RSS

Category Archives: “Dirty Dozen Countries” with SPAM

SID2016: Safer Internet Day 2016-Participation

SID2016: Safer Internet Day 2016-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2016 – Save the date!

.

SID16-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2016 starts to take shape.

.

SID2016-Poster

.

 

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2016

programmerman-animatedWHAT is special this year with my participation on SID2016

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2016 in Luxembourg/Europe.

.

BEESECURE-SID-Gust MEES-18-01-2016

.Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2016 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
Leave a comment

Posted by on January 18, 2016 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Analyzing, Andragogy, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Autodidact, Awareness, Backdoors, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Device Theft, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, European Cyber Security Month, Facebook, FAQ, Feedback, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Interviews, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Motivation, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, PC Cleaning, PC Maintenance, Personal Learning Network (PLN), Personal profit, Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Project Based Learning, PUPs, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Self-directed Learning, Seniors, SID2016, Skills, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Third Party Applications, Tracing, TU-DRESDEN, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

.

Learning basics of IT-Security and Cyber-Security.


WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

globe-pc

.

To understand the impact of Cyber-Security, Cyber-Crime, Cyber-Attacks, Spam, on a global view it is important to know which countries are involved. WE will see this through the below published graphics and related articles by professional companies. Those articles and graphics will get presented by year publishing and so making it possible to see if there is an improvement (if so…). WE will get the possibility ALSO to learn about the mentioned, such as Spam, web site vulnerability scan , botnet, and…

.


2015: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q1 (January-February-March 2015) of 2015.

.

SPAMPIONSHIP-Q1-2015

Click on above image, please, to access the article.


 

2014: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q3 (July, August, September) of 2014.

.

2014-q3-dirty-dozen-by-pop-vol-0500Click the image above to access the article from SOPHOS.

.

2014-q3-dirty-dozen-by-pop-eng-0500

.


2013: Top 10 Countries with the Most Number of Botnet C&C Servers

.

2013-101112-spamvol-eng-0500

.

 

.

Top 10 Countries with the Most Number of Botnet C&C Servers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.

WHAT is a Botnet?

.

WHAT is a C&C Server?

.

Check also the video below, please.

.

Video-Botnets

Click the image to access the video.

.


2013: Top 10 Countries with the Most Number of Botnet-Connected Computers

.

Top 10 Countries with the Most Number of Botnet-Connected Computers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.


Botnet Control Servers Span the Globe

.

botnet_map

Click image to go to the article.

.

Click the image above to find out if YOUR country is involved.

Read ALSO:

.


2013: “Dirty Dozen” SPAMPIONSHIP 

[START Text from SOPHOS] At the end of each calendar quarter, we dig into our spam databases and calculate each country’s scores in a league table we jokingly call the SPAMPIONSHIP.

Unlike conventional sporting events such as the Superbowl, the Six Nations or the Bundesliga, the Spampionship is one title that no team wants to win. [END Text from SOPHOS]

.

2013-101112-spamvol-eng-0500

Click image to read the article.

.

.

2013-101112-spampop-eng-0500

Click image to read the article.

 


WHAT YOU Should Know About Spam

sharing-iconI will use again the text from SOPHOS, as it explains BEST what SPAM is:

Spam is almost always sent by regular computers – in other words, by desktop or laptop computers at home or at work – rather than by dedicated email servers.

You’re probably familiar with the process by now:

  1. Your computer gets infected with a bot, also known as zombie malware.
  2. The bot “calls home”, typically using a simple web download, to fetch a spam message and a list of addresses to send it to.
  3. The bot sends the message over and over again, using your computer and your internet connection to clock up the mail deliveries.
  4. GOTO 2.

.

I invite YOU also to read my tutorial on How-To fight SPAM:

.


This blog post will get updated as soon as there will be new information.

 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

 


..

Keywords necessary for me to remember about to create this blog post: Spam, Cyber-Security, Web-Attacks, related links, curation, Malware, Malware-Hosting countries, knowledge links, Cyber-Espionage, Privacy…

.

.

Stay tuned for next blog post(s) 😉

.

 

.

.

.

.

 
3 Comments

Posted by on February 15, 2014 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, DDoS, Education, eLearning, Europe, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, ICT Awareness, Identity Theft, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Proactive Thinking, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Spam, Spampionship, Students 21st Century Survival Guide, Sustainability, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,