21st Century Learning and Teaching
586.6K views | +8 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cybersecurity', 'Mobile-Learning'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&et_rid=454853272&linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

What You Need to Know About Mobile Malware

What You Need to Know About Mobile Malware | 21st Century Learning and Teaching | Scoop.it

Last week we told you how to protect yourself from mobile malware http://safeandsavvy.f-secure.com/2012/05/08/5-ways-to-keep-your-mobile-phone-safe/

 

 

 For people who want to go a step further and understand the threats your smartphone faces, we’re going to take a quick look inside the F-Secure Mobile Threat Report Q1 2012. What you’ll find is a Android landscape where threats are quickly maturing.

 

Read more:

http://safeandsavvy.f-secure.com/2012/05/18/what-you-need-to-know-about-mobile-malware/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec Empowers Enterprises to Embrace Mobility, BYOD

Symantec Empowers Enterprises to Embrace Mobility, BYOD | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

 

 

However, IT departments tasked with keeping company networks and sensitive data safe are still struggling to get a handle on mobility. According to the same survey, mobility ranks as the leading IT risk among organizations, that includes being perceived as more risky than virtualization and even public cloud computing.

 

===> Device loss, data breach and mobile malware are some of the chief concerns. And these concerns are not unfounded. For the 12 month period leading up to the survey, the average cost of enterprise losses associated with mobility was $429,000. <===

 

To help enterprises take full advantage of mobility while also mitigating the very real risks associated with it, Symantec has built the strongest mobile security and management product portfolio available. Today, we announced significant updates to this portfolio that enhance our already industry-leading capabilities in mobile device management, mobile application management and mobile threat protection.

No comment yet.