RSS

Monthly Archives: March 2014

PracTICE: Learning To Learn-Example 1

PracTICE: Learning To Learn-Example 1

.

Evolution of Education: Wordle Logo.


LEARNing To LEARN, the PracTICE

programmerman2With ALL that mass of information which WE get on each day in OUR technology driven Digital World, with the messages from Social Media through OUR PLN (Personal [Professional] Learning Network), there is a MUST to organize OUR LEARNing! WE MUST unlearn the OLD and learn to learn differently as that was the case twenty years ago!

WE are lucky, Social Media has emerged a lot of different tools which WE can use to organize OUR learning and to have access to it in the cloud, no need to have the learning stuff with us. WE find everything ONLINE and WE can build OURSELVES learning space, ALSO! ALL we need to do is to tinkering a bit around with different tools and merge them together to build ONE tool from whom WE will profit to learn at our own pace!

I will present to YOU a way who makes it very easy to organize YOUR learning and ALSO to provide YOU the way how you can learn on a very effective and efficient way. WE will learn about curation, PKM and the use of ThingLink, that are the three components WE need. Through “Curation“, “Social Media” and a “PLN” WE are on ===> Collaboration <===, it’s NOT anymore the “ME”, BUT the “WE”!

As MOST is build around ===> Student Centered LEARNing <=== check below to learn more, please:

I intend to present different blog posts with different possibilities on ===> LEARNing To LEARN <===, this one is the first one of a series still to come…

Remember THAT in 21st Century EDUcation it is about ===> Student Centered EDUcation <===, Check below for more information:

.


Let’s Start With Curation, What Is Curation And How To Use It?

I will try to explain to YOU in one sentence WHAT ===> Curation is <===: it is doing a research on the internet by using YOUR ===> Critical THINKing <===, analyzing the found and making a selection of ONLY the BEST found which YOU annotate THEN with YOUR personal reflections and THEN share it with YOUR ===> PLN <===. This is BETTER than looking ONLY on research results from the major search engines as it is filtered by humans with THEIR insights! Check below, please, for the How-To.

.

 

Learn more:

 


What Is A PLN And How To Work With It?

Well, I will NOT talk too much about it, BUT will let YOU watch some videos and the image below. So YOU can make YOURSELVES your personal view about it 😉 BTW: I use my “PLN” for updating my ===> Professional Development <===, to make friendships, to connect globally, for coaching and for ===> Global Collaboration <===. PLN’s are MOSTLY created through ===> Social Media <===!

.

pln1-infographic

Click the image above, please, to access the article.

 

Check ALSO the videos below, please.

.

 

Personal Learning Networks for Educators

 

PLN how to build one!

 

What is a PLN

 

Importance of a PLN in Education

 

.

Learn more:

.


What is PKM?

PKM” means ===> Personal [Professional] Knowledge Management <===, it is THE way how people can (and SHOULD) OWN OUR knowledge, THE way on How-To organize OUR LEARNing. It isn’t actually that difficult as it seams;) It is ONLY THE habit to know How-To do it, so WHAT are YOU waiting for to adapt for a BETTER way of LEARNing, follow the steps below, please 😉

OURPKM” is depending MOSTLY from OUR “PLN” in the 21st Century as it is related to ===> Social Media <=== (Twitter, Facebook and…) because WE GET most information from THEM!

.

BEST-PKM

Click the image, please, to access the article.

.

Learn more:

 


What is ThingLink and how to use it?

Some PracTICE To Foster Creativity

programmerman-animatedThere are a multitude of tools which WE could use to foster the creativity of the learners, such as “Story Telling“, coding with Scratch and other programs, comics, and interactive images with links and videos such as “ThingLink“, which I will present here with some practical examples. Below my curation about ThingLink where YOU can first read about it for a better understanding:

.

First of all, please let me tell YOU this: to engage YOUR learners show THEM some practical examples and let THEM play around with them. THEY will have understood then what it is about and THEN YOU ask them to create THEMSELVES a new interactive image with ThingLink, a private one. One from where THEY will get some profit for THEIR private life; such as e.g. my vacation trip (preparation) such as I did here ===> Schwarzwald | Black Forest | Forêt Noire (DE) | Europe <===, my Garden (for nature lovers) as I did here ===> My Wild Garden | Panorama View With Localisation Of The Flowers <===, for people who playing sports competitions and/or visiting them, such as I did here ===> Darts-Clubs in Luxembourg | FLD-2013 <===, where is my favorite music band and/or singer playing its next concert?, creating its OWN “PKM” (Personal [Professional] Knowledge Management) and/or courses, such as I Did here ===> Skills needed in the 21st Century from Educators, Teachers <===, and here ===> Learning IT-Security <===, … Well, let YOUR imagination flow to find more examples, I am sure YOU will find a lot 😉 Let it GO, let it FLOW!

