21st Century Learning and Teaching
586.5K views | +260 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Learning 2 Learn', 'cybercrime'. Clear
Scooped by Gust MEES
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Gust MEES's insight:
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness

Diese 10 Tipps ruinieren Cyber-Kriminellen den Tag | #CyberSecurity #CyberHygiene #ICT #Awareness | 21st Century Learning and Teaching | Scoop.it
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's insight:
Wir haben zehn Tipps aufgestellt, die Cyber-Kriminellen das Leben schwer machen. Wer diese befolgt, trägt maßgeblich zur eigenen Sicherheit bei.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness 

What is email spoofing? | #CyberSecurity #DigitalCitiZENship #digcit #Awareness  | 21st Century Learning and Teaching | Scoop.it
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

Gust MEES's insight:
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Spoofing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity 

Ransomware evolution: from blockers to cryptors | #Awareness #CyberCrime #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges? Unfortunately, that’s unlikely: Ransomware infections are reaching pandemic rates, and this type of malware is not going to vanish any time soon. We are not trying to scare you — well, we are, but not for kicks. Have a look at the statistics gathered by Kaspersky Security Network and you’ll see — we are facing a really dangerous threat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum 

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum  | 21st Century Learning and Teaching | Scoop.it
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Gust MEES's insight:
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates 

The need for urgent collective action to keep people safe online | #Cyberattacks #CyberSecurity #Updates  | 21st Century Learning and Teaching | Scoop.it

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

Gust MEES's insight:

Early Friday morning the world experienced the year’s latest cyberattack. Starting first in the United Kingdom and Spain, the malicious “WannaCrypt” software quickly spread globally, blocking customers from their data unless they paid a ransom using Bitcoin. The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency, or NSA, in the United States. That theft was publicly reported earlier this year. 

 

Learn more / en savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cybersecurity

 

https://gustmees.wordpress.com/?s=5+minutes

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

VeraCrypt | #Encryption #Privacy #ICT #EdTech

VeraCrypt | #Encryption #Privacy #ICT #EdTech | 21st Century Learning and Teaching | Scoop.it
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

Gust MEES's insight:
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness

The first big Internet of Things security breach is just around the corner | #IoT #IoE #CyberSecurity #Awareness | 21st Century Learning and Teaching | Scoop.it

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

Gust MEES's insight:

There was a time when the only device you had connected to your network was a PC. Then laptops with a wireless connection came along -- then after that, smartphones and tablets.

But the connected revolution hasn't ended there. Gartner estimates that currently 5.5 million new 'things' -- devices from toasters and kettles to cars and hospital equipment -- are being connected to the internet every single day, and they will total 6.4 billion by the end of the year.

That figure is up from 3.8 billion in 2014, and 5 billion in 2015 and is expected to rise to over 20 billion Internet of Things (IoT) devices being connected to the web in 2020.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=wearables

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic

Ransomware awareness and fear growing: Study | #CyberCrime #CyberSecurity #Update #Infographic | 21st Century Learning and Teaching | Scoop.it
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
The threat of being hit with a ransoware attack has the vast majority of companies scared to death that they are next on some cybercriminals hit list, but despite this high level of angst, most have little faith in their back up systems to help restore their files and have even less confidence in their security systems to defend their data.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity

ENISA: Cyber Attacks Cost Over $400 Billion Annually | EU | Europe | eLEADERShip | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
“There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


Gust MEES's insight:
There are different aspects to cyber security and cyber-attacks. But all current security approaches tend to make use of the same technology, making it difficult to judge who is attacking what and why. Within this context, it should be examined what cyber security can offer at another level, contributing and protecting the EU citizens. Cyber security is the EU’s ‘digital frontier.”

Helmbrecht said that the security of network and information systems is essential to the security of all the critical sectors in society, noting that disruptions to these infrastructures and services are becoming more frequent and are estimated to result in annual losses in the range of €260- €340 billion Euros ($416-$544 billion dollars).

“Various recent studies, including those of ENISA, demonstrate that the threat landscape will get worse, unless we take firm action,” Helmbrecht said.


Learn more:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


No comment yet.