Latest Social Media News
112.8K views | +0 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Latest Social Media News | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Jacksbot Java malware can take control of Windows, Mac, and Linux systems

Jacksbot Java malware can take control of Windows, Mac, and Linux systems | Latest Social Media News | Scoop.it

Two weeks ago, Mac security software company Intego discovered malware which it classified as "a new Java backdoor trojan called Java/Jacksbot.A.” New threats are discovered all the time, but Intego later concluded that even though Jacksbot is a variant of the Java remote access tool (RAT) created by the jailbreaking group Redpois0n, it can target multiple platforms.

 

The malware writers behind JACKSBOT may just be testing the waters for a successful multiplatform malware; however for now they appear to be unwilling to invest the time and resources to develop the code more completely.

 

===> It’s likely that the authors will continue to improve the code to fully support infection for OS X and Linux. <===

 

Read more, a MUST:

http://thenextweb.com/2012/10/31/jacksbot-java-malware-can-take-control-of-windows-mac-and-linux-systems/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

F-Secure keeps your apps, plugins and OS up-to-date

F-Secure keeps your apps, plugins and OS up-to-date | Latest Social Media News | Scoop.it

F-Secure has introduced Software Updater http://www.f-secure.com/en/web/business_global/software-updater which offers patch management as a business security feature.

 

===> Over 80% of the top 10 malware detected by F-Secure Labs are targeted against software weaknesses. <===

 

Known as vulnerability exploits and most commonly affecting unpatched software, these attacks threaten the data security of companies.

 

============================================

 

Gust MEES

 

Read also my FREE course about "Third Party Applications":

 

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

============================================

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=13862

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Mobile Phone Safety For Kids

Mobile Phone Safety For Kids | Latest Social Media News | Scoop.it

We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/06/mobile-phone-safety-for-kids/

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Monitor the Bluetooth activity around you

Monitor the Bluetooth activity around you | Latest Social Media News | Scoop.it
Utility for Windows that monitors the activity of Bluetooth devices around you.

 

BluetoothView is a small utility that runs in the background, and monitor the activity of Bluetooth devices around you. For each detected Bluetooth device, it displays the following information: Device Name, Bluetooth Address, Major Device Type, Minor Device Type, First Detection Time, Last Detection Time, and more.
BluetoothView can also notify you when a new Bluetooth device is detected, by displaying a balloon in your taskbar or by playing a small beep sound.

 

Read more:

http://www.nirsoft.net/utils/bluetooth_viewer.html

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Sophos Mobile Security - Applications Android Google Play

Sophos Mobile Security - Applications Android Google Play | Latest Social Media News | Scoop.it
Free anti-virus for your Android devices Sophos Mobile Security is a lightweight app which protects your Android device without reducing performance or battery life. U...

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Encryption on your HD: How to Break Into a Windows PC, easy without...

Encryption on your HD: How to Break Into a Windows PC, easy without... | Latest Social Media News | Scoop.it
If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinster plan—you have quite a few options.

 

Gust MEES: Encryption of your HD is a MUST!

 

Read more why...:

http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Cybercriminals Increasingly Attacking University Networks

Cybercriminals Increasingly Attacking University Networks | Latest Social Media News | Scoop.it
Universities face unique challenges keeping their servers and networks secure from cyber-criminals while accommodating the influx of student and faculty-owned devices each year. A recent analysis of online transaction data highlighted to what extent some universities have already been compromised.

 

ThreatMetrix, a provider of anti-cybercrime prevention solutions, found that cyber-criminals had already infiltrated networks belonging to major educational institutions including New York University, George Mason University, Harvard University, Purdue University, and University of California in Irvine, Alisdair Faulkner, chief product officer at ThreatMetrix, told SecurityWeek.

 

ThreatMextrix looked at all the data collected by its systems in September and filtered out only IP addresses that corresponded to university networks for this analysis, Faulkner said.

 

Read more, a MUST:

http://www.securityweek.com/cybercriminals-increasingly-attacking-university-networks?utm_source=feedburner&amp;amp;amp;utm_medium=feed&amp;amp;amp;utm_campaign=Feed:+Securityweek+(SecurityWeek+RSS+Feed)&amp;amp;amp;utm_content=Google+Reader

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac-focused malware is big and getting bigger

Mac-focused malware is big and getting bigger | Latest Social Media News | Scoop.it
Despite the Mac reputation as being more secure because of Apple’s tight control over its vertically integrated ecosystem, Mac-specific malware and advanced persistent attacks (APTs) against human rights groups is on the rise, cautions Citizen Lab...

