Education 2.0 & 3.0
148.6K views | +1 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The 9 Elements of Digital Citizenship | Infographic | eSkills | ICT | EDUcation

The 9 Elements of Digital Citizenship | Infographic | eSkills | ICT | EDUcation | Education 2.0 & 3.0 | Scoop.it

With the wide variety of resources available for teachers, there’s no reason we shouldn’t be promoting the importance of behaving safely and responsibly in the digital world. Speaking of resources, check out the nifty infographic shown, one that can be used to address various aspects of digital citizenship.


Learn more:


https://gustmees.wordpress.com


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/



Via Gust MEES
hamidreza's curator insight, May 11, 2015 9:37 AM
http://www.persianplastco.com/Default.aspx?lang=fa&page=203&paggenumber=203
Barbara mayo's curator insight, May 11, 2015 11:44 AM

Strength: the design is very creative

Weakness: I don't understand why they represent Spider-Man in this. Also the words are very jammed packed, causing this to look clustered. 

Francine White's curator insight, May 12, 2015 11:26 AM

Positive: cool topic

negative: a little jumbled & not well organized

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab | Education 2.0 & 3.0 | Scoop.it
Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.

 


Via Gust MEES
Gust MEES's curator insight, January 30, 2015 5:39 PM

Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.


Rescooped by Yashy Tohsaku from Learning & Mind & Brain
Scoop.it!

10 Steps To CyberSecurity | Infographic [pdf]

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 


Via Gust MEES, Miloš Bajčetić
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

8 cybersecurity promises you should make to yourself for this year

8 cybersecurity promises you should make to yourself for this year | Education 2.0 & 3.0 | Scoop.it
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 

 


Via Gust MEES
Gust MEES's curator insight, January 2, 2015 12:43 PM
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Wron Ga's curator insight, January 18, 2015 1:48 PM

Artykuł ukazuje listę obietnic aby czuć się bezpiecznie w internecie online jak i zaróno offline

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Education 2.0 & 3.0 | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMG, AdaptiveMobile, Trend Micro, BAE Systems, WebSense, InfoSec Institute, Symantec, Kaspersky, Proofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff



Via Gust MEES
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...

 

Learn more:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 


Via Gust MEES
Gust MEES's curator insight, December 18, 2014 5:16 PM
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing | Education 2.0 & 3.0 | Scoop.it
Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.

Via Gust MEES
Gust MEES's curator insight, November 26, 2014 7:06 PM

Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Via Gust MEES
Gust MEES's curator insight, November 17, 2014 9:30 AM

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills | Education 2.0 & 3.0 | Scoop.it
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.

 

===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 4, 2014 9:36 AM
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.


===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security | Education 2.0 & 3.0 | Scoop.it

Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???

 



Via Gust MEES
Gust MEES's curator insight, October 17, 2014 6:59 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Gust MEES's curator insight, October 17, 2014 7:08 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

10 ans de cybersécurité en Europe ! | Cyber Security

10 ans de cybersécurité en Europe ! | Cyber Security | Education 2.0 & 3.0 | Scoop.it
Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.
 
Le Luxembourg est en effet l’un des pays pilotes en Europe quant à la sensibilisation du grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE-SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par "Security made in Lëtzebuerg" (SMILE), le groupement d’intérêt économique qui a été mandaté en 2010 par le ministère de l’Economie pour renforcer la sécurité de l’information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.
 
La table ronde a rassemblé des experts de l’industrie, comme Microsoft et Intel, ainsi que des représentants du "EU Code week ", "EU Kids online ", et de la "Grande coalition pour l’emploi numérique".

 

Learn more:

 

- http://www.cases.lu

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA

 

 


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 10:34 AM

Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.


Learn more:


http://www.cases.lu


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA





Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship | Education 2.0 & 3.0 | Scoop.it
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.

 

To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.

 


Via Gust MEES
Gust MEES's curator insight, April 7, 2015 4:13 PM
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.


Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
Scoop.it!

How can WE create a BETTER internet together!? | Infographic

How can WE create a BETTER internet together!? | Infographic | Education 2.0 & 3.0 | Scoop.it

Learn more:

 

https://gustmees.wordpress.com/2015/01/06/sid2015-safer-internet-day-2015-participation/

 

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES, Dean J. Fusto
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity | Education 2.0 & 3.0 | Scoop.it

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.

 

Learn more:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 


Via Gust MEES
Gust MEES's curator insight, January 5, 2015 4:05 PM

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Wron Ga's curator insight, January 18, 2015 1:44 PM

Kolejna walka z przęklętymi reklamami, artykuł opisuje reklamy w aplikacjach które wykorzystuja wolne luki, mnie osobiście sie to nie podoba psuja cały wizerunek aplikacji i przeszkadza uzotkownikom w uzytkowaniu ich .

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT | Education 2.0 & 3.0 | Scoop.it

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Via Gust MEES
Gust MEES's curator insight, December 30, 2014 3:33 PM

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Why You Need Antivirus Software

Why You Need Antivirus Software | Education 2.0 & 3.0 | Scoop.it
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.

 

Learn more:

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 


Via Gust MEES
Gust MEES's curator insight, December 21, 2014 4:15 PM
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Wron Ga's curator insight, January 18, 2015 1:54 PM

Trojany, botnety, ransomware, narzędzia rootkity-antywirusowe chronią przed wszystkimi rodzajami zagrożeń, nie tylko wirusy. Naprawdę  potrzebują ochrony antywirusowej

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity | Education 2.0 & 3.0 | Scoop.it
A LOOK BACK AT 25 CYBER THREATS 

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 


Via Gust MEES
Gust MEES's curator insight, December 17, 2014 1:27 PM
A LOOK BACK AT 25 CYBER THREATS

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us | Education 2.0 & 3.0 | Scoop.it

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us WE can't say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility...


Via Gust MEES
Gust MEES's curator insight, November 19, 2014 4:11 PM

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us WE can't say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility...


Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES, Dean J. Fusto
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | Education 2.0 & 3.0 | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .

 

Learn more:

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 11, 2014 6:13 PM

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cybersecurity skills gap remains a societal challenge | Education | eSkills | eCitizen

Cybersecurity skills gap remains a societal challenge | Education | eSkills | eCitizen | Education 2.0 & 3.0 | Scoop.it
The muchpublicised cyber security skills gap is a societal challenge that must involve everyone from schools and universities to citizens.

 

Learn more:

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/page/2/

 

https://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/

 

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.

 

http://grahamcluley.com/2014/10/poodle-b..

.


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 5:46 PM
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.