Latest Social Media News
112.9K views | +1 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's iOS 7 Update Fixes 80 Security Bugs

Apple's iOS 7 Update Fixes 80 Security Bugs | Latest Social Media News | Scoop.it
Yesterday's iOS 7 update brought a slew of bug fixes, 80 in total, to Apple devices.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

The ugly state of password security in the cloud

The ugly state of password security in the cloud | Latest Social Media News | Scoop.it
I reviewed more than 130 cloud and SaaS services and the results were a bit unexpected.

Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | Latest Social Media News | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 


Via Gust MEES
Gust MEES's curator insight, August 16, 2013 8:37 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

#ICT: The Hand of Thief Linux banking Trojan being sold to criminals for $2000

#ICT: The Hand of Thief Linux banking Trojan being sold to criminals for $2000 | Latest Social Media News | Scoop.it
Yet another reason why Linux users shouldn't be complacent about their computer security, and run an anti-virus program.

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple to fix iPhones' vulnerability to boobytrapped chargers

Apple to fix iPhones' vulnerability to boobytrapped chargers | Latest Social Media News | Scoop.it
iPhones and iPads will be vulnerable until they get the iOS 7 update, which is scheduled for release later this year. Until then, you might want to avoid plugging into sleazy charging stations, tho...

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Researchers reveal how to hack an iPhone in 60 seconds

Researchers reveal how to hack an iPhone in 60 seconds | Latest Social Media News | Scoop.it
Three Georgia Tech hackers have disclosed how to hack iPhones and iPads with malware in under sixty seconds using a "malicious charger."

Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Latest Social Media News | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's OS X FBI ransomware going global

Apple's OS X FBI ransomware going global | Latest Social Media News | Scoop.it
Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

 


Via Gust MEES
Gust MEES's curator insight, July 22, 2013 2:48 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Gust MEES's curator insight, July 22, 2013 2:53 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Gust MEES's curator insight, July 22, 2013 3:03 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

FBI Warns of Mac OS X Ransomware

FBI Warns of Mac OS X Ransomware | Latest Social Media News | Scoop.it
The FBI has become aware of the recent news regarding the ransomware that’s designed to target Mac OS X users. The agency’s Internet Crime...

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Tumblr security lapse - iPhone and iPad users update your passwords now!

Tumblr security lapse - iPhone and iPad users update your passwords now! | Latest Social Media News | Scoop.it

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 


Via Gust MEES
Gust MEES's curator insight, July 17, 2013 6:06 PM

 

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Passwords

 

 

midnight's curator insight, April 7, 2014 5:54 AM

This article contains information about the  security of the iphone and ipad users. This is very useful, because users wil be secured from any harm that could be done with their gadets. passwords were being sent over the internet unencrypted this could cause alot of problems because hackers would easily be able to access your password.

shirlyshabo's curator insight, April 22, 2014 8:03 AM

האם באמת יש דבר כזה  אתר מאובטח?????

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

New back-to-front Mac malware records audio and grabs screenshots

New back-to-front Mac malware records audio and grabs screenshots | Latest Social Media News | Scoop.it
Mac backdoor Trojan takes advantage of Unicode's Right-to-Left marker to hide its true nature, steals screenshots and audio from infected computers.

Via Gust MEES
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Tenable Network Security

Tenable Network Security | Latest Social Media News | Scoop.it

SecurityCenterContinuous View

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Learn more about integrated risk, threat, and compliance analytics for security analysts, compliance auditors, and executive risk managers.

 


Via Gust MEES
Gust MEES's curator insight, July 12, 2013 1:31 AM

 

New features make SecurityCenter CV the first security intelligence platform to identify what is vulnerable, what is under attack, and what has been already compromised.

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Latest Social Media News | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Adobe issues patches for critical Flash, Reader and Shockwave flaws

Adobe issues patches for critical Flash, Reader and Shockwave flaws | Latest Social Media News | Scoop.it
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs.

 

Users of Google Chrome and Internet Explorer 10 on Windows 8 will automatically receive updates for the Flash Player plug-in bundled with those browsers through their respective update mechanisms.

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.

 


Via Gust MEES
Gust MEES's curator insight, September 11, 2013 10:31 AM

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.


