21st Century Learning and Teaching
586.4K views | +134 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD'. Clear
Scooped by Gust MEES
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | 21st Century Learning and Teaching | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | 21st Century Learning and Teaching | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | 21st Century Learning and Teaching | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Scooped by Gust MEES
Scoop.it!

Convenience or security: You can't have both when it comes to Wi-Fi

Convenience or security: You can't have both when it comes to Wi-Fi | 21st Century Learning and Teaching | Scoop.it
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them e
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, June 27, 2013 9:41 AM

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Zhao KQiang's curator insight, March 28, 2014 6:24 AM

consider about free wifi is security or not,  when you start to connect it ,just takes few seconds to check the security setting 

Scooped by Gust MEES
Scoop.it!

Building a successful BYOD program-Education [pdf]

Building a successful BYOD program-Education [pdf] | 21st Century Learning and Teaching | Scoop.it
Shared with Dropbox
Gust MEES's insight:

 

A MUST read!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | 21st Century Learning and Teaching | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.


For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


Gust MEES's insight:

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:06 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Scooped by Gust MEES
Scoop.it!

Going BYOD [Infographic]

Going BYOD [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Credits to:

 

http://www.educatorstechnology.com/2013/06/dont-miss-these-two-fabulous-graphics.html

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Inge Quets's curator insight, June 16, 2013 5:33 AM

This creates the inmediate possibility to go forward in schools (in developed countries).

Scooped by Gust MEES
Scoop.it!

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own | 21st Century Learning and Teaching | Scoop.it
11 sample BYOT policies to help a school or district create their own.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Blue Jay Bridge's curator insight, June 6, 2013 8:59 PM

I've seen folks asking for this info on twitter. Hope this helps.

Scooped by Gust MEES
Scoop.it!

The Past, Present, And Potentially Amazing Future Of Smartphones [Infographic]

The Past, Present, And Potentially Amazing Future Of Smartphones [Infographic] | 21st Century Learning and Teaching | Scoop.it
I thought it would be helpful to actually, you know, learn a bit about where smartphones started, what they're doing right now, and where they're heading.
Gust MEES's insight:

 

We will probably see in a couple of years big technology changes...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Malware - Security Spotlight Series: Episode Three

Tune in to watch Security Spotlight's third episode, on Mobile Malware. In 2012, we saw a 58% increase in mobile malware, and it continues to grow. Cybercrim...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

Scooped by Gust MEES
Scoop.it!

   Clueful   -   Privacy Monitoring App for iPhone & Android

   Clueful   -   Privacy Monitoring App for iPhone & Android | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Mobile crimeware and the global criminal marketplace-BYOD

Mobile crimeware and the global criminal marketplace-BYOD | 21st Century Learning and Teaching | Scoop.it
The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisti...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

Scooped by Gust MEES
Scoop.it!

Bring Your Own Device Toolkit

Bring Your Own Device Toolkit | 21st Century Learning and Teaching | Scoop.it

Today’s education system is evolving to take full advantage of the potential of mobile technology devices to inspire learning and create independent, critical thinkers.


However, with tight budgets, many schools are hoping to bring technology into the classroom without the costly burden of purchasing a device for each student. One potential solution that is being explored is BYOD, or Bring Your Own Device. This allows students to bring their personal laptops, tablets, and smartphones from home and use them for educational applications in the classroom.


At a time when budgets are shrinking, school districts are considering BYOD programs to integrate cost-effective technology into their educational programs. It’s a promising idea, especially for schools that lack sufficient technology budgets. BYOD takes advantage of the technology that students already own and are familiar with.


However, BYOD programs have been met with some criticism from staff and administrators who believe the challenges outweigh the perceived benefits. Continue reading...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Most BYOD businesses exposing data to cyber criminals

Most BYOD businesses exposing data to cyber criminals | 21st Century Learning and Teaching | Scoop.it
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber criminals by failing to implement effective BYOD strategies.
Gust MEES's insight:

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


Gust MEES's curator insight, July 18, 2013 4:34 AM

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | 21st Century Learning and Teaching | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's insight:

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Scooped by Gust MEES
Scoop.it!

Facebook's Android app leaks your mobile number, Symantec discovers

Facebook's Android app leaks your mobile number, Symantec discovers | 21st Century Learning and Teaching | Scoop.it
A discovery about Facebook's official Android app once again puts into question if the social network's developers truly *get* security and privacy.

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge:


Gust MEES's insight:

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge...


Gust MEES's curator insight, June 29, 2013 7:45 AM

 

As Symantec describe on its blog, when its developers tested its new Norton Mobile Security product against some of the world’s most popular Android apps, they were disturbed to see a warning message claiming that the Facebook Android app leaks personal information without the device owner’s knowledge...


AnnC's curator insight, June 30, 2013 9:35 PM

Beware Andriod users!  Will a vpn protect your info?

Scooped by Gust MEES
Scoop.it!

FakeAV on an Android Device

As with computer malware, the FakeAV app on Android devices coaxes users into purchasing full version software in order to remove infections. Pop-ups will ap...
Gust MEES's insight:

 

Check it out and beware of the malware!!!

 

Gust MEES's curator insight, June 26, 2013 7:17 AM

 

Check it out and beware of the malware!!!


Scooped by Gust MEES
Scoop.it!

Fake Antivirus Holds Android Phones for Ransom

Fake Antivirus Holds Android Phones for Ransom | 21st Century Learning and Teaching | Scoop.it
Fake antivirus, also called scareware, is a well-known Windows problem. Symantec researchers have found fake antivirus aimed at Android devices, and it's even nastier.
Gust MEES's insight:

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Gust MEES's curator insight, June 25, 2013 9:43 AM

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Scooped by Gust MEES
Scoop.it!

BYOD: The Good, The Bad and the Ugly [Infographic]

BYOD: The Good, The Bad and the Ugly [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Credits to:

 

http://www.educatorstechnology.com/2013/06/dont-miss-these-two-fabulous-graphics.html

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Mobile Threat in Action
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | 21st Century Learning and Teaching | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Your Mobile Device Is a Hack Waiting to Happen: Pros

Your Mobile Device Is a Hack Waiting to Happen: Pros | 21st Century Learning and Teaching | Scoop.it
Many users don't take steps to protect themselves and their data on their smartphones and tablets.

 

When it comes to keeping their mobile devices safe and secure, consumers are playing a game of cat-and-mouse with cybercriminals.

 

Although most users are aware that mobile devices can be hacked, just as desktops or laptops can, many still don't take steps to protect themselves and the data on their smartphones and tablets, according to a study released Wednesday at the CTIA conference in Las Vegas.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat Report: Q1-2013 [pdf]

Gust MEES's insight:

 

A MUST read!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job