Latest Social Media News
112.8K views | +0 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Heartbleed Detector - Android Apps on Google Play

Heartbleed Detector - Android Apps on Google Play | Latest Social Media News | Scoop.it

Trend Micro Heartbleed Detector scans your ANDROID mobile device for possible risk and helps you stay away from the Heartbleed bug.What does Heartbleed Detector check on yo...


Via Gust MEES
Gust MEES's curator insight, April 17, 2014 9:08 AM

Trend Micro Heartbleed Detector scans your ANDROID mobile device for possible risk and helps you stay away from the Heartbleed bug.



Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

F-Secure App Permissions - Applications Android sur Google Play

F-Secure App Permissions - Applications Android sur Google Play | Latest Social Media News | Scoop.it
Why Does This App Need So Many Permissions? No Need To Wonder Anymore - Install F-Secure App Permissions! One app to reveal them all.

App Permissions is an ...

Via Gust MEES
Gust MEES's curator insight, November 1, 2013 8:47 AM

 

For Android devices...

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | Latest Social Media News | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 


Via Gust MEES
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's iOS 7 Update Fixes 80 Security Bugs

Apple's iOS 7 Update Fixes 80 Security Bugs | Latest Social Media News | Scoop.it
Yesterday's iOS 7 update brought a slew of bug fixes, 80 in total, to Apple devices.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Latest Social Media News | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Latest Social Media News | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Protect Android devices from theft and malware

Protect Android devices from theft and malware | Latest Social Media News | Scoop.it
The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses.


Remotely...

Via Gust MEES
Gust MEES's curator insight, July 2, 2013 7:51 AM

 

The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses. The "Lite Version" is FREE!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

 

Gust MEES's curator insight, July 2, 2013 7:56 AM

 

The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses. The "Lite Version" is FREE!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | Latest Social Media News | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.

 

So why is this important? It highlights the reality of the threat landscape.

 

The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.

 

 

 

 

 


Via Gust MEES
Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses | Latest Social Media News | Scoop.it
Security firm Cenzic said it found serious mobile application vulnerabilities, such as dangerous Web service errors, in an analysis of the mobile apps it reviewed in 2012.

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 


Via Gust MEES
Gust MEES's curator insight, March 7, 2013 5:49 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's curator insight, March 7, 2013 5:52 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

The Executive's Guide to BYOD and the Consumerization of IT (free ebook)

The Executive's Guide to BYOD and the Consumerization of IT (free ebook) | Latest Social Media News | Scoop.it
The 'bring your own device' phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. This ebook rounds up our best BYOD content and puts it all into a convenient PDF.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | Latest Social Media News | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Latest Social Media News | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

iPhone 4S Falls at Hacker Contest; New iPhone 5 Vulnerable to Same Exploit

iPhone 4S Falls at Hacker Contest; New iPhone 5 Vulnerable to Same Exploit | Latest Social Media News | Scoop.it
Two Dutch researchers successfully hacked a patched iPhone 4S, exploit a vulnerability also likely present in the new iPhone 5 due to be released tomorrow.

 

Joost Pol and Daan Keuper won the mobile Pwn2Own contest yesterday at EUSecWest event in Amsterdam by compromising a fully patched iPhone 4S device and stealing contacts, browsing history, photos and videos from the phone.

 

The pair was able to build an exploit for a vulnerability in WebKit to beat Apple's code-signing features and the MobileSafari sandbox. The same bug is present in the iOS6 Golden Master development code base, meaning iPhone 5 is vulnerable to the same exploit. Apple iPads and iPod Touch devices are also vulnerable, Pol and Keuper said, adding that it took them three weeks find the flaw and write an exploit.

 

Read more, a MUST:

http://threatpost.com/en_us/blogs/iphone-4s-falls-hacker-contest-new-iphone-5-vulnerable-same-exploit-092012

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Android App Sells Your WhatsApp Conversations

Android App Sells Your WhatsApp Conversations | Latest Social Media News | Scoop.it
Mobile Threat Monday: Android App Uploads Your WhatsApp Conversations Online

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free! | Latest Social Media News | Scoop.it
Another iOS 7 lockscreen bypass has surfaced: this one lets you call anywhere in the world for free.

OK, not really "for free" - someone has to pay, and that's the owner, who probably assumed th...

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Latest Social Media News | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | Latest Social Media News | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 


Via Gust MEES
Gust MEES's curator insight, August 16, 2013 8:37 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Latest Social Media News | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | Latest Social Media News | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.

 


Via Gust MEES
Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

   Clueful   -   Privacy Monitoring App for iPhone & Android

   Clueful   -   Privacy Monitoring App for iPhone & Android | Latest Social Media News | Scoop.it

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | Latest Social Media News | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...

Via Gust MEES
Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Gust MEES's curator insight, April 14, 2013 9:25 AM

 

Awareness and Protection!!!


Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | Latest Social Media News | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 


Via Gust MEES
Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile app downloads doubling, privacy & identity risks rise

Mobile app downloads doubling, privacy & identity risks rise | Latest Social Media News | Scoop.it
Mobile app downloads are doubling and the apps are getting “smarter”, but the cost to users may well be a threat to their privacy and the potential sh...

 

“While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.

 

According to Hoffman, more concerning is that many apps collect information or require permissions unnecessary for the described functionality of the app. He says this is not the first time this issue has surfaced, with reports of popular apps collecting irrelevant information or transmitting data when devices are turned off leading to significant backlash.

 

===========================================

 

Gust MEES

 

Check out also my curation:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

===========================================

 

Read more, a MUST:

http://www.itwire.com/it-industry-news/market/57270-mobile-app-downloads-doubling-privacy--identity-risks-rise

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Mobile Device Management, Mobile Application Management and Mobile Content Management Solutions for the Enterprise | AirWatch

Mobile Device Management, Mobile Application Management and Mobile Content Management Solutions for the Enterprise | AirWatch | Latest Social Media News | Scoop.it
AirWatch is the leader in enterprise-grade mobile device management, mobile application management and mobile content management solutions, designed to simplify mobility.

 

Read more:

http://www.air-watch.com/

 


Via Gust MEES
No comment yet.