Aprendiendo a Distancia
106.0K views | +0 today
Aprendiendo a Distancia
Colaborando para una mejor educación en línea para adelantar la evolución de la enseñanza y aprendizaje usando la tecnología y pedagogía como estrategias.
Your new post is loading...
Your new post is loading...
Rescooped by Alfredo Calderón from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs, Malware & Security Myths

Are Mac Users safe from Malware? Not as much as you might think. Symantec's Security Expert Kevin Haley breaks down the Mac's invincibility myth. Learn why M...

Via Gust MEES
Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Aprendiendo a Distancia | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Data breaches in higher education

Data breaches in higher education | Aprendiendo a Distancia | Scoop.it

TeamSHATTER reports on data breaches in the higher education vertical throughout the United States.

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.


Via Gust MEES
Gust MEES's curator insight, March 18, 2013 12:29 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

 

Gust MEES's curator insight, March 18, 2013 12:35 PM

 

The past year has seen a substantial uptick in the amount of total records breached. In 2012, there was a dramatic increase in the total number of reported records affected (1,977,412), but a relatively low amount of institutions (51) that reported breaches.

 

In fact, the past year has seen the most reported compromised records in the higher education sector since 2006, based on data since tracking began in 2005.

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

Rescooped by Alfredo Calderón from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO]

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO] | Aprendiendo a Distancia | Scoop.it
Another day, another privacy vulnerability found in iOS.

When will Apple learn that a lockscreen should really, properly, lock the phone?

Via Gust MEES
Gust MEES's curator insight, September 30, 2013 12:33 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 30, 2013 12:37 PM

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 30, 2013 12:51 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Alfredo Calderón from 21st Century Learning and Teaching
Scoop.it!

Enjoy your online life, safely

------- Cardiff Design Festival AWARD W|INNER // The Best of Welsh Design awards talented designers and design thinkers across Wales------- A viral video, explaining…

Via Gust MEES
Rescooped by Alfredo Calderón from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Aprendiendo a Distancia | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/