RSS

Category Archives: SID2014

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

.

programmerman2

.


Let us talk about Hygiene…

Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:

WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:

WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).

SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!

As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other! 

ICT RESPONSIBILITYWell, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):

My courses about Cyber-Security were mandatory in Luxembourg (Europe) EDUcation in 2004, learn more here please:

.


.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next blog post(s) 😉

.

.

.

 

 

 
Leave a comment

Posted by on September 10, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Apple Malware, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Connected Educators, Critical Thinking, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, European Cyber Security Month, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Luxembourg and CyberSecurity, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Often Asked Questions, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reality, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, SID2014, SID2015, SID2016, SID2017, SID2019, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, Tutorials, Twitter, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Luxembourg and Cyber-Security: HOW did it START?

Luxembourg and Cyber-Security: HOW did it START?

.

Evolution of Education: Wordle Logo

 

.


Luxembourg and Cyber-Security: HOW did it START?

HACKATHON LUXEMBOURG-2016.

Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.

.

Learn more:

First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:

 

1996: Creation of the CLUSSIL

Just a few months after the publication of the European Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) the CLUSSIL (CLUb de la Sécurité de Systèmes d’Information – Luxembourg) was created by 13 IT Security Specialists:
Jean-Marc Buchet, Jean-Marie Déom, Francis Durigneux, Hans-Werner Eiden, Sandrine Gallouédec, Carlo Harpes, Anne Hendrick, Claude Lenert, Bruno Mamer, August Mordijck, Yves Reding, Stephen Purser, Marc Schintgen.

1998: Gust MEES

First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).

2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.

2002: CASES

Personnes :

  • Serge Allegrezza – Directeur Direction de la Propriété Intellectuelle
  • Jean-Marie Reiff – Responsable OLAS
  • Henri Grethen – Ministre de l’Économie
  • François Biltgen – Ministre délégué aux Communication
  • Alexandre Dulaunoy – Consultant serveurs du monde du libre
    • Organisateur Hack.lu
    • Plus tard responsable CIRCL
  • Yves de Pril et William Robinet – CONOSTIX
    • Développeur du premier managed security system pour SME

 

2004-2007: MySecureIT 

Gust-MySecureIT

Click image to enlarge, please.

.

Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7ème” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.

2004: Gust MEES created the website http://www.internetmonitor.lu

2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)

04.02.2005: Lancement officiel de CASES

Le site web de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur. 

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

2005

Personnes

  • Etienne Schneider
  • Angélique Joyeux – rédaction français
  • Cyril Pierre-Bausse
  • Pour Telindus
    • Carlo Harpes
    • Cédric Mauny
    • Thierry Zoller

Le site de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

La version beta de l’outil de communication CASiX développée par CASES a été présentée et délivré à plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communauté et pour la communication avec le nœud national CASES. CASES a lancé une étude d’analyse des risques basée sur la méthode française EBIOS dans le Ministère de l’Économie et du Commerce extérieur, et ce en vue de formaliser une politique de sécurité pour le Ministère.

Lancement officiel de cases 04.02.2005

Première Hack.lu dans la chambre des métiers

Conférence sécurité pour PME dans la chambre des métiers

Début des formations MySecureIt

2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI

2006: Gust MEES

In February 23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

2006

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 4 octobre 2006, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectué sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.

Le Ministère de l’Économie et du Commerce extérieur a signé pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de Montréal dans le domaine de la sensibilisation des PME aux risques informatiques.

Les relations avec la Direction Centrale de Sécurité des Systèmes d’Information en France ont été intensifiées en vue de pouvoir conclure une entente de collaboration en 2007.

Le Ministère de l’Économie et du Commerce extérieur a, dans un effort commun avec le Ministère de l’Éducation nationale et de la Formation professionnelle, continué sa campagne de sensibilisation pour les enfants des classes de septième des lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une trentaine de classes.

2007-LUSI:

.

