21st Century Learning and Teaching
586.6K views | +35 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'ICT', 'Naivety in the Digital Age'. Clear
Scooped by Gust MEES
Scoop.it!

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY

Google vergisst interne Zugangsdaten auf ausrangiertem Router | NAIVETY | 21st Century Learning and Teaching | Scoop.it
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Gust MEES's insight:
Ein deutscher Online-Shop hat einen generalüberholten Router verkauft, der zuvor offenbar für Google Dienst schob. Das Gerät hat den Internetriesen mit allerhand sensiblen Informationen verlassen, welche die neuen Besitzer problemlos auslesen konnten.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


No comment yet.
Scooped by Gust MEES
Scoop.it!

IDIOTS

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!

Gust MEES's insight:

It’s not a secret we love robots here at BLR, so we wanted them to be the heroes in our latest promo clip. Luxury cars with powerful engines to drive through roads under severe speed restrictions, cable TV that allows us to pay to watch all kind of sports, all from our comfortable sofa, and of course, hyper expensive cell phones that do almost everything but making a decent phone call.

.

Yes, our happiness is based on things we don’t need and governed by entities we don’t control, so what? Sit down and turn on the tv!


No comment yet.
Scooped by Gust MEES
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | 21st Century Learning and Teaching | Scoop.it

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.