Education 2.0 & 3.0
148.6K views | +4 today
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from TIC & Educación
Scoop.it!

¿Cuál es la diferencia entre spyware, adware, virus, gusano, y troyano?

¿Cuál es la diferencia entre spyware, adware, virus, gusano, y troyano? | Education 2.0 & 3.0 | Scoop.it
Muchos usuarios de Windows consideran que cuando el ordenador no les está funcionando de forma correcta es que se han visto infectados por un virus. Este nombre lo usan para describir cualquier tipo de mal comportamiento que se presente mientras se usa el sistema operativo. En muchos casos tampoco saben que existen varios tipos de infecciones: spyware, adware, gusanos o troyanos. Todos tienen sus propias características y afectan a la PC de manera distinta.

Via Gumersindo Fernández
No comment yet.
Rescooped by Yashy Tohsaku from TIC & Educación
Scoop.it!

Software Removal Tool elimina el malware de Google Chrome

Software Removal Tool elimina el malware de Google Chrome | Education 2.0 & 3.0 | Scoop.it
Esto lo saben bien en Google, y por esta razón han decidido lanzar su propia herramienta para remover software malicioso de Chrome. Todo lo que necesitas hacer es ir a esta dirección: https://www.google.com/chrome/srt/ y descargar la herramienta. Software removal tool aún está en fase de desarrollo beta y solo está disponible para Windows. Una herramienta para remover amenazas del navegador más usado del mundo en el sistema operativo más usado del mundo, aceptable.

Via Gumersindo Fernández
No comment yet.
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Hackers target Apple Mac OS X with 25 malware variants

Hackers target Apple Mac OS X with 25 malware variants | Education 2.0 & 3.0 | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 


Via Gust MEES
Gust MEES's curator insight, September 9, 2014 10:12 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 2014 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | Education 2.0 & 3.0 | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Via Gust MEES
Gust MEES's curator insight, September 2, 2014 11:32 AM

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Symantec intelligence Report October 2014 | MobileSecurity | CyberSecurity | eSkills

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Via Gust MEES
Gust MEES's curator insight, November 17, 2014 9:30 AM

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Rescooped by Yashy Tohsaku from TIC & Educación
Scoop.it!

Aprende a identificar correos electrónicos maliciosos

Aprende a identificar correos electrónicos maliciosos | Education 2.0 & 3.0 | Scoop.it

¿A quién de nosotros no le ha llegado a su cuenta de correo electrónico un correo con publicidad no deseada, con un mensaje de “nuestro banco” pidiéndonos que hagamos clic en un enlace o con un mensaje que nos pide que reenviemos ese correo a 30 personas...


Via Gumersindo Fernández
No comment yet.
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

H1 2014 Threat Report - F-Secure [Infographic]

H1 2014 Threat Report - F-Secure [Infographic] | Education 2.0 & 3.0 | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.

Via Gust MEES
Gust MEES's curator insight, September 8, 2014 9:34 AM

F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.