2007

Présentations et participation aux conférences

  • Au cours de l’année 2007, l’équipe de CASES a fait plus de quarante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le « Internet Security Day » , et à l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es écoles primaires et secondaires luxembourgeoises.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale HACK.lu. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants. À cause des attaques de type phishing, CASES a organisé un workshop tenu par l’organisation hautement renommée AntiPhishingWorkingGroup.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministèrede l’Économie et du Commerce extérieur, du Centre Informatique de l’État, de la Représentation Permanente du Luxembourg à Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a organisé un stand à la Belle Étoile pour le Safer Internet Day, une initiative de la Commission européenne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a été accueillie et plusieurs classes d’école sont venues faire leur permis web.

  • Une campagne contre le cyberbullying (harcèlement via les nouvelles technologies de l’information et de la communication) a été lancée en forme de projet pilote dans un lycée du Luxembourg. CASES a réussi à motiver tous les opérateurs de téléphones mobiles, le ministère de l’Éducation nationale, la Police grand-ducale, le Parquet, l’Université de Luxembourg ainsi que le projet www.lusi.lu à s’investir dans le projet et à trouver une réponse à ce nouveau fléau.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations expliquant comment faire du commerce électronique sécurisé. Grâce aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invité sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).

Le site Internet www.cases.lu

  • De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont été publiés sur le site de CASES. Plus de quatre-vingt alertes ont été mises sur le site pour avertir les internautes de vulnérabilités critiques ou importantes. La version allemande du site a également été lancée en 2007. CASES est aujourd’hui un des portails publics les plus visités au Luxembourg.

  • Deux permis web ont été conçus et mis en ligne. Le premier http://pwws.cases.lu est destiné aux enfants et vérifie leur savoir-faire dans plusieurs domaines du cyber-mode. Après avoir passé le test avec succès, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vérifiant les bons reflexes nécessaires pour faire du commerce électronique en toute sécurité a été publié sous l’adresse http://epass.cases.lu.

  • -Des conseils spécifiques pour le commerce électronique sécurisé ont été publiés sur le site de CASES. Un “flyer”commerce électronique a été rédigé et sera mis à disposition dans les guichets de banques dès début 2008.

Les collaborations de CASES

  • CASES, ensemble avec le CERT luxembourgeois, a aidé plusieurs banques de la place ainsi que l’ABBL à réagir de façon coordonnée contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin août 2007. PREMIERES attaques de type physhing.au Luxembourg.

Un projet pilote qui a pour but d’établir de bonnes pratiques sécuritaires au cœur des maisons de jeunesse a été lancé en collaboration avec le Service National de la Jeunesse et le ministèrede la Famille. Le but est de sécuriser le réseau informatique des maisons de jeunesse et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour adolescents.

  • CASES a contribué à l’élaboration d’un guide de bonnes pratiques pour la mise en place de réseaux sans fil dans des locaux publics. Le but de ce guide est de sécuriser le réseau sans fil et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour les clients. WiFi sécurisé

  • CASES a entamé une coopération avec le nouveau service de la DCSSI française en matière de sensibilisation du grand public.

  • CASES a été élu parmi les projets phares du domaine de la sensibilisation en Europe et a été invité pour la troisième fois de suite par l’European Network and Information Security Agency (ENISA) à faire une présentation sur le fonctionnement du projet.

  • CASES a, au cours des dernières années, su acquérir plusieurs partenariats avec des organisations étatiques étrangères ayant les mêmes missions de sensibilisation.

Projet CIP – Critical Infrastructure Protection La Direction du Commerce extérieur et de la Sécurité informatique a lancé, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont été élaborées. Des principes d’établissement du glossaire contenant les définitions et abréviations utilisées à travers tous les documents du projet ont été définis et un glossaire a été rédigé. Un schéma de classification selon trois dimensions (confidentialité, intégrité, disponibilité) avec plusieurs classes par dimension et règles de sécurité a été conçu et publié sur le site de CASES. Ce schéma servira de base pour un schéma de classification interne aux organisations. Il est destiné en premier lieu à créer un cadre pour l’échange d’informations entre le ministère de l’Economie et du Commerce extérieur et les opérateurs CIP. Finalement une cartographie des menaces a été rédigée.

