21st Century Learning and Teaching
586.1K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'MacBook-Hack'. Clear
Scooped by Gust MEES
Scoop.it!

Apple soll schuld sein an Hacker-Angriff

Apple soll schuld sein an Hacker-Angriff | 21st Century Learning and Teaching | Scoop.it
Daten gelöscht aus der Ferne, Twitter- und Gmail-Account gekapert – ein amerikanischer Journalist gibt Apple die Schuld an einem besonders heftigen Hacker-Angriff.

 

 

 

 

 

===> Mittlerweile habe er wieder die Kontrolle über seine Accounts und Geräte. Apple arbeite an einer Wiederherstellung seiner Daten, die insofern erleichtert wird, weil dem Macbook der Strom ausging, bevor alle Daten gelöscht werden konnten. <===

 

Gust MEES: das muss man unbedingt lesen und schmunzeln ist garantiert, LOL ;)

 

http://www.pcwelt.de/news/Apple-soll-schuld-haben-an-Hacker-Angriff-6182702.html?r=761528923305658&amp;amp;lid=189335

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

How Apple let a hacker remotely wipe an iPhone, iPad, MacBook

How Apple let a hacker remotely wipe an iPhone, iPad, MacBook | 21st Century Learning and Teaching | Scoop.it
Summary: Gizmodo's Twitter account was recently hacked, after a former employee's iCloud account was breached, and all his Apple devices (iPhone, iPad, MacBook Air) were remotely wiped.

 

Gust MEES: Why this security article here? This will show YOU that "Nobody is Perfect" and that WE ALL have to learn about IT-Security, especially Teachers, Educators, Instructors... It's our responsibilty to give best advice about e-Learning, and IT-Security is part of e-Learning in 21st Century ;)

 

Check also my FREE courses about basic knowledge of IT-Security:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

 

 

Read more (nobody is perfect)...:

http://knolinfos.visibli.com/share/yETAZs

 

No comment yet.