Latest Social Media News
112.9K views | +1 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says

"Unless it is absolutely necessary to run Java in web browsers, disable it", DHS-sponsored CERT team says | Latest Social Media News | Scoop.it
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch?

It's time to rip Java out of your browser for better securi...

Via Gust MEES
Gust MEES's curator insight, January 19, 2013 12:46 PM

A MUST follow instructions!!!

 

Gust MEES's curator insight, January 20, 2013 9:05 AM

===> A MUST follow instructions!!! <===

 

 

Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...

 

Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Java-vulnerabilities

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

SMS spam threat targets Apple fans

SMS spam threat targets Apple fans | Latest Social Media News | Scoop.it

AdaptiveMobile today sheds light on the extent of a new global SMS spam threat. According to Ongoing Threat Analysis (OTA) which examines mobile security threats from around the world, consumers should to be on the lookout for fraudulent spam texts informing them they have won a free Apple product such an iPad, iPhone or MacBook.

The texts frequently include a web address that looks like it is from Apple but upon closer inspection is not a legitimate Apple website and are sent from US mobiles numbers (+1-XXX-XXX-XXXX).

“Congratulations! You are Australia’s WINNER OF THE DAY! Go to http://www.apple.au.[redacted].com to claim your prize. Must claim within 24 hrs.”

“Your phone was randomly chosen as Apple’s Over-Stock iWinner. Go to http://ie.appleoverstock.[redacted] & type code 2872 to win your Free Gift-Card now!”


Via Gust MEES
Gust MEES's curator insight, January 17, 2013 7:53 AM

              ===> BEWARE of the MALWARE!!! <===

 

Gust MEES's curator insight, January 17, 2013 7:58 AM

                     ===> BEWARE of the MALWARE!!! <===

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

New Laws: Is it Really Up to the Government to Protect Your Kid Online?

New Laws: Is it Really Up to the Government to Protect Your Kid Online? | Latest Social Media News | Scoop.it

A focus on child safety is among the top state laws taking effect at the start of 2013. In many states, new laws take effect on Jan. 1, 2013

 

Now It’s Your Turn

 

With all this new legislation, it should be a reminder that if the government is concerned about the safety of your kids online, you should be concerned too.

 

===> It is ultimately the parents’ responsibility to protect their children both off line and online. <===

 


Via Gust MEES
Breanne Hemann's comment, April 12, 2014 10:12 PM
I agree that some measures are needed to protect children from the harms that can come with the internet. However, I do believe there is only so much that the government can do before it begins to affect citizens freedom. How will these new laws affect internet users? Will it be a positive move on the governments part?
Lauren Heim's curator insight, May 7, 2014 10:58 PM

I think this is a good and bad idea. I think it's by far an invasion of privacy but i also believe that it will save a lot of lives and that overrules invasion of privacy. So it's probably not a bad idea considering cyber bullying has only gotten worse.  

Abigail Beinborn's comment, May 8, 2014 1:28 PM
I agree that this is a good idea for the government to keep children safe on the internet. People are becoming more violent and violating a lot of people's personal business on the internet. I believe that the internet is becoming more unsafe.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Revealed: NSA targeting domestic computer systems in secret test

Revealed: NSA targeting domestic computer systems in secret test | Latest Social Media News | Scoop.it
The National Security Agency's Perfect Citizen program hunts for vulnerabilities in 'large-scale' utilities, including power grid and gas pipeline controllers, new documents from EPIC show. Read this article by Declan McCullagh on CNET News.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Beware of Malware: Mobile Security Apps to Safeguard Your Phone

Beware of Malware: Mobile Security Apps to Safeguard Your Phone | Latest Social Media News | Scoop.it
Malware attacks on mobile devices are on the rise. Lookout and Avast can help protect your smartphone from hackers and thieves.

 

=================================================

 

Gust MEES

 

Check out also here:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

=================================================


Via Gust MEES
Zhao KQiang's curator insight, March 27, 2014 7:03 AM

focus on the how apps effect on the phone security

 it recall me to check the apps of my phone

Rescooped by Gerrit Bes from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks

WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks | Latest Social Media News | Scoop.it
WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | Latest Social Media News | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&amp;utm_source=twitter&amp;utm_medium=social

Via Gust MEES
Gust MEES's curator insight, December 12, 2012 7:06 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Gust MEES's curator insight, December 12, 2012 7:10 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

First fake-installer Trojan for Mac OS

First fake-installer Trojan for Mac OS | Latest Social Media News | Scoop.it
Russian anti-virus company Doctor Web informs users about a new Trojan for Mac OS X dubbed Trojan.SMSSend.3666.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets | Latest Social Media News | Scoop.it
Attackers have expanded their attacks beyond the Windows platform to include Mac OS X and Android. 27 Percent of All Cybercrime Linked to the ‘Blackhole’ Exploit Kit, Sophos said.

