21st Century Learning and Teaching
586.6K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Nobody is perfect', 'Privacy'. Clear
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Threat Intelligence: Reduce the Gap | CyberSecurity | Privacy

Threat Intelligence: Reduce the Gap | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it
Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with Target, JPMogan Chase, Home Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.
Gust MEES's insight:

Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with TargetJPMogan ChaseHome Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.


Gust MEES's curator insight, February 12, 2015 3:58 AM

Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with TargetJPMogan ChaseHome Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.


Scooped by Gust MEES
Scoop.it!

Seven privacy settings you should change immediately in iOS 8 | Digital Citizen

Seven privacy settings you should change immediately in iOS 8 | Digital Citizen | 21st Century Learning and Teaching | Scoop.it
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud?

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud? | 21st Century Learning and Teaching | Scoop.it
Sometimes I wish the internet could just be a place to exchange wholesome information, such as cooking recipes and tips on Linux, but sadly, there is a dark side. There are deviant people lurking on the web doing all sorts of horrible things. Yesterday, a hacker leaked the private pictures and videos (nude and semi-nude) of many celebrities, and they have spread across the net. For these celebrities, who are real people, I am sure it has been a very trying time; their privacy has been destroyed and I offer my sympathies. For the many people (if they can be called that) viewing and spreading the pictures, the occasion has been dubbed


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud



Gust MEES's curator insight, September 1, 2014 7:53 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Ammanda Daniher's curator insight, September 11, 2014 10:33 PM

It is pretty clear that iCloud has become a threat to most Apple users due to the recent "Celebrity nudes" scandal. I strongly believe that you shouldn't be worried about people being able to get a hold of photographs and videos of personal moments, such as family dinners and Christmas parties. This incident really makes you wonder just how easy it is to hack in to Apple's software systems, and how much Apple's developers have seen of our personal lives. Scandals such as thing will keep things talking, but will Apple release a statement regarding everything that has happened? 

Scooped by Gust MEES
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Scooped by Gust MEES
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | 21st Century Learning and Teaching | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

IP-Überwachungskameras von 18 Herstellern sind unsicher

IP-Überwachungskameras von 18 Herstellern sind unsicher | 21st Century Learning and Teaching | Scoop.it

Der Sicherheitsfirma Rapid7 zufolge lassen sich Zugänge und Passwörter zu IP-Videokameras und digitalen Videorekordern mit Firmware von RaySharp leicht hacken. Die verwenden immerhin 18 Hersteller. Angreifer können über die Schwachstelle die volle Kontrolle übernehmen – und weitere Attacken fahren.

 

Betroffen von den Bugs sind die Geräte von 18 Herstellern, die sich der chinesischen Plattform bedienen. Rapid7 hat daraufhin das Netz durchsucht – und will mindestens 58.000 Geräte gefunden haben, die sich aushebeln lassen. Denn der größte aller Fehler in RaySharps Software ist, das sich über den Port 9000 die Web-Oberfläche zur Gerätesteuerung ganz ohne Passwort öffnen lässt.

 

Zudem sind die Geräte drauf ausgelegt, via UPnP eine Verbindung zum Router aufzubauen – das ist als Öffnung zur Außenwelt gedacht, damit Nutzer ihre Kameras über das Netz steuern können – lässt sich aber in den Werkseinstellungen auch von Unbefugten für ihre dunklen Zwecke nutzen.

 

Gust MEES's insight:

Betroffen von den Bugs sind die Geräte von 18 Herstellern, die sich der chinesischen Plattform bedienen. Rapid7 hat daraufhin das Netz durchsucht – und will mindestens 58.000 Geräte gefunden haben, die sich aushebeln lassen. Denn der größte aller Fehler in RaySharps Software ist, das sich über den Port 9000 die Web-Oberfläche zur Gerätesteuerung ganz ohne Passwort öffnen lässt.

 

Zudem sind die Geräte drauf ausgelegt, via UPnP eine Verbindung zum Router aufzubauen – das ist als Öffnung zur Außenwelt gedacht, damit Nutzer ihre Kameras über das Netz steuern können – lässt sich aber in den Werkseinstellungen auch von Unbefugten für ihre dunklen Zwecke nutzen.

Gust MEES's curator insight, January 30, 2013 9:14 AM

Betroffen von den Bugs sind die Geräte von 18 Herstellern, die sich der chinesischen Plattform bedienen. Rapid7 hat daraufhin das Netz durchsucht – und will mindestens 58.000 Geräte gefunden haben, die sich aushebeln lassen. Denn der größte aller Fehler in RaySharps Software ist, das sich über den Port 9000 die Web-Oberfläche zur Gerätesteuerung ganz ohne Passwort öffnen lässt.