Projet de mise en place d’un CSIRT gouvernemental

La Direction du Commerce électronique et de la Sécurité informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sécurité de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sécurité informatique fournira les services suivants aux entités gouvernementales:

  • gestion et réponse sur incidents,

  • veille technologique,

  • bulletins d’alertes et d’avertissements,

  • point de contact et de coordination national pour toutes questions du domaine de la sécurité de l’information.

Dans le cadre du projet CSIRT, la Direction du Commerce électronique et de la Sécurité informatique a participé aux réunions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de développer des partenariats importants pour la suite du projet.Démontrant sa forte implication dans le domaine CSIRT, le ministère a co-organisé et hébergé la formation TRANSITS (formation spécialisé CSIRT, effectué par TF-CSIRT, et unique dans sons genre) au Luxembourg.

Projet Politique de Sécurité

La Direction du Commerce extérieur et de la Sécurité informatique a commencé à rédiger une politique de sécurité basée sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sécurité des systèmes d’information. Une vingtaine de politiques ont été rédigées, les procédures y référant sont rédigées au cours de l’année 2008. Ce projet vise premièrement à réaliser une politique de sécurité pour le ministère de l’Économie et du Commerce extérieur et, deuxièmement, à donner aux autres Ministères et administrations intéressées un guide de mise en place.

2008.

2008: LISA Stopline started 2008

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((

Knol-Author-of-the-week

Through the way-back-machine web.archive.org I found back some stuff:

2008

Au cours de l’année 2008, l’équipe de CASES a fait plus que cinquante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et à l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministères et administrations luxembourgeoises.

  • CASES a su réaliser l’exploit de former dans l’année scolaire 2007-2008, les enfants des lycées classiques et techniques fréquentant les classes de 7 ème au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont été réalisées. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet.CASES a aussi réalisé une dizaine de soirées d’informations pour parents d’élèves.CASES sensibilise aussi aux risques d’arnaques sur Internet.

  • CASES a participé au salon de l’éducation organisé par la Ville de Luxembourg et à la journée “Summer –Spill a Spass” organisée par la Ville de Dudelange, aux ateliers pédagogiques du Lycée Marie Consolatrice à Esch/Alzette. CASES est intervenu lors des journées pédagogiques de la Banque de Luxembourg et a participé à la “e-City roadshow” organisée par la Ville de Luxembourg. CASES a activement participé au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” à Contern et aux “Journées du livre” à Bascharage.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale “HACK.lu”. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministère de la Fonction Publique et de la Réforme administrative, Trésorerie de l’État, Centre de Logopédie, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a su réaliser un partenariat avec “Le Luxemburger Wort”. CASES a publié chaque semaine un article de sensibilisation dans ce journal de très grande couverture. Ainsi plus de quarante articles de presse ont été publiés.- Dans le cadre de la coopération avec le “Luxemburger Wort”,

  • un test de “Wardriving” a été réalisé dans la Ville de Luxembourg. Ce test a démontré que la sécurité dans le domaine des réseaux sans fil est déplorable.

  • – CASES a contribué à une dizaine d’émissions radio sur 100,7.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sécurité a été proposé avec un très grand succès. Lors de la foire d’automne, une campagne de sensibilisation aux risques liés à “Bluetooth” a été réalisée.

  • Une enquête sur les performances du social engineering a été réalisée en partenariat avec l’Université de Luxembourg. Lors de cette enquête, il a été essayé d’inciter les personnes questionnées à donner leur mot de passe. Plus de 1000 personnes ont été questionnées. Un rapport détaillé a été publié sur le site de CASES.

