Education 2.0 & 3.0
148.6K views | +4 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab

QR Scanner | Starker Schutz vor gefälschten QR-Codes | Kaspersky Lab | Education 2.0 & 3.0 | Scoop.it
Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.

 


Via Gust MEES
Gust MEES's curator insight, January 30, 2015 5:39 PM

Scannen Sie QR-Codes überall von unterwegs aus und öffnen Sie Texte, Bilder, Websites etc. ohne Angst vor mobilen Bedrohungen. GRATIS.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity | Education 2.0 & 3.0 | Scoop.it

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.

 

Learn more:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 


Via Gust MEES
Gust MEES's curator insight, January 5, 2015 4:05 PM

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Wron Ga's curator insight, January 18, 2015 1:44 PM

Kolejna walka z przęklętymi reklamami, artykuł opisuje reklamy w aplikacjach które wykorzystuja wolne luki, mnie osobiście sie to nie podoba psuja cały wizerunek aplikacji i przeszkadza uzotkownikom w uzytkowaniu ich .

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Education 2.0 & 3.0 | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMG, AdaptiveMobile, Trend Micro, BAE Systems, WebSense, InfoSec Institute, Symantec, Kaspersky, Proofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff



Via Gust MEES
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...

 

Learn more:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 


Via Gust MEES
Gust MEES's curator insight, December 18, 2014 5:16 PM
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing

How hackers are stealing this Cyber Monday (Infographic) | CyberSecurity | Phishing | Education 2.0 & 3.0 | Scoop.it
Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.

Via Gust MEES
Gust MEES's curator insight, November 26, 2014 7:06 PM

Cyber Monday is a feeding frenzy for hackers looking to exploit businesses and consumers. Here's how to safeguard your sensitive information.


Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES, Dean J. Fusto
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | Education 2.0 & 3.0 | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .

 

Learn more:

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 11, 2014 6:13 PM

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security

Apple patches 144 security flaws across seven products | Nobody Is Perfect | Cyber Security | Education 2.0 & 3.0 | Scoop.it

Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???

 



Via Gust MEES
Gust MEES's curator insight, October 17, 2014 6:59 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Gust MEES's curator insight, October 17, 2014 7:08 PM
Patches are released for Mavericks, Mountain Lion, OS X Server and iTunes. A fix for the POODLE bug is included where appropriate. Most of the bugs are old ones in iTunes.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



And NOBODY talks about it!!! Are THEY ALL on NAIVETY status!!!???


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

10 ans de cybersécurité en Europe ! | Cyber Security

10 ans de cybersécurité en Europe ! | Cyber Security | Education 2.0 & 3.0 | Scoop.it
Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.
 
Le Luxembourg est en effet l’un des pays pilotes en Europe quant à la sensibilisation du grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE-SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par "Security made in Lëtzebuerg" (SMILE), le groupement d’intérêt économique qui a été mandaté en 2010 par le ministère de l’Economie pour renforcer la sécurité de l’information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.
 
La table ronde a rassemblé des experts de l’industrie, comme Microsoft et Intel, ainsi que des représentants du "EU Code week ", "EU Kids online ", et de la "Grande coalition pour l’emploi numérique".

 

Learn more:

 

- http://www.cases.lu

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA

 

 


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 10:34 AM

Le Luxembourg, pays pilote pour l'implication du citoyen
L'implication des citoyens dans la construction un cyber espace de confianceétait au cœur du débat mené par François Thill (photo), responsable de CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg.


Learn more:


http://www.cases.lu


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENISA





Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

[Update] Hundreds of Dropbox passwords leaked online but Dropbox denies it was hacked

[Update] Hundreds of Dropbox passwords leaked online but Dropbox denies it was hacked | Education 2.0 & 3.0 | Scoop.it

A thread surfaced on Reddit today that contained links to files containing hundreds of usernames and passwords for Dropbox accounts in plain text, but it’s unclear where they were obtained from.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Dropbox

 


Via Gust MEES
Gust MEES's curator insight, October 14, 2014 2:26 AM

A thread surfaced on Reddit today that contained links to files containing hundreds of usernames and passwords for Dropbox accounts in plain text, but it’s unclear where they were obtained from.


