Gust MEES's insight:

Mooc | e-Learning-Projektmanagement [pdf]. GRATIS Kursus: 

Sie haben Fragen oder möchten sich bereits vorab für den MOOC registrieren? Dann wenden Sie sich an den deutschen ECO-Partner
Sünne Eichler
Beratung für Bildungsmanagement
Schloßgasse 4
35423 Lich/Hessen
Tel. 06404-66 55 44
eichler@eichler-beratung.de

No comment yet.
Scooped by Gust MEES
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!

 

Gust MEES's curator insight, June 26, 2013 7:17 AM

 

Check it out and beware of the malware!!!


Scooped by Gust MEES
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | 21st Century Learning and Teaching | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security | 21st Century Learning and Teaching | Scoop.it

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security . What should get be taught and learned more in the 21st Century while using ICT?

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

  
Gust MEES's insight:

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

 

Zhao KQiang's curator insight, March 27, 2014 7:23 AM

give some opinions of that why teachers and education should learn network secutity

Dean J. Fusto's curator insight, July 31, 2015 10:12 AM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Jean-Pierre Blanger's curator insight, August 1, 2015 4:19 PM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Scooped by Gust MEES
Scoop.it!

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android

Mobile Threat Report Q4 2012: 96% of all Mobile Malware written at the end of 2012 targets Android | 21st Century Learning and Teaching | Scoop.it

F-Secure Labs Mobile Threat Report for Q4 2013 is out and it’s clear that the most popular smartphone operating system is also the leading target for online criminals.

94% of all mobile malware the F-Secure Response Labs analyzed in Q4  targets Google’s Android platform.

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is: The more current, the better.

Gust MEES's insight:

 

3. Keep your phone’s software updated.
Your smartphone is a mini PC with the same software issues that your PC has including software that continually needs to be updated. This may require some help from your carrier depending on your phone –  but the basic rule is:

 

===> The more current, the better. <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: Cybercrime Goes Mobile

With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...
Gust MEES's insight:

A MUST see and Mac users ===> OPEN YOUR EYES!!!

 

Read also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BBC-Public-WiFi-Security

 

https://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

 

Zhao KQiang's curator insight, March 27, 2014 6:48 AM

one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Android apps used by millions vulnerable to password, e-mail theft

Android apps used by millions vulnerable to password, e-mail theft | 21st Century Learning and Teaching | Scoop.it
Researchers uncover faulty encryption in apps available in Google's Play Market.

 

Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found.

 

Read more, a MUST:

http://arstechnica.com/security/2012/10/android-apps-expose-passwords-e-mail-and-more/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed:+arstechnica/index+(Ars+Technica+-+All+content)&amp;utm_content=Google+Reader

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

New program offers pathway into cyber security field

New program offers pathway into cyber security field | 21st Century Learning and Teaching | Scoop.it

(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future.

 

The pilot stage of the program will begin with eight (ISC)2 chapters around the world and be rolled out across the organization in early 2013. It is specifically designed to attract more young people to the information security field, whether they are still in secondary school, recently graduated from university or new to the workforce.

 

It is open to aspiring and active cyber security professionals age 35 and under who are looking for ways to bolster their careers and deepen their connections to the professional community.

 

Read more:

http://www.net-security.org/secworld.php?id=13550

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime goes mobile [Infographic in pdf]

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

 

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under &frac12; of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Do You Know What Data Your Mobile App Discloses?

Do You Know What Data Your Mobile App Discloses? | 21st Century Learning and Teaching | Scoop.it
Using the Trend Micro mobile app reputation, we found out that several popular Android apps are susceptible to data leakage.

 

Gust MEES: a MUST READ for people who are using "Bring Your Own Device" (Hashtag on Twitter is #BYOD)!

 

 

 

 

Read more:

http://blog.trendmicro.com/do-you-know-what-data-your-mobile-app-discloses/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes | 21st Century Learning and Teaching | Scoop.it

Article from FORBES 5/23/2012 @ 10:50AM |36,211 views

 

With 6 billion global mobile subscribers and over 35 billion apps downloaded to those devices, one begins to wonder how secure this situation is for businesses. In fact it’s not.

 

The situation can best be described as turning an organization’s network security into Swiss cheese, where holes are opening up from devices everywhere.

Welcome to the mobile business revolution. Along with any major insurgency, what previously seemed secure meets what suddenly makes it vulnerable.

=============================================

 

Gust MEES: Thanks to Kevin Corbett for this Tip and once again I should say; NOBODY IS PERFECT and a secure Internet can ONLY be there when ALL of us are helping to make it secure by protecting our "BYOD" devices!

 

Check out also my FREE courses about basic IT-Security here (easy to follow and to understand)  by 5 minutes tutorials:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Read more:

http://www.forbes.com/sites/markfidelman/2012/05/23/what-apple-and-google-are-not-telling-you-about-mobile-device-security-infographic/

 

 

No comment yet.