 

Even though the overall market share for Mac OS X remains small compared to other platforms, the number of Mac threats are growing as more users switch. Flashback, the malware that reportedly infected hundreds of thousands of Apple systems in April was the largest mass attack this year, but it's not the only Mac malware out there. In a typical week, SophosLabs detects 4,900 pieces of OS X malware on Mac computers.

 

===> In a snapshot of Mac malware detected over a one-week period in August, SophosLab detected various variants of fake antivirus, codecs and Flash player. <===

 

Read more, a MUST:

http://www.securityweek.com/sophos-blackhole-will-get-more-complex-android-and-mac-os-are-prime-attack-targets

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

IT professionals do not display enough concern for data encryption

IT professionals do not display enough concern for data encryption | Latest Social Media News | Scoop.it

Nearly two-thirds of IT professionals have admitted that they do not encrypt data stored on portable storage devices.

 

According to a survey of 106 delegates at IP Expo 2012 by iStorage, 64 per cent admitted to not encrypting data held on portable storage devices, while fewer (than those surveyed in 2011) believed that data loss was a serious concern. (!!!???)

 

============================================

 

Gust MEES

 

I am actually preparing a new FREE course about the "Cyber-Security Practice-the basics" which everyone can and should learn, very easy actually... There will be also included a FREE solution for encrypting the complete Hard Disk, stay tuned... It will be published here (soon):

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

============================================

 

 

Read more, a MUST:

http://www.scmagazineuk.com/it-professionals-do-not-display-enough-concern-for-data-encryption/article/270509/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

OESIS Software Management SDK | Endpoint Compliance for SSL VPN, NAC

OESIS Software Management SDK | Endpoint Compliance for SSL VPN, NAC | Latest Social Media News | Scoop.it
Integrating OESIS Framework enables solutions such as SSL VPN, NAC and others to detect, classify and manage thousands of third party applications. Use OESIS for powerful software manageability.

 

- OESIS Framework is a cross platform, open development framework which enables software engineers and technology vendors to develop products that detect, classify and manage thousands of third-party software applications. OESIS Framework is perfect for SSL VPN, network access control (NAC), support tools and other solutions requiring software manageability.

 

- OESIS Framework consists of software development libraries, source code, and XML files. It provides 4 major components for software manageability:

 

- OESIS Local - libraries that may be embedded in your client to enable the detection, classification and management of endpoint applications


- OESIS Monitor - a data service that monitors and reports application and definition updates
Update Verify - a utility that compares definition data from OESIS Local and OESIS Monitor to ensure that the latest available updates are present on the endpoint


- AppDocs - a toolkit that graphically instructs end-users on how to properly configure endpoint applications


See the capabilities of OESIS in action by trying out OPSWAT's free Security Score tool!

 

http://www.opswat.com/products/security-score

 

 

Read more, very interesting...:

http://www.opswat.com/products/oesis-framework

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Free Tutorials in EN, FR, DE
Scoop.it!

TrueCrypt - Free Open-Source Disk Encryption - Documentation

TrueCrypt - Free Open-Source Disk Encryption - Documentation | Latest Social Media News | Scoop.it
TrueCrypt - free open-source disk encryption - documentation...

Via Gust MEES
Gust MEES's curator insight, July 23, 2013 8:49 AM

 

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

 

TrueCrypt - Free Open-Source Disk Encryption - Documentation

 

Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

McAfee SiteAdvisor now supports Safari for Mac users

McAfee SiteAdvisor now supports Safari for Mac users | Latest Social Media News | Scoop.it
McAfee SiteAdvisor software is a free browser plug-in that provides simple Web site safety ratings and a Secure Search box so you can surf, search and shop more safely.

 

==========================================

 

Gust MEES

 

Check out ALSO my FREE courses here:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

==========================================

 

Learn more:

http://www.siteadvisor.com/download/mac.html?q=promo

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

1-15 January 2013 Cyber Attacks Timeline

1-15 January 2013 Cyber Attacks Timeline | Latest Social Media News | Scoop.it
So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the new year has begun with an intense activity by Cyber Crooks. Hacktivists and Cyber C...

