21st Century Learning and Teaching
586.1K views | +13 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Government...'. Clear
Scooped by Gust MEES
Scoop.it!

PC-WELT-Serie: So arbeiten Hacker

PC-WELT-Serie: So arbeiten Hacker | 21st Century Learning and Teaching | Scoop.it
Fast täglich gibt es Meldungen über Sicherheitslücken in Betriebssystemen und Software. Und häufig gelingt es Hackern, diese Lücken auch auszunutzen.

 

 

Hier erfahren Sie, wie es zu den Sicherheitslücken kommt, wie Hacker die Lücken nutzen und wie Sie Ihre Systeme schützen.

 

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

10 Simple Tips for Boosting The Security Of Your Mac

10 Simple Tips for Boosting The Security Of Your Mac | 21st Century Learning and Teaching | Scoop.it
At the moment, there are more than 100 million Mac OS X users around the world. The number has grown switfly during the past years we expect this growth to continue.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Positioning the Security Team Through Influence Part 1

Positioning the Security Team Through Influence Part 1 | 21st Century Learning and Teaching | Scoop.it
Positioning the Security Team Through Influence Part 1
The essential approach to enhancing the role of security professionals is to enhance their organizational influence.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet Safety Project

Internet Safety Project | 21st Century Learning and Teaching | Scoop.it

Is this your first time visiting the Internet Safety Project? Don’t worry we were once new too.

 

Here are a few tips to get you started! Just look for the phrase that best describes you.

I want advice from Internet Safety Experts
Read our blogs here. All of our guest bloggers are Internet safety experts who give great practical advice!

 

You can also listen to our podcasts! We interview experts and talk about current Internet safety issues.


Every podcast we record is available online for free. Click here to see the full selection.

You can also access blogs and podcasts using the tabs at the top of the site.

I am an Educator or Parent looking for Internet safety resources
You’ve come to the right place! You can search for articles from the main wiki page here for articles on Internet Safety. Or just use the search bar in the upper right hand corner.

 

You can also look at the resources other Internet safety organizations (See a complete list of Internet Safety Organizations and Products here). Some sites even include curriculum or volunteer programs that you can implement in your community or school. Check out the categories below to get started:

 

- Organizations for Parents
- Educational Organizations
- I want to know what’s going on in Internet and Technology news right now!
- Read some of our Newswire Reports ( The box on the right side of the site). We post a new report everyday on current internet safety and technology issues.

 

You can also follow us on twitter and Facebook. We’ll let you know what’s going on in the Internet world, and when our new blogs and podcasts are up.

 

- I just want to know more about the Internet and the issues out there. Where should I start?


You can search our Internet Safety Project Wiki (search bar in the upper right hand corner), but if you're not even sure what to look for you might want to start by browsing some of our popular pages.

 

Try starting with our list of wiki articles on Internet basics. These are things that you will probably stumble across in normal computer use, such as: acronyms, browsers, e-mail, and search engines.


Here are articles on some of the bigger safety issues we cover:


- Pornography
- Online Games Addiction
- Identity Theft
- Malware
- Viruses
- Social Networking
- Cyberbullying
- Online Predators
- Texting

 

  Link: http://www.internetsafetyproject.org/

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Oxford University: Cyber Security Centre

Oxford University: Cyber Security Centre | 21st Century Learning and Teaching | Scoop.it
Cyber Security Centre...

 

Cyber security is an increasingly important requirement for global business and modern society. We exist in a data-centric world, where information technology and associated communications networks and services pervade every aspect of our lives.

 

This makes the protection of our digital assets and activities in cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex.

 

We are increasingly dependent upon such information and communications infrastructures and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cracks appear in face of Apple's iOS security

Cracks appear in face of Apple's iOS security | 21st Century Learning and Teaching | Scoop.it
Apple’s iOS mobile platform, like its desktop-and-notebook sibling Mac OS X, has garnered a reputation for strong security.

 

===> But as new holes in iOS's security crop up, this reputation may be exposed to less-than-friendly fire. <===

 

GM: NOBODY is perfect!

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Are you having a (Mac) Flashback?

Are you having a (Mac) Flashback? | 21st Century Learning and Teaching | Scoop.it

On Monday, I provided steps on how to avoid your Mac being compromised by the Flashback trojan. Today I will provide information on how to locate a Flashback infection.

 

To better understand the steps below, it is better to also know a bit about Flashback. It's an OS X malware family that modifies the content displayed by web browsers. To achieve this, it interposes functions used by the Mac's browsers.

 

The hijacked functions vary between variants but generally include CFReadStreamRead and CFWriteStreamWrite: read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Tips for combating online risks

Tips for combating online risks | 21st Century Learning and Teaching | Scoop.it

To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following:

 

- Phone home safely - Mobile malware is on the rise, especially on Android devices, so take a moment to swing by the marketplace or app store to install a mobile security application that will safeguard your device against attacks. Many security apps can also help you locate your phone if it is lost or stolen.

 

- Be wary of WiFi - It can be tempting to take advantage of free WiFi access points in airports, hotels or cafes, but resist the urge to use those connections to do anything other than browse.

Unsecured wireless connections can leave you vulnerable to a variety of risks, from data-stealing malware to wireless snooping of your logins or email messages by other travelers and guests.

 

Much more: read article...

 

asma jmari 's comment, April 18, 2012 5:43 AM
More than welcome @Gust Mees
Scooped by Gust MEES
Scoop.it!

Infographic: Timeline and history of computer viruses

Infographic: Timeline and history of computer viruses | 21st Century Learning and Teaching | Scoop.it
BitDefender has prepared this wonderful and a very informative Infographic on the history of computer viruses starting 1970. The history of malware is rife with incidents that allowed viruses to morph ...
No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Learning and Teaching | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online Safety Tips | Protect Kids and Family Online

Online Safety Tips | Protect Kids and Family Online | 21st Century Learning and Teaching | Scoop.it

 

 

 

 

 

Tips to help you and your family become safer online. Online Safety Tips.

 

 

 

 

 

                             ===> Share this please! <===

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

How financial botnets like #Zeus infect computers [video]

How financial botnets like #Zeus infect computers [video] | 21st Century Learning and Teaching | Scoop.it

Video on how financial botnets like #Zeus infect computers and steal your account info...

 

Gust MEES: a very good video who explains the way that everybody understands... A MUST WATCH!!!

 

Check out also: 

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/ ;

 

 

   ===> ICT-Security + Cyber-Security are part of Learning in 21st Century!!! <=== 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious software meets BYOD

Malicious software meets BYOD | 21st Century Learning and Teaching | Scoop.it
Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.

 

When trying to get a handle on cybercrime today, consider this: In millions of homes across America, unencrypted company information is sitting on unprotected desktops and laptops – in the hands of employees who have had no security training.

 

At the same time, we see software being deployed that can stealthily and remotely scan the hard drives of those machines for specific data, and secretly transmit it back to the scanner.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

How To Make Information Security Everyone's Problem

How To Make Information Security Everyone's Problem | 21st Century Learning and Teaching | Scoop.it
Use self-interest and propaganda to change employees' attitudes about endpoint security.
No comment yet.