21st Century Learning and Teaching
586.6K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'IT-Admin'. Clear
Scooped by Gust MEES
Scoop.it!

LinkedIn DNS hijacked, site offline • The Register

LinkedIn DNS hijacked, site offline • The Register | 21st Century Learning and Teaching | Scoop.it

LinkedIn is working on its right-on-the-ball-with-security reputation, this time letting slip its domain details.

 

According to this App.net post:

 

“LinkedIn just got DNS hijacked, and for the last hour or so, all of your traffic has been sent to a network hosted by this company [confluence-networks.com]. And they don't require SSL, so if you tried to visit, your browser sent your long-lived session cookies in plaintext.” (User @berg)

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=LinkedIn

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Be wary of WordPress plugin vulnerabilities

Be wary of WordPress plugin vulnerabilities | 21st Century Learning and Teaching | Scoop.it
WordPress plugins are highly vulnerable, according to a recent report.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=Cybersecurity

 

Scooped by Gust MEES
Scoop.it!

#University of Michigan's Union Ticket Office hacked ===> 33k data!!!

#University of Michigan's Union Ticket Office hacked ===> 33k data!!! | 21st Century Learning and Teaching | Scoop.it
Hackers accessed the credit card information of tens of thousands customers of the University of Michigans Union Ticket Office, the latest organization that has fallen victim to a breach affecting a thirdparty vendor.

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? 

 

The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According toa statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

Gust MEES's insight:

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According to a statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

 

 

Gust MEES's curator insight, June 17, 2013 4:50 PM

 

Hackers accessed the credit card information of tens of thousands customers of the University of Michigan's Union Ticket Office, the latest organization that has fallen victim to a breach affecting a third-party vendor.

How many victims? More than 33,000.

What type of personal information? Names, street addresses, email addresses, phone numbers, credit card numbers and expiration dates. 

What happened? The database supplied by third-party ticketing solution provider Vendini was compromised by hackers who may have stolen the personal information of any U of M customer in the last two years.

 

What was the response? University officials have contacted all individuals affected by the breach.

Details: How the hackers were able to compromise the Vendini systems is currently unknown. According to a statement released by the company, the stolen information does not include credit card security access codes, account user names or passwords.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

 

Scooped by Gust MEES
Scoop.it!

Moving Beyond Antivirus with Network Threat Protection

Today's evolved malware requires more than antivirus on the endpoint. Proactive protection involves a layered defense that includes Network Threat Protection...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/12/best-addresses-to-stay-informed-about-it-security-and-cyber-security/

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac | 21st Century Learning and Teaching | Scoop.it
Patch Tuesday is coming on 11 June 2013.

Paul Ducklin gives you a quick preview of what we know so far, and who'll be affected by the updates...

(Mac users, that might include you.)
Gust MEES's insight:

 

Learning the basics of Cyber-Security: START with the Updates!!!

 

Gust MEES's curator insight, June 12, 2013 3:48 PM

 

Learning the basics of Cyber-Security: START with the Updates!!!


Scooped by Gust MEES
Scoop.it!

Targeted Attacks - Security Spotlight Series: Episode Five

Tune in to watch Security Spotlight's fifth episode, on Targeted Attacks. In these attacks cybercriminals target a specific person or company to obtain speci...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | 21st Century Learning and Teaching | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: Targeted attacks via employee inboxes

INFOGRAPHIC: Targeted attacks via employee inboxes | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Targeted attacks via employee inboxes. Threat actors target enterprises and organizations for espionage and sabotage.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’ | 21st Century Learning and Teaching | Scoop.it
Forget obscure apps, unexpected emails and suspicious links. A group of researchers from the Georgia Institute of Technology claim to have developed a new smartphone charger that can ...
Gust MEES's insight:

 

Nobody is perfect ;)

Gust MEES's curator insight, June 3, 2013 11:56 AM

 

Nobody is perfect ;)

 

AnnC's curator insight, June 4, 2013 9:15 PM

beware unknown chargers !

Scooped by Gust MEES
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

HackMIT

HackMIT | 21st Century Learning and Teaching | Scoop.it
This fall, hackers from all over the world will gather at MIT for a hackathon like you've never seen before. 36 hours, hundreds of hackers, thousands of dollars in prizes. You won't want to miss it.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet

 

Scooped by Gust MEES
Scoop.it!

Drupal hit by massive data breach

Drupal hit by massive data breach | 21st Century Learning and Teaching | Scoop.it
Drupal, the open source content management system, is resetting the passwords for nearly one million accounts in the wake of a data breach.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Scooped by Gust MEES
Scoop.it!

Malware-splosion: 2013 Will be Malware's Biggest Year Ever

Malware-splosion: 2013 Will be Malware's Biggest Year Ever | 21st Century Learning and Teaching | Scoop.it
According to the German security company AV-Test, malware has exploded in the past five years to unprecedented levels. More troublingly, they anticipate seeing over 60 million new pieces of malicious software by the end of the year.
Gust MEES's insight:

 

It would be about time for learning and teaching the basics of Cyber-Security and how to get protected!!!