  • – CASES a lancé le label “suivant les réflexes CASES”. Une première déclinaison de ce label a été réalisée avec le label “WiFi sécurisé” qui a été attribué, après audit, à 3 sociétés sur 6 sites

Projet Politique de Sécurité

  • CASES a, ensemble avec le ministère de la Famille et le SNJ, réalisé un projet d„envergure pour mettre en sécurité les Maisons de Jeunes. Une politique de sécurité ainsi que des guides de bonnes pratiques ont été réalisés.

  • En collaboration avec le ministère de l’Éducation, un projet pour la mise en sécurité des Écoles primaires a été entamé. Deux projets pilotes ont été entamés.

  • Un projet de mise en place d’une politique de sécurité a été lancé en 2008 au sein d’une administration gouvernementale

 

2009

CASES a su réaliser l’exploit de former dans l’année scolaire 2008-2009, tous les enfants des lycées classiques et techniques fréquentant les classes de 7èmeau Luxembourg. Beaucoup de classes primaires ont été formées, et ce à partir de l’âge de 9 ans. En tout CASES a sensibilisé les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet. CASES a aussi réalisé une vingtaine de soirées d’informations pour parents d’élèves.

CASES a participé au «Kannerstaat» de la ville de Junglinster.

CASES a publié un support scolaire, destiné aux instituteurs et aux parents. Ce livre vise à fournir les informations nécessaires pour pouvoir éduquer les enfants dans différents domaines liés à la sécurité de l’information. LEITFADEN

Collaboration avec le DNR

NACKT im NETZ

2010

  • Campagne brosses à dents
  • Création de smile GIE

 

2010: BEESECURE

Le ministre de l’économie Jeannot Krecké a présenté le 8 novembre 2010 BEE SECURE, un projet commun du Ministère de l’Economie et du Commerce extérieur, du Ministère de la Famille et de l’Intégration et du Ministère de l’Education et de la Formation Professionnelle.

5 Jahre sind im Internetzeitalter ganz schön lange und für BEE SECURE auf jeden Fall Grund genug, Partner und Unterstützer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.

So versammelten sich am 9. Oktober rund 100 geladene Gäste im Forum Geesseknäppchen, wo allerhand „Requisiten“ der letzten fünf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.

Annual Reports BEESECURE – Starting 2010

 

2011

Analyse des risques

2012

Stopline

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2012

My.cases.lu

 

May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com

 

2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD <===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.

2013

higher-education-tech-blogs-2013-Doug PETERSON.

Gust MEES got interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.


More to come here, lots of research necessary… Meanwhile follow the following articles (curation) and links:


2017: 

Cybersecurity week in October:

 

.


2016: WHAT is done in the country!? WHICH actors are helping to boost Cyber-Security!?

There are more and more companies and organisations offering courses about Cyber Security, such as:

 


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

.

 

.

Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,

.

 

 

 
Leave a comment

Posted by on November 22, 2017 in 21st Century Skills, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, European Cyber Security Month, History, History of the web, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning about Social Medias, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Phishing, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, PUPs, Quality Courses, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2014, SID2015, SID2016, SID2017, Skills, Skype insecurity, Smart TV's, Social Engineering, Social Media, Spam, Synthesizing Mind, Teacherpreneurs, Third Party Applications, TOR-Anonymat, TU-DRESDEN

 

Tags: , , , , , , , , , , ,

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

.

Evolution of Education: Wordle Logo.


I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

programmerman-animatedActually it is not really a question BUT a statement from MOST people ===> I Have Installed An Anti-Virus And A Firewall, I Am Protected NOW! <=== BUT is that true!? NO, NOT anymore, this was true ages ago BUT NOT anymore today! When YOU use the two above mentioned then YOU are already a bit protected, but far away that YOU can say, I am safe now! WHY? First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

..

I will cite ALSO my online friend https://twitter.com/dougpete about WHAT he has to say about. Check below, please.

.

Doug PETERSON - coding- nobody is perfect

Check the original blog here ===> http://dougpete.wordpress.com/2014/03/01/a-wakeup-call/ <===

.

