Aprendiendo a Distancia
106.0K views | +0 today
Aprendiendo a Distancia
Colaborando para una mejor educación en línea para adelantar la evolución de la enseñanza y aprendizaje usando la tecnología y pedagogía como estrategias.
Your new post is loading...
Your new post is loading...
Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

11 ways to stay SAFE online when you’re traveling

11 ways to stay SAFE online when you’re traveling | Aprendiendo a Distancia | Scoop.it

If you bring your phone, tablet or laptop with you when you travel, there’s one thing to keep in mind: public WiFi networks are public.

“That open Wi-Fi connection opens the door for hackers,” writes NPR’s Steve Henn. “They can get in the middle of transactions between, say, you and your bank.”


Because you’re sharing the network with strangers, there’s the risk that someone is using readily available software that snoops on what you’re doing.


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



Via Gust MEES
Gust MEES's curator insight, July 7, 2014 7:18 PM

If you bring your phone, tablet or laptop with you when you travel, there’s one thing to keep in mind: public WiFi networks are public.

“That open Wi-Fi connection opens the door for hackers,” writes NPR’s Steve Henn. “They can get in the middle of transactions between, say, you and your bank.”


Because you’re sharing the network with strangers, there’s the risk that someone is using readily available software that snoops on what you’re doing.


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



SLS Guernsey's curator insight, July 8, 2014 7:23 AM

Really useful information to remember when you are travelling and using free wifi. Take care that you understand what you are using and stay safe.

Melissa Marshall's curator insight, July 21, 2014 4:12 AM

If you bring your phone, tablet or laptop with you when you travel, there’s one thing to keep in mind: public WiFi networks are public.

“That open Wi-Fi connection opens the door for hackers,” writes NPR’s Steve Henn. “They can get in the middle of transactions between, say, you and your bank.”

 

Because you’re sharing the network with strangers, there’s the risk that someone is using readily available software that snoops on what you’re doing.

 
Rescooped by Alfredo Calderón from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO]

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO] | Aprendiendo a Distancia | Scoop.it
Another day, another privacy vulnerability found in iOS.

When will Apple learn that a lockscreen should really, properly, lock the phone?

Via Gust MEES
Gust MEES's curator insight, September 30, 2013 12:33 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 30, 2013 12:37 PM

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 30, 2013 12:51 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Enjoy your online life, safely

------- Cardiff Design Festival AWARD W|INNER // The Best of Welsh Design awards talented designers and design thinkers across Wales------- A viral video, explaining…

Via Gust MEES
Rescooped by Alfredo Calderón from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Aprendiendo a Distancia | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

The growing headache of protecting mobile devices

The growing headache of protecting mobile devices | Aprendiendo a Distancia | Scoop.it

Bring-Your-Own-Device (BYOD) schemes have become increasingly prevalent in most businesses worldwide, as employees look to use their own personal devices in a business context. When asked if employees valued certain devices over others, 89 per cent of those surveyed claimed this was the case.

 

“Rather than fight against the tide, organizations should embrace the use of these devices and work alongside staff to ensure that comprehensive IT policies and best practice guidelines are put in place to assist and inform employees about how their devices should be used. End-point protection for these devices is also crucial if businesses want to safeguard employees against an ever-changing, increasingly sophisticated threat landscape.”

 

Read more:

http://www.net-security.org/secworld.php?id=13245

 


Via Gust MEES
No comment yet.
Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Google Produces an Informal Web Threat Report, Shares Insights

Google Produces an Informal Web Threat Report, Shares Insights | Aprendiendo a Distancia | Scoop.it
Google has shared some interesting Web security statistics, and while the information was not published as an official “threat report”, the company has provided some insight into the growth of malicious activity across the Web.

 

he company provides a free and public Safe Browsing API that allows other organizations to keep their users safe by using the data Google has compiled.

 

• Google said it discovers about 9,500 new malicious websites every day – These sites could be either innocent sites that have been compromised by cybercriminals, or purpose-built sites designed for malware distribution or phishing.

 

• Approximately 12-14 million Google Search queries per day show warnings in order to caution users from going to sites that may be compromised.

 

• Google provides malware warnings for about 300,000 downloads per day through its Chrome download protection service.

 

• Google also sends thousands of notifications daily to Internet Service Providers (ISPs) & CERTs to help them keep their networks clean.

 

Read more:

http://www.securityweek.com/google-produces-informal-web-threat-report-shares-insights

 


Via Gust MEES
No comment yet.
Rescooped by Alfredo Calderón from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs, Malware & Security Myths

Are Mac Users safe from Malware? Not as much as you might think. Symantec's Security Expert Kevin Haley breaks down the Mac's invincibility myth. Learn why M...

Via Gust MEES
Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Aprendiendo a Distancia | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Data breaches in higher education

Data breaches in higher education | Aprendiendo a Distancia | Scoop.it

TeamSHATTER reports on data breaches in the higher education vertical throughout the United States.

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.


Via Gust MEES
Gust MEES's curator insight, March 18, 2013 12:29 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

 

Gust MEES's curator insight, March 18, 2013 12:35 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Are You Safe Online? [INFOGRAPHIC]

Are You Safe Online? [INFOGRAPHIC] | Aprendiendo a Distancia | Scoop.it

Thankfully, the security tools we use today have also improved accordingly, but users need to be proactive and take responsibility to ensure that their desktop machines, smartphones and tablets are protected.

 

Read more:

http://ht.ly/dBrMr

 


Via Gust MEES
No comment yet.
Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

How to Avoid 17 Internet Scams [INFOGRAPHIC]

How to Avoid 17 Internet Scams [INFOGRAPHIC] | Aprendiendo a Distancia | Scoop.it
All over the world, Internet scams abound. Check out this infographic for tips on how to ensure that you don't fall prey to a scheme.

 

Read more:

http://mashable.com/2012/06/17/internet-scams-infographic/

 


Via Gust MEES
No comment yet.