.


THE PracTICE, An Example

Check the screenshots below, please, how I announced a practical example on Twitter and follow it by ===> Deep Thinking <===!

.

Project Sustainability-1

 

.

Project Sustainability-2

.

Project Sustainability-3

.

In the above mentioned way of LEARNing (Project Based Learning), the students will learn about “Sustainability” while walking in the nature by using their smartphones to take photos and videos and/or are using a professional photo machine and will discover so the nature and the fauna and flora. They will learn how to take photos (golden rule / Goldener Schnitt), learning about gardening, learning to make online searching for the photographed flowers, animals, insects, learning to make curation of their search results, learning to create their own PKM (Personal [Professional] Knowledge Management), learning to love the nature and animals, learning to create Slideshows, learning to upload a video on Youtube, creating blogs…

.

.

.


Being Able To Use Different Techniques And Tools Combined To Express A Whole Entity Is “Learning To Learn” 

Please find below a reminder to understand what the world needs for abilities from students in 21st Century:

.

Synthesizing Mind-5 Minds for the future

.

By using the above mentioned techniques and advice, YOU will be able to understand WHAT ===> #LEARNing2LEARN <=== is and How-To forward it to YOUR learners (students). Through those learning techniques with #PracTICE and engagement THEY will be prepared for the 21st Century needed abilities from the workforce. THEY are ready NOW for ===> Life-Long-LEARNing <===. Here below an PracTICE example for LEARNing about ===> Digital CitizenShip <===.

 

PracTICE-21st-Century-Assessment-Flowchart-Page3-screenshot

Click the above image, please, to access the article.

 

.

Pedagogy comes first-2014

Click above image, please, to access the article.

.

.

Keywords necessary for me to create this blog post: Organization, curation,learning while curating, reading before and while curating, PKM, Personal Knowledge Management, ThingLink, Blog,

Stay tuned for next blog post(s) 😉

.

Advertisement
 

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

.

Evolution of Education: Wordle Logo.


ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

programmerman-animatedGovernment and Education MUST be digital illiterates when NOT accepting that it is time for TEACHing the basics of Cyber-Security! By reading the reports of experts from the professional companies from Cyber-Security protection software, one MUST accept the facts that Cyber-Crime is evolving at a very rapid rate! Cyber-criminals learned How-To trick the users and THEY are inventing every day NEW tricks to trick THEM (US ALL), BUT Education and ALSO the Government are NOT YET ready to counter such actions! 

WE have to ACCEPT that (that are facts!!!)  20% of all malware ever created appeared in 2013 and THAT there are 31.53 % infected computers worldwide!!! That MUST give people a kick for Deep-Thinking! In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Check article below, please:

Isn’t it time to introduce in Schools as a MAIN core ===> LEARNing the basics of Cyber-Security <=== as WE are ALL using computers and ===> BYOD <=== (Bring Your Own Device) and actually ALSO using Mobile-LEARNing and e-LEARNing!? WE can’t anymore bury the heads in the sand and NOT wanting to see the problems! THE reality is there and it can’t get fought ONLY by giving the IT-Admin of the school THAT responsibility, that is pure NONSENSE and a Middle Ages mentality, excuse-me, please!

==========> WE are ALL responsible for a secure internet! <==========

.


How Could This Be Realized And Up From Which Age?

programmerman-animatedI suggest to teachInternet-Safetyup from the age of 5 years old and the basics ofCyber-Security to the kids up from the early age, 8 years old! THEY would be able to understand how to get used to reflexes! These reflexes SHOULD get repeated once a week. I suggest the Friday as I started it ages ago already on Social-Media Twitter. It is called the ===> Friday Security Check Day <=== and the Hashtag for it is ===> #FSCD <=== SO, as it is under the age of the terms of use from Twitter, parents need to get involved as well to help THEIR kids to become GOOD “Digital Citizen” and by the same way the parents will learn also and with that COLLABORATION WE are on the winning side to make the internet a more secure place! Everybody will profit from it 😉

======> Safer Internet Day: Children need educating from age of 5, say campaigners <======

Read more:

.