Via Gust MEES
Gust MEES's curator insight, January 18, 2013 1:42 PM

A LOT from Education in there, about time to learn the basics of Cyber-Security ;)

 

Check ALSO:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

Rescooped by Gerrit Bes from Free Tutorials in EN, FR, DE
Scoop.it!

Why should I uninstall older versions of Java from my system?

Why should I uninstall older versions of Java from my system? | Latest Social Media News | Scoop.it
Answers questions about removing older Java versions after installing a newer version and whether you need multiple versions of Java installed on your system.

Via Gust MEES
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Hacked Sites – An Open Door To Malwares

Hacked Sites – An Open Door To Malwares | Latest Social Media News | Scoop.it

Compromised websites have been an attractive target for cyber-criminals. These websites distribute different malwares designed to steal valuable information from the victim’s machine. McAfee has recently encountered a compromised website which distributes malicious .jar file and Fake AV.

 


Via Gust MEES
Gust MEES's curator insight, December 24, 2012 2:55 PM

 

As with e-Learning, m-Learning and BYOD (Bring Your Own Device) every one is visiting websites, so this should be of interest to anyone! Especially Education, Teachers, Educators, Instructors, Professors SHOULD be aware of this and accept the fact that Learning and Teaching basics of Cyber-Security in 21st Century is a MUST!

 

                 ===> Be AWARE of the MALWARE! <===


Check also my other FREE courses here:


-http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Latest Social Media News | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Macs hit by new wave of money-stealing malware 

Macs hit by new wave of money-stealing malware  | Latest Social Media News | Scoop.it
Apple users who think they're immune to malware and other bugs need to pay attention: A new Trojan is infecting Apple computers in order to obtain victims' phone numbers and rob them via unexpected premium SMS charges.

The Trojan, which masks itself as downloadable software, presents victims with a legitimate-looking installation wizard that asks for their phone number in order to verify or authenticate the install.

Read more:
http://www.nbcnews.com/technology/technolog/macs-hit-new-wave-money-stealing-malware-1C7563684

Via Gust MEES
Gust MEES's curator insight, December 13, 2012 2:52 PM

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity

Rescooped by Gerrit Bes from Free Tutorials in EN, FR, DE
Scoop.it!

Official Google Webmaster Central Blog: Helping Webmasters with Hacked Sites

Official Google Webmaster Central Blog: Helping Webmasters with Hacked Sites | Latest Social Media News | Scoop.it

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day | Latest Social Media News | Scoop.it

Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012.

 

===> The report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. <===

 

Overall, Kaspersky Lab detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

 

At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.

 

===> Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. <===

 

This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2352

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Clueless officials hamper cybersecurity law-making

Clueless officials hamper cybersecurity law-making | Latest Social Media News | Scoop.it
Governments need to know what problems the cybersecurity legislation is meant to address, or they will face public backlash over the possible intrusions to their personal rights.

 

Read more, a MUST:

http://www.zdnet.com/clueless-officials-hamper-cybersecurity-law-making-7000008140/?s_cid=e550

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Kill the Password: Why a String of Characters Can't Protect Us Anymore

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Latest Social Media News | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you.

 

Thanks to an explosion of personal information being stored in the cloud, tricking customer service agents into resetting passwords has never been easier.

 

===> All a hacker has to do is use personal information that’s publicly available on one service to gain entry into another. <===

 

Big THANKS to my online friend Kevin 

https://twitter.com/kevin_corbett  for having shared this link with me

 

Read more, a MUST:

http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | Latest Social Media News | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Facebook shows its support for joint EU-US online safety declaration

Facebook shows its support for joint EU-US online safety declaration | Latest Social Media News | Scoop.it
Sheryl Sandberg confirms Facebook's commitment to keeping people safe online with support for the joint declaration today between the European Commission and US Department of Homeland Security.

 

=============================================

 

Gust MEES

 

Check out ALSO 

 

My curation about "World efforts for a more secure Internet":

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Worldwide+efforts+4+more+secure+Internet

 

=============================================

 

Read more:

http://www.zdnet.com/facebook-shows-its-support-for-joint-eu-us-online-safety-declaration-7000007664/

 


Via Gust MEES
No comment yet.