21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit

Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit | 21st Century Tools for Teaching-People and Learners | Scoop.it
Share this news now.Share this news now.In a cybercrime ecosystem populated by commercially available WordPress brute-forcing and mass vulnerable WordPress installation scanning tools, cybercriminals continue actively capitalizing on the platform’s leading market share within the Content Management System’s market segment.


Successfully exploiting tens of thousands of installations on a daily basis, for the purpose of utilizing the legitimate infrastructure to achieve their fraudulent/malicious campaign objectives, the tactic is also largely driven by the over-supply of compromised/accounting data, usually embedded within sophisticated Web-based attack platforms like the ones we’ve profiled in the past.


We’ve recently intercepted a malicious campaign exclusively relying on rogue WordPress sites, ultimately serving client-side …Share this news now.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=WordPress-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | 21st Century Tools for Teaching-People and Learners | Scoop.it
OpenVPN - The Open Source VPN
Gust MEES's insight:

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | 21st Century Tools for Teaching-People and Learners | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | 21st Century Tools for Teaching-People and Learners | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Tools for Teaching-People and Learners | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments | 21st Century Tools for Teaching-People and Learners | Scoop.it
Imation’s portable USB desktops transform any computer into an IT-managed workstation, so workers can take all their data, applications and systems with them, securely and reliably.

 

 

 

 

 

Read more:

http://www.imation.com/en-EU/Mobile-Security/Mobile-Security-Products/Secure-Mobile-Workspace/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Video: The expanded threat landscape

Video: The expanded threat landscape | 21st Century Tools for Teaching-People and Learners | Scoop.it
SC Magazine has various news articles and information for IT security professionals.

 

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Scooped by Gust MEES
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | 21st Century Tools for Teaching-People and Learners | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.

Gust MEES's insight:

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackfest: Québec au coeur d'une cyberguerre virtuelle

Hackfest: Québec au coeur d'une cyberguerre virtuelle | 21st Century Tools for Teaching-People and Learners | Scoop.it
La ville de Québec sera cette semaine l'épicentre d'une cyberguerre mondiale où huit pays défendront leur infrastructure informatique tout en attaquant celle de leurs...

 

En savoir plus :

 

http://techno.lapresse.ca/nouvelles/internet/201210/29/01-4587968-quebec-au-coeur-dune-cyberguerre-virtuelle.php?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic]

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic] | 21st Century Tools for Teaching-People and Learners | Scoop.it
Mobile security firm TrustGo Mobile recently released a report that examined the Android threat landscape across 175 Android markets and 1.7 million Android apps.

 

Read more, a MUST:

http://www.securityweek.com/mobile-security-firm-analyzes-17-million-android-apps?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft Security PowerPoint Presentations

Microsoft Security PowerPoint Presentations | 21st Century Tools for Teaching-People and Learners | Scoop.it
Download free PowerPoint presentation templates from Microsoft that you can use to teach classes or groups about computer and Internet security.

 

 

 

Read more:

http://www.microsoft.com/security/resources/powerpoint.aspx

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.