 

Digital-Citizenship-infographic-620x965

Image credit ===> https://magic.piktochart.com/v/49853c8b-b418-406a-b979-0b240ca62352 <===

Check upper corner on right-hand side, there is “Digital Security” mentioned 😉 It should actually be ===> Cyber-Security <===

BUT anyway, it is THE BEST explication I ever have seen about “Digital Citizenship“!!!

 


SO… WHAT’S About Basic Cyber-Security Knowledge NOW As It Is Mentioned As Well!?

programmerman-animated.

That’s actually the easiest part of it, MOST of YOU think that it is the MOST difficult one, BUT it isn’t at ALL 😉 It’s ONLY based on reflexes and a one-time installation of software on YOUR computers (Smartphones included…).  Please check my following blog posts and YOU will see how easy it is:

 

Related articles, YOU might check as well for BETTER understanding (secret TIP):

.

==========> A Proactive-THINKing and Critical-THINKing will get created which is a MUST in a modern, technology driven society!!! <==========

.

YOU should ALSO be interested about ===> Youth Leadership and Students Voice <=== where YOUR students, learners will take themselves the responsibility for THEIR future, check below, please:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.


 

.

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 19, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Facebook, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Quality Courses, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

My Published Articles About Cyber-Security In The Press And Social Media

My Published Articles About Cyber-Security In The Press And Social Media

.

Learning basics of IT-Security and Cyber-Security.


My Published Articles About Cyber-Security In The Press And Social Media

programmerman-animatedBeing online since 1998 I realized very quickly that “Every Medal Has Its Reverse” and ALSO what Physic laws tells us “Where is positive there is also negative and both make 100%” (differently explained). OR, in OTHER words, there is BAD and GOOD people! I realized very quickly that through the internet, in the Virtual-World, the BAD guys have BIG chances to make THE BIG money and by reading a lot of PC-Magazines in English, French and German as well by getting informed through the internet. I learned about Cyber-Security and How-To get protected.

Being a diligent learner and always wanting to share my knowledge with others, I started a website about it (later some more in different languages…) , actually the first (private) one and second in general in my country Luxembourg (Europe). At the time people told me that I am crazy to talk about Cyber-Security, NO ONE was realizing about the impact of virus, trojans, backdoors, DDoS, Scam, and other Cyber-Beasts

NOW, WE have to deal with Cyber-Crime, Cyber-EspionageCyber-Attacks, Cyber-War, Cyber-Warfare, Botnets,  Cyber-Hygiene, where OUR computers (Smartphones included…) are part of such BAD actions!!!

SO… Later on (2004), already 13 years ago (in 2017) my FREE courses were available on the server of the “Ministry of Education from Luxembourg” (Europe); the FIRST courses about Cyber-Security and Safer Internet in Luxembourg EDUcation, check screenshot below, please…

.

Gust-MySecureIT

.

In 2004 I became ALSO member of the Advisory-Board from CASES (CYBERWORLD AWARENESS &
SECURITY ENHANCEMENT) and from BEE-SECURE. I won ALSO an National Contest, organized by Education, about Cyber-Security with a Mix-Team (one young [12 years old] woman and a 40 years old woman) in 2004 (February 06, 2004).


February 2004

Together with two young students and my temporary assistant Diane, WE won a national contest themed “Multimedia Poster“, please find below the article in German:


15-06-2004:

I participated on a “Journée Pédagogique“, organized by “NorTIC” and “eLuxembourg” (Ministry of EDUcation Luxembourg) on 15-06-2004, where I presented my knowledge and my “BEST PracTICEs” with ICT at that time. I had a BIG success with IT! There were ALSO EDUcators, TEACHers present as visitors from different countries to lurk around WHAT is NEW; such as “Robert GOBERT“, WHO wrote a book and mentioned me in it.

Please click on the images to enlarge them.

 

Journée Pédagogique-HOSINGEN-NorTIC-15-06-2004

ROBERT-GOBERT-GUST MEES-2004-2005

ROBERT-GOBERT-GUST MEES-2004-2005-2

ROBERT-GOBERT-GUST MEES-2004-2005-3

 
..
Links:
.

There were articles published about me from Luxembourg Newspaper “Luxemburger Wort” on 08.05.2006 and on 04.10.2008, where I don’t have any web address, as NOT existing anymore on their server(s), need to find out…

.

Gust MEES-Tageblatt 13.11.2007

The above article (partial view) was published in Luxembourg on “Tageblatt” on 13.11.2007.