Terheck's curator insight, September 11, 2013 10:50 AM

Links for downloads :

Flash player : https://www.adobe.com/products/flashplayer/distribution3.html

Shockwave player : http://get.adobe.com/fr/shockwave/

Adobe AIR : http://get.adobe.com/fr/air/

mindlesspeduncle's curator insight, September 12, 2013 2:03 PM

great

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Malicious Websites-2013-Threat [Infographic]


Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Joomla Patches Zero Day Targeting EMEA Banks

Joomla Patches Zero Day Targeting EMEA Banks | Latest Social Media News | Scoop.it
Content management system Joomla patched a zero-day vulnerability that allowed attackers to upload malicious code that led victims to the Blackhole exploit kit.

 

A nasty Joomla vulnerability was recently patched, but not before attackers used a zero day exploit to take over tens of thousands of sites and redirect victims to the Blackhole exploit kit, according to security company Versafe.

 

Most of the attacks were against financial institutions in Europe, the Middle East and Asia and stemmed from an initial attack against 100 Joomla-hosted websites.


Via Gust MEES
Gust MEES's curator insight, August 14, 2013 5:19 PM

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Gust MEES's curator insight, August 14, 2013 5:22 PM

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)

BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN) | Latest Social Media News | Scoop.it
bgp-ranking - BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).

Via Gust MEES
Gust MEES's curator insight, August 6, 2013 9:16 AM

 

BGP Ranking is used by CIRCL (Computer Incident Response Center Luxembourg):

 

http://bgpranking.circl.lu/

 

Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Free first aid kit for computer viruses

Free first aid kit for computer viruses | Latest Social Media News | Scoop.it
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malw...

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Latest Social Media News | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Once more into the breach: How hackers compromise websites like Apple's | Macworld

Once more into the breach: How hackers compromise websites like Apple's | Macworld | Latest Social Media News | Scoop.it
These days, it seems that websites are hacked with alarming frequency. While even companies of Apple's sophistication and size aren't immune from successful attacks, it's not quite time to start wearing your tin foil hat--yet.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's Development Center Breached by Hackers

Apple's Development Center Breached by Hackers | Latest Social Media News | Scoop.it
Apple's Dev Center went down on Thursday causing issues for developers around the world. The system remained down for three days and is still currently unavailable.

 

This brings up an interesting question regarding single points of failure in the mobile application distribution system. When one component goes down, or is breached in this case it affects the entire ecosystem.

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

What is the point of hacking one person’s phone when there are entire app store infrastructures to target?


Via Gust MEES
Gust MEES's curator insight, July 21, 2013 8:20 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 8:22 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Vivalist's curator insight, July 22, 2013 4:28 AM

going up the network, identify the bottle neck and get at it - pretty simple, but they probably had to sweat a little to do it.

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Attackers embedding backdoors into image files

Attackers embedding backdoors into image files | Latest Social Media News | Scoop.it
Sucuri researchers find hackers are using a known, but unusual, way to maintain access to an already compromised server by hiding backdoors inside the headers of legitimate image files

Via Gust MEES
Gust MEES's curator insight, July 18, 2013 5:33 PM

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Gust MEES's curator insight, July 18, 2013 5:37 PM

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Barrage of Cyberattacks Challenges Campus Culture

Barrage of Cyberattacks Challenges Campus Culture | Latest Social Media News | Scoop.it
The hacking attempts, many thought to be from China, are forcing universities to spend more to prevent and detect intrusions.

 

===> Bill Mellon of the University of Wisconsin said the school has seen as many as 100,000 hacking attempts a day from China. <===

 


Via Gust MEES
Gust MEES's curator insight, July 16, 2013 6:00 PM

 

===> Bill Mellon of the University of Wisconsin said the school has seen as many as 100,000 hacking attempts a day from China. <===

 AND YOU THINK that there isn't STILL a MUST for Learning and Teaching about Cyber-Security, seriously!!!??? 

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

DropBox account hacking bypassing two-factor authentication

DropBox account hacking bypassing two-factor authentication | Latest Social Media News | Scoop.it
Zouheir Abdallah revealed that a hacker already knows the victim's credentials for Dropbox account that has 2FA authentication enabled, is able to hack it.

Via Frederic GOUTH, Gust MEES
Rescooped by Gerrit Bes from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | Latest Social Media News | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES, ABroaderView
Jhonathan Garcia's curator insight, July 10, 2013 9:33 PM

Social Media Security Post:  Be careful with all the things you post!

Michelle Gilstrap's curator insight, July 11, 2013 1:13 PM

Never show photos of your vacation while you are on vacation. Always show photos when you get back home.

Carmenne Kalyaniwala's curator insight, October 15, 2013 2:36 AM

An infographic with some important information we can share with students