Education 2.0 & 3.0
148.5K views | +0 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How to Hack a Mobile App: It's Easier than You Think!

How to Hack a Mobile App: It's Easier than You Think! | Education 2.0 & 3.0 | Scoop.it
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.

 

Learn more:

 

http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 


Via Gust MEES
Gust MEES's curator insight, August 7, 2014 11:44 AM
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Education 2.0 & 3.0 | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Effective Apps And Web Tools For BYOD Classrooms

Effective Apps And Web Tools For BYOD Classrooms | Education 2.0 & 3.0 | Scoop.it
I'd recommend using this chart as a jumping off point to new adventures in learning in BYOD classrooms and beyond!

Via Gust MEES
Dr Pam Hill's curator insight, November 1, 2013 4:04 PM

Great ideas for BYOD PD sessions.  I will be using these ideas!

Elena Evtukh's curator insight, November 8, 2013 11:43 PM

Эффективные мобльные приложения и сетевые ресурсы для BYOD класса.

В - bring (принеси)

Y - your (свое)

O - own (собственное)

D - device (устройство)

Melissa Marshall's curator insight, November 11, 2013 2:24 AM

Great graphic for when you are unsure as to what your kids may have access to.