.

On March 2008 there was a major infection of a very popular website through a “Cross-Site-Scripting” and the press was reporting about it and posting it ALSO on Social-Media. I replied to them on Social-Media and I got interviewed, whereby my interview was published on March 18, 2008 and later in April 02, 2008 an other article from me followed, see links below, please:

.


In February 23, 2006 I was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

.


Curation and EdTech Tools

13-02-2012

Gust MEES-Scoop.it-21C Tools-13-02-2012

Click the above image, please, to access the article.

In 2011 I started something what was NEW for me, Curation on Scoop.it, and in November 2011 I got interviewed and honored by the title “Lord Of Curation“. It was published on November 30, 2011, check it below, please:

Actually (2014) I am very present on Social-Media with nearly 65k posts on Twitter and I am involved in a lot of Twitter-Chats and conversations on Twitter, through them I meat ALSO online friends and one of them, Doug PETERSON contacted me to make an interview which was published on Doug’s Blog on March 12, 2013, check below, please:

.


5 Excellent Resources for Teaching Students about cyber-Safety

05-08-2013

.

Gust MEES-Educators Technology-InternetSafety-05-08-2013

Please click the image above to access the article.


Ransomware

And again (March 17, 2014) there was an article in the national press (WORT.LU) about Scam, actually about “RansomWare“, which was tweeted over Social-Media Twitter and where I replied to, to give them more and BETTER information about that Topic. I got replied by them that THEY made an Update about it online and ALSO that THEY recommend me, check below, please:

.

WORT-17.03.2014-Recommandation Gust MEES

.

WORT-article-online-Gust MEES-Recommandation-17.03.2014

.


19.03.2015: My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog Selected By Luxemburger Wort-2015

.

.

WORT-Luxembourg-Blogosphere-19-03-2015

Click the image above, please, to access the article.

.


13.03.2015: Recommendations on LinkedIn

Recommendation-Gust MEES-LinkedIn

Click the above image to access the article, please.

..


09.12.2015: My FREE courses about Cyber Security referenced at TU-DRESDEN (Technical University DRESDEN / Germany)

.

TU-DRESDEN-09-12-2015-CyberSecurity-2

Click the above image please to access the article

.

TU-DRESDEN-09-12-2015-CyberSecurity-1

.

Related links:


2016

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog selected by Luxemburger Wort-2016


Beeing A Pioneer Gets Recognized!

icono_pioneer.

.

As I like challenges, I take part in international competitions for “Good PracTICES” in EDUcation and so did I here, see PIC below please… SO… NOW I am an “Open EDUcation Europa Pioneer“!

.

.

.

OPEN EDUCATION EUROPA 2016-Pioneer-Badge-Gust MEES

Click above image please, to access my blog posts.

.

..


I got mentioned as a reference from the Ministry of EDUcation in Luxembourg

I am feeling very honored for THIS ONE, please check below. It was published on 02-05-2017 in the Newsletter from the Ministry of EDUcation in Luxembourg.

.

Gust MEES-NEWSLETTER-MINISTRY of EDUCATION LUXEMBOURG-02-05-2017

Please click the above image to access the article.

..


I got selected and being part of the “Albert Index” for TOP EdTech Blogs

June 26, 2017

.

Gust MEES-ALBERT.io-03-09-2017

Please click the image to access the article.

.


eReputation and Marketing-Territorial (06-10-2017)

Check the article below, please, to read it (in French).

.

eReputation-Gust MEES-2017

Click the image above, please, to access the article.

.


2018

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

WORT-blog-2018

.

WORT-2018-Selected Blogs-Blogospere-Gust MEES-Luxembourg

Click the image please to access the article


05-02-2020: 

I got mentioned in Luxembourg’s weekly magazine “revue” for my participation of the #SID2020, “Safer Internet Day 2020“!

.

REVUE-06-2020-SID2020-Gust MEES

.

REVUE-06-2020-SID2020-Gust MEES-2

.


23-07-2020

Through LinkedIn I got contacted from SEEEDSTUDIO asking me for a cooperation concerning their ARDUINO compatible products. I accepted to make a review of the Grove Beginner Kit for Arduino”. Check below please my tutorials:

.


30-06-2021

My blog was selected by FEEDLY as:

GUST_MEES-FEEDLY-2021-5eme-PLACE-Best Digital Literacy Blogs and Websites

Best Digital Literacy Blogs and Websites and is ranked Nr. 5

.


GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

.Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphonestablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,