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The-Security-State-of-WordPress-Top-50-Plugins [pdf]


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=Cybersecurity

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Guccifer hacks U.S. nuclear security agency chief

Guccifer hacks U.S. nuclear security agency chief | 21st Century Learning and Teaching | Scoop.it

The hacker that goes by the online moniker "Guccifer" continues his crusade agains U.S. current and former government officials, and his latest victim is Neile Miller, acting administrator of the U.S. National Nuclear Security Administration.

Gust MEES's insight:

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???

 

I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...

 
Gust MEES's curator insight, June 17, 2013 6:35 PM

 

#Education & #Teachers & #Politicians are THE people WHO SHOULD make MOVE forward the #Society, right!? WHAT's THEIR #knowledge!? #21stC???


I won't wonder about more of such strange things happening... sorry, I am NOT a wizard, BUT...


 

Scooped by Gust MEES
Scoop.it!

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again) | 21st Century Learning and Teaching | Scoop.it
You know those people who put tape over their laptop's webcam to keep digital peeping toms at bay? They're not crazy.
Gust MEES's insight:

 

Fortunately, getting a solid layer of protection against such exploits moving forward is pretty straightforward. For one, you can tape up that webcam — it’s a bit tinfoil hat, sure, but it’s better than having a photo of your bad bits blasted out to the Internet on some shady-ass Tumblr. Second, consider using Firefox* with something like NoScript, disabling it only for trusted sites.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Webcam

 

 

Gust MEES's curator insight, June 15, 2013 8:03 AM

 

Fortunately, getting a solid layer of protection against such exploits moving forward is pretty straightforward. For one, you can tape up that webcam — it’s a bit tinfoil hat, sure, but it’s better than having a photo of your bad bits blasted out to the Internet on some shady-ass Tumblr. Second, consider using Firefox* with something like NoScript, disabling it only for trusted sites.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Webcam

 

AnnC's curator insight, June 16, 2013 4:18 PM

FYI - you can be seen - how do you look?

Scooped by Gust MEES
Scoop.it!

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Best Addresses To Stay Informed About IT-Security and Cyber-Security | 21st Century Learning and Teaching | Scoop.it
. Introduction In previous articles WE discussed already about the responsibility that ===> everyone is responsible for a safer and more secure Internet <===, that the weakest link in the sec...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/

 

http://gustmeesen.wordpress.com/

 

http://gustmeesfr.wordpress.com/

 

Scooped by Gust MEES
Scoop.it!

Patch Tuesday June 2013 - Office, Windows and Flash

Patch Tuesday June 2013 - Office, Windows and Flash | 21st Century Learning and Teaching | Scoop.it
Right on time, Microsoft and Adobe released fixes today for Windows, Internet Explorer, Microsoft Office 2003 and 2011 and Adobe Flash Player. Time to dance that familiar dance and get those update...
Gust MEES's insight:

 

Learning the basics of Cyber-Security for anyone and for any OS! Patching and updating is a MUST!!!

 

Gust MEES's curator insight, June 12, 2013 8:14 AM

 

Learning the basics of Cyber-Security for anyone and for any OS! Patching and updating is a MUST!!!

 

Scooped by Gust MEES
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Mobile Threat in Action
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own | 21st Century Learning and Teaching | Scoop.it
11 sample BYOT policies to help a school or district create their own.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Blue Jay Bridge's curator insight, June 6, 2013 8:59 PM

I've seen folks asking for this info on twitter. Hope this helps.

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: The Cybercriminal Underground

INFOGRAPHIC: The Cybercriminal Underground | 21st Century Learning and Teaching | Scoop.it
The Cybercriminal Underground
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: Password Security

INFOGRAPHIC: Password Security | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Password Security
Gust MEES's insight:

 

Learn more:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Passwords

 

Scooped by Gust MEES
Scoop.it!

INFOGRAPHIC: How much is your data worth?

INFOGRAPHIC: How much is your data worth? | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: How much is your data worth?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=DATA-BREACHES

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

 

No comment yet.
Rescooped by Gust MEES from Time to Learn
Scoop.it!

How to Encrypt Sensitive Data on Flash Drive

How to Encrypt Sensitive Data on Flash Drive | 21st Century Learning and Teaching | Scoop.it

Do you ever worry what would happen if your files fell into the wrong hands, especially those files that you kept on your external flash drive? Thankfully there are many options to encrypt sensitive data. Protectorion ToGo is one such application. While the free version is meant for private use only, it does allow you to encrypt up to two external devices. An added bonus is that the application is compatible with Windows XP/Vista/7/8 (32bit + 64bit).


Via Frédéric DEBAILLEUL
Gust MEES's insight:

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, June 2, 2013 6:25 AM

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

173 Sud's curator insight, June 2, 2013 9:01 AM

 

The free version of Protectorion is limited, as you can only encrypt two external drives and it is for personal use only.

Scooped by Gust MEES
Scoop.it!

Reasons to Encrypt Your Data

Reasons to Encrypt Your Data | 21st Century Learning and Teaching | Scoop.it
Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to grow and then send a ...

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Gust MEES's insight:

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's curator insight, May 24, 2013 5:00 PM

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/