Zudem sind die Geräte drauf ausgelegt, via UPnP eine Verbindung zum Router aufzubauen – das ist als Öffnung zur Außenwelt gedacht, damit Nutzer ihre Kameras über das Netz steuern können – lässt sich aber in den Werkseinstellungen auch von Unbefugten für ihre dunklen Zwecke nutzen.

Scooped by Gust MEES
Scoop.it!

7 Things You Didn't Know About Your Privacy

7 Things You Didn't Know About Your Privacy | 21st Century Learning and Teaching | Scoop.it
You likely don’t know what information you are sharing, or with what companies.

We all simply scroll through long, complex privacy policies and check the box next to “I agree to these terms” without understanding the full implications. While data gathering seems innocuous, you often don’t realize until later exactly what information was taken from your device. At a conference I attended earlier this year on privacy and the Internet, I heard the story of a man who learned of his wife’s affair only after 16 other app vendors already knew. These companies had access to phone data that tracked his wife’s location – a motel. Her wearable fitness device also recorded her heart rate rising significantly for a 28-minute period while her husband was out of town. It’s safe to say that the majority are unaware of how data we create is distributed, with which companies and for what purpose.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:
You likely don’t know what information you are sharing, or with what companies.

We all simply scroll through long, complex privacy policies and check the box next to “I agree to these terms” without understanding the full implications. While data gathering seems innocuous, you often don’t realize until later exactly what information was taken from your device. At a conference I attended earlier this year on privacy and the Internet, I heard the story of a man who learned of his wife’s affair only after 16 other app vendors already knew. These companies had access to phone data that tracked his wife’s location – a motel. Her wearable fitness device also recorded her heart rate rising significantly for a 28-minute period while her husband was out of town. It’s safe to say that the majority are unaware of how data we create is distributed, with which companies and for what purpose.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Angela Ribo's curator insight, October 29, 2014 1:19 PM

Glad to hear that there are going to be some solutions to this problem.

Rescooped by Gust MEES from D&IM (Document & Information Manager) - CDO (Chief Digital Officer) - Gouvernance numérique
Scoop.it!

Vedettes nues sur Internet : la faute d’iCloud d'Apple ?

Vedettes nues sur Internet : la faute d’iCloud d'Apple ? | 21st Century Learning and Teaching | Scoop.it
Des photos de stars nues publiées sur Internet et les réseaux sociaux s’emballent. Les victimes auraient en commun d’avoir hébergé ces photos sur iCloud. Le service d’Apple a-t-il été piraté ou seuls les comptes visés l’ont-ils été ?




Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud


Via Jean-Pierre Blanger
Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud

Scooped by Gust MEES
Scoop.it!

iOS: Sicher vor Hackern – aber nicht vor Apple | Versteckte Dienste lesen private Daten aus | Privacy | Cyberespionage

iOS: Sicher vor Hackern – aber nicht vor Apple | Versteckte Dienste lesen private Daten aus | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
Über bislang nicht bekannte Hintertüren in iOS kann Apple sämtliche Daten einsehen und weitergeben, etwa an Strafverfolgungsbehörden. Sie umgehen dabei jede Sicherheitsmaßnahme auf dem Gerät


Learn more:



Gust MEES's insight:
Learn more:


No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO]

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO] | 21st Century Learning and Teaching | Scoop.it
Another day, another privacy vulnerability found in iOS.

When will Apple learn that a lockscreen should really, properly, lock the phone?
Gust MEES's insight:

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 30, 2013 12:33 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 30, 2013 12:51 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

Facebook Security Bug Exposed Personal Account Information, Six Million Accounts Affected

Facebook Security Bug Exposed Personal Account Information, Six Million Accounts Affected | 21st Century Learning and Teaching | Scoop.it
A Facebook security bug exposed users’ personal contact information (email or phone number) to other users who were connected to them; the bug has affected six million accounts...

 

 

 

 

 

 

 

 

 

A Facebook spokesperson tells me the bug ===> has been live since last year, and was discovered last week. <===

 

Gust MEES's insight:

 

A Facebook spokesperson tells me the bug ===> has been live since last year, and was discovered last week. <===


Facebook says the security team fixed the bug less than 24 hours after it was brought to their attention.


Gust MEES's curator insight, June 21, 2013 5:43 PM

 

A Facebook spokesperson tells me the bug ===> has been live since last year, and was discovered last week. <===

 

Facebook says the security team fixed the bug less than 24 hours after it was brought to their attention.