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28671/macfocused-malware-is-big-and-getting-bigger/?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Risk Calculator | Facebook

Risk Calculator | Facebook | Latest Social Media News | Scoop.it

RSA, The Security Division of EMC, Bedford

 

What's YOUR Identity Risk Score? Take the TEST: ONLINE IDENTITY RISK CALCULATOR


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

E-Safety – the role for educators

E-Safety – the role for educators | Latest Social Media News | Scoop.it

The Network Information Security in Education, 2012 report by the European Network and Information Security Agency outlines the role educators can play in teaching positive and responsible online behaviour to students.

 

The report stresses the importance of not making assumptions about children’s knowledge on e-Safety issues due to the many misconceptions which exist about appropriate use of the Internet. Issues which educators are likely to be aware of, such as keeping passwords secure and not downloading copyright material, may be viewed quite differently by students. Many teenagers share passwords with each other as a sign of true friendship and many see internet content as public property and download music, videos and images without a thought of the legal issues of copyright.

 

The report sets out ways educators can help children use technology wisely and safely:

 


Via Gust MEES
Gianfranco D'Aversa's comment September 26, 2012 9:38 AM
Ok Gust. I'm sorry for the mistake :(
Gust MEES's comment, September 26, 2012 12:18 PM
Hi Gianfranco, no problem. It happens also sometimes to me, don't worry ;) When I make a typo error I am always happy when somebody else reports it to me... Have a great day :)
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Cyber attacks “one of the most serious” threats facing the US

Cyber attacks “one of the most serious” threats facing the US | Latest Social Media News | Scoop.it
The need for immediate action on a more cohesive and updated cybersecurity strategy was the message imparted by US Secretary of Homeland Security, Janet Napolitano, during her opening keynote address at this week’s ASIS/(ISC)⊃2; Congress 2012 in...

 

Read more:

http://www.infosecurity-magazine.com/view/28145/cyber-attacks-one-of-the-most-serious-threats-facing-the-us-says-janet-napolitano/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple Patches Kernel, Passcode Lock and WebKit Flaws in iOS 6.0.1

Apple Patches Kernel, Passcode Lock and WebKit Flaws in iOS 6.0.1 | Latest Social Media News | Scoop.it
Apple released its first security updates to iOS 6. Version 6.0.1 includes patches for critical vulnerabilities in the operating system kernel, Passcode Lock and WebKit.

 

Read more:

http://threatpost.com/en_us/blogs/apple-patches-kernel-passcode-lock-and-webkit-flaws-ios-601-110212

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Online Safety Posters ¦ Stop Think Connect

Online Safety Posters ¦ Stop Think Connect | Latest Social Media News | Scoop.it

These posters are a great way to raise awareness about good online safety habits and tips.

 

Our 10 posters offer helpful reminders about everything from keeping a long, strong password to making sure your software is up-to-date.

 

We encourage you to download them, print them out and post them in your home, office, classroom community centers or religious establishments to get the word out!

 

You can download the posters by clicking on a thumbnail image below or in our Resource Center.

 

=============================================

 

Gust MEES

 

Check out also my FREE courses:

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

=============================================

 

Read more, a MUST:

http://stopthinkconnect.org/campaigns/details/?id=76

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Facebook investigates data leak from 1 million accounts

Facebook investigates data leak from 1 million accounts | Latest Social Media News | Scoop.it
Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was offered for sale for $5.

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=13870

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Keep a Clean Machine ¦ Stop Think Connect

Keep a Clean Machine ¦ Stop Think Connect | Latest Social Media News | Scoop.it

Keeping your Internet-connected devices free from malware and infections makes the Internet safer for you and more secure for everyone.

 

The STOP. THINK. CONNECT. Keep a Clean Machine Campaign is an effort to help computer users keep their machines free from malware - especially malware that connects their computers with botnets.

 

=======================================

 

Gust MEES

 

Read also my FREE courses:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

======================================

 

Read more, a MUST:

http://stopthinkconnect.org/campaigns/keep-a-clean-machine/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Mobile Devices: The Gateway for Hackers to Your Digital Identity

Mobile Devices: The Gateway for Hackers to Your Digital Identity | Latest Social Media News | Scoop.it

While it is widely understood that mobile devices are more than just phones – they are a lifeline to the outside world, entertainment platform, GPS system, little black book and a shopping and banking tool – it’s lesser known that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone.


Hackers can use your mobile device as an access point to data that have historically been exclusively stored to your laptop or desktop, such as social network and bank accounts. One of the most harmful (and popular) mobile threats has to do with apps. Installing apps from unknown or untrusted sources like apps outside the official Google Play Market could allow hackers to steal sensitive and private information stored on your mobile device including passwords, photos, contacts and location data.