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Dropbox


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Revealing The Awesome Truth About Hackers

Revealing The Awesome Truth About Hackers | Education 2.0 & 3.0 | Scoop.it
Norse offers proactive security solutions, based on our global "dark intelligence" platform, to defend against today's advanced threats.

 

A MUST READ!



Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Same Security Threats, Different Devices: Wearables and Watchables

Same Security Threats, Different Devices: Wearables and Watchables | Education 2.0 & 3.0 | Scoop.it
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

 

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/




Via Gust MEES
Rescooped by Yashy Tohsaku from Linking Literacy & Learning: Research, Reflection, and Practice
Scoop.it!

How can WE create a BETTER internet together!? | Infographic

How can WE create a BETTER internet together!? | Infographic | Education 2.0 & 3.0 | Scoop.it

Learn more:

 

https://gustmees.wordpress.com/2015/01/06/sid2015-safer-internet-day-2015-participation/

 

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES, Dean J. Fusto
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT | Education 2.0 & 3.0 | Scoop.it

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Via Gust MEES
Gust MEES's curator insight, December 30, 2014 3:33 PM

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Why You Need Antivirus Software

Why You Need Antivirus Software | Education 2.0 & 3.0 | Scoop.it
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.

 

Learn more:

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 


Via Gust MEES
Gust MEES's curator insight, December 21, 2014 4:15 PM
Trojans, botnets, ransomware, rootkits—antivirus utilities protect against all kinds of malware, not just viruses. You really, really need antivirus protection.


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Wron Ga's curator insight, January 18, 2015 1:54 PM

Trojany, botnety, ransomware, narzędzia rootkity-antywirusowe chronią przed wszystkimi rodzajami zagrożeń, nie tylko wirusy. Naprawdę  potrzebują ochrony antywirusowej

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity

Cyber Threats Timeline 2014 | LEARNing basics of CyberSecurity | Education 2.0 & 3.0 | Scoop.it
A LOOK BACK AT 25 CYBER THREATS 

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 


Via Gust MEES
Gust MEES's curator insight, December 17, 2014 1:27 PM
A LOOK BACK AT 25 CYBER THREATS

The constantly evolving threat landscape seems to produce obstacles on a daily basis for security professionals. Having covered a slew of these nasty pieces of malware over our 25 years in the industry, we decided to take a look back at some of the most prominent headline-grabbing cyber threats in this interactive timeline.

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Via Gust MEES
Gust MEES's curator insight, November 17, 2014 9:30 AM

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Education 2.0 & 3.0 | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills

Nearly 50% have been a victim of a data breach | Cyber Security | eSkills | Education 2.0 & 3.0 | Scoop.it
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.

 

===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 4, 2014 9:36 AM
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security.


===> IMPORTANT: Passwords MUST get changed any 3 months!!! <===


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam

The "Dirty Dozen" SPAMPIONSHIP - Q3/2014 | Who's got the biggest zombie problem? | Spam | Education 2.0 & 3.0 | Scoop.it

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:

 

https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/

 

http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/

 


Via Gust MEES
Gust MEES's curator insight, October 29, 2014 5:03 PM

Our latest quarterly SPAMPIONSHIP charts are out, showing which countries have the most zombies, and therefore send the most spam.

Take a look, and then ask yourself, "What can I do to help?"

Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.

 

http://grahamcluley.com/2014/10/poodle-b..

.


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 5:46 PM
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The Human Side of IT Security [PDF]


Via Gust MEES
Gust MEES's curator insight, October 14, 2014 4:39 PM

The Human Side of IT Security [PDF]


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

What is Browser Hijacking? | Cyber Security

What is Browser Hijacking? | Cyber Security | Education 2.0 & 3.0 | Scoop.it

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/

 


Via Gust MEES
Gust MEES's curator insight, October 13, 2014 9:41 AM

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, Internet Explorer) settings are modified…


Learn more:


http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


http://gustmees.wordpress.com/2014/02/05/help-my-pc-is-infected-with-adware-toolbars-and-potentially-unwanted-programs-pups/


Roger Smith's curator insight, October 13, 2014 7:03 PM

Another sneaky way that the bad guys get ya!

mbeva's curator insight, October 14, 2014 7:21 AM

hack!!!!

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit"

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit" | Education 2.0 & 3.0 | Scoop.it
Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.

Via Gust MEES
Gust MEES's curator insight, September 18, 2014 9:58 AM

Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.