Education 2.0 & 3.0
148.5K views | +0 today
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from AI for All
Scoop.it!

Hackers are using AI for phishing

Hackers are using AI for phishing | Education 2.0 & 3.0 | Scoop.it

"A new study by Microsoft shows that hackers are warming up to AI and using the technology to deploy their attacks ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Beyond Phishing: Experts Predict The Cybercrime Of 2015

Beyond Phishing: Experts Predict The Cybercrime Of 2015 | Education 2.0 & 3.0 | Scoop.it

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMG, AdaptiveMobile, Trend Micro, BAE Systems, WebSense, InfoSec Institute, Symantec, Kaspersky, Proofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff



Via Gust MEES
Gust MEES's curator insight, December 26, 2014 9:14 PM

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.


Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefenderKPMGAdaptiveMobileTrend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKasperskyProofpoint and Sophos. The links lead to their full predictions.


Read more: http://uk.businessinsider.com/beyond-phishing-experts-predict-the-cybercrime-of-2015-2014-12?utm_content=bufferbd004&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer?r=US#ixzz3N3npIVff


Wron Ga's curator insight, January 18, 2015 1:51 PM

Płacenie telefonem staje sie coraz bardziej popularne, lecz jeednak wiekszosc ludzi nie ufa tej formie płatnosci. Ja osobiscie jej ufam i ja wspieram ponieważ jest to wygodniejsze

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cyber Security Education: Remove The Limits

Cyber Security Education: Remove The Limits | Education 2.0 & 3.0 | Scoop.it
Low-level technical and high-level strategic education must come together to achieve cyber security goals.

 

Learn more:

 

http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Why you’re not as secure as you think you are

Why you’re not as secure as you think you are | Education 2.0 & 3.0 | Scoop.it
There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time and time again, we see these companies fail to effectively protect sensitive customer data.

 

Learn more:

 

http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | Education 2.0 & 3.0 | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Via Gust MEES
Gust MEES's curator insight, September 2, 2014 11:32 AM

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | Education 2.0 & 3.0 | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 


Via Gust MEES
Gust MEES's curator insight, October 24, 2017 11:13 AM
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security

How Can Education Help To Lower Cybercrime? | eSkills | Cyber Security | Education 2.0 & 3.0 | Scoop.it

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .

 

Learn more:

 

http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES
Gust MEES's curator insight, November 11, 2014 6:13 PM

How Can Education Help To Lower Cybercrime? A GOOD "Digital Citizen" knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== .


Learn more:


http://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cyber Security Education: Remove The Limits

Cyber Security Education: Remove The Limits | Education 2.0 & 3.0 | Scoop.it
Low-level technical and high-level strategic education must come together to achieve cyber security goals.

 

Learn more:

 

http://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen | Education 2.0 & 3.0 | Scoop.it
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 


Via Gust MEES
Gust MEES's curator insight, September 2, 2014 11:39 AM
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Twitter Chat | The Economic Impact Of Cybercrime

Twitter Chat | The Economic Impact Of Cybercrime | Education 2.0 & 3.0 | Scoop.it
.   . Twitter Chat | The Economic Impact Of Cybercrime .   On Thursday, September 4th there will be #SecChat who will explore the  The Economic Impact Of Cybercrime and is an hour-long Tw...

 

Join as ===> lurkers <=== to learn from the experts!

 

Learn more:

 

http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/

 


Via Gust MEES