 

=============================================

 

Gust MEES

 

Critical Thinking: "While it is widely understood that mobile devices are more than just phones", really!?? Most people still think that it is ONLY a phone, but in reality it is a mini computer with phone capabilities! And any computer is vulnerable and at risk!!!

 

Check out also:

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Especially check the video under this topic "Ever thought about that your smartphone is also a computer with phone capabilities?" to understand!

 

=============================================

 

Read more, a MUST:

http://blogs.mcafee.com/consumer/mobile-devices-the-gateway-for-hackers-to-your-digital-identity?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Staying Safe Online | The White House

Staying Safe Online | The White House | Latest Social Media News | Scoop.it
The White House Cybersecurity Coordinator joined leaders to discuss the importance of National Cyber Security Awareness month, and offers some basic steps to be more secure at home.

 

Read more, a MUST:

http://www.whitehouse.gov/blog/2012/10/15/staying-safe-online

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Aanval ® - Snort, Suricata and Syslog Intrusion Detection, Correlation and Threat Management

Aanval ® - Snort, Suricata and Syslog Intrusion Detection, Correlation and Threat Management | Latest Social Media News | Scoop.it
Information Security Vulnerability and Risk Management Solutions - Snort and Syslog Intrusion Detection, Correlation and Management Console...

 

Read more:

http://www.aanval.com/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Trend Micro introduces defense against targeted attacks

Trend Micro introduces defense against targeted attacks | Latest Social Media News | Scoop.it
Trend Micro is introducing Custom Defense – an advanced threat protection solution that enables businesses and government agencies not only to detect and analyze APTs and targeted attacks, but also to adapt their protection and respond to these attacks.

 

Read more:

http://www.net-security.org/secworld.php?id=13744

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Searching for images on Bing? Beware malicious Blackhat SEO poisoning

Searching for images on Bing? Beware malicious Blackhat SEO poisoning | Latest Social Media News | Scoop.it
Trust your search engine results? Read how image searches within Bing are being poisoned by attackers in order to drive web traffic to malicious sites.

 

Gust MEES

 

BTW: Never use a search engine (which ever one) without having installed special programs on your computer who give YOU advice if a website and/or image is trustful and/or infected!

 

Please read my FREE courses about basic IT-Security where YOu will find also these FREE programs which install in less than 5 minutes, YOU should to get best protection:

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

How You Can Get Involved in National Cyber Security Awareness Month

How You Can Get Involved in National Cyber Security Awareness Month | Latest Social Media News | Scoop.it
Microsoft On the Issues is the Microsoft blog on technology policy and corporate affairs.

 

If each of us does our part—implementing stronger security practices, raising community awareness, educating young people to become good digital citizens and training employees—together we will be a more resilient and safer digital society.

Creating a safer and more secure Internet begins with STOP. THINK. CONNECT.

 

Take security measures, understand the potential consequences of your actions and behaviors and enjoy the benefits of the Internet. It also means:

 

· Keeping a Clean Machine and making sure your devices are malware- free and have updated software, Web browsers and operating systems.

 

· Owning Your Online Presence by setting security and privacy settings on websites to your comfort level for information sharing.

 

· Throwing Out Suspicious Links in emails, advertisements, social media posts and other communications.

 

· Being a Good Digital Citizen and posting only about others as you would have them post about you.

 

Getting involved in National Cyber Security Awareness Month is easy – even if you only have five minutes to spare. Here are some ways you can make a difference this National Cyber Security Awareness Month:

 

Read more:

http://blogs.technet.com/b/microsoft_on_the_issues/archive/2012/10/02/how-you-can-get-involved-in-national-cyber-security-awareness-month.aspx

 

Gust MEES (14 years of basic IT-Security praxis)

 

Check out also my FREE courses about basic IT-Security:

 

- https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Trend Micro: Is this website safe? Check it before sharing!

Trend Micro: Is this website safe? Check it before sharing! | Latest Social Media News | Scoop.it

Site Safety Center

 

Gust MEES: In a world where nearly everything is getting shared it is very important to make sure that the shared websites (URL's) are safe! But how to know this?

 

Teachers as also learners share websites, so basics of IT-Security (not ONLY Internetsafety) are a MUST in Education!

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis. If you need to check a lot of URLs, please contact Trend Micro for help.

 

Try it out, YOU should...:

http://global.sitesafety.trendmicro.com/

 

Check out also my FREE courses about basic IT-Security:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Gust MEES
No comment yet.