Find out more about Doug PETERSON here:

.

SO… NOW WE know that WE have to be aware a bit MORE and that WE have to create a Cyber-Security Mentality for ourselves and for the community! Even Anti-Virus programs have sometimes ALSO vulnerabilities! These vulnerabilities can even bypass the installed protection software, such as Anti-Virus and Firewall and the bad boys (Cyber-Criminals) can take the control over the computers by exploiting these vulnerabilities! Once a computer controlled by the cyber-criminals (===> YOU don’t remark it <===) they include it into a network of other controlled computers, that network is called a “Botnet”! These so called “Botnets” are getting used to attack Government websites and ALSO other websites as well as “Spam” generating computers, and this ALL without the knowledge of THEIR owners!!! So, let us find out NOW what “Botnets” are and WHAT they can perform, YOU might get impressed, there is a BIG POWER behind, and that with OUR computers and without OUR knowledge!!!

Learn more:

Thus meaning ALSO that YOUR computer could become a Cyber-Weapon who is attacking YOUR own Government and this without YOUR knowledge!!! Sounds strange, isn’t it!? BUT that’s REALITY! Check my blog post below for more information, please:

As YOU might have remarked (for those who follow my posts…) I bring every time a bit of creativity and also music in to my posts, so this time it will be a music video from ===> “Weird Al” Yankovic – called Virus Alert <=== Check it, watch it and listen to the music as well, it is funny and great to watch. It shows the REALITY 😉 BTW: there are lots of other interesting music videos from  “Weird Al” Yankovic”, check them ALSO…

.

.

===> Forewarned is Forearmed!!! <===

.

As WE know NOW, after reading the above mentioned, there is certainly the question: WHAT else SHOULD I do then to get BEST protection!?

.


WHAT else SHOULD I do to get BEST protection!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01WE learned already that even Antivirus-Programs could have vulnerabilities and ALSO the reason WHY (inevitable bugs in programming code, as a reminder), SO, what’s NEXT!? Thus meaning: ===> Nobody Is Perfect <=== (Mac, Apple and Linux included)! WHEN such problems are getting known by the manufacturers of software programs, THEY release as soon as possible (asap) UPDATES!!! These UPDATES are NOT ONLY an option BUT a MUST to install!!! YOU understood already NOW THAT UPDATES are a MUST, right 😉 And a MUST for any “Operating System” (OS)!!! NO exception!!!

So, let us have a look on those vulnerabilities on any “Operating system” (OS):

OK, I got the message NOW and I don’t have THAT much time to spend to UPDATE manually ALL my installed programs and WHATEVER, this is stressing me really!!! I can’t cope with THAT!!! Isn’t there around some solution for ALL THAT, an automated solution!? Of course there is an automated solution for the so called “Third Party Applications“, and that on is actually very easy to install and FREE, check my blog post (tutorial) about it below, please:

BUT: please don’t let us forget about the ===> Patch-Tuesday <===, that is THE day to UPDATE YOUR Windows machines and ALSO ADOBE related products such as FLASH-PLAYER and ADOBE READER (PDF), and THIS for any Operating System (OS)!!! Make sure to get THE ===> reflex <=== to UPDATE them! BTW: this is any second Tuesday on each month!

An OTHER, OH YES, there is STILL some OTHER, sorry: ===> Browsers (ALL of them…) <=== are THE Gateway for Malware infections, this is NOT known by MOST users!!!

Learn more below, please:

.

OH MY GOD, again so much stuff to remember, how could I do this!? Well, I agree with that and therefore I started ages ago (???) on Social-Media Twitter the “Hashtag” ===> #FSCD <=== who means ===> Friday Security Check Day <=== and who reminds YOU on any FRIDAY about to get THE ===> REFLEX <=== to take care about YOUR security 😉

.

book-question-markI invite YOU ALSO to read my following blog posts:

.

.

Keywords as a reminder for me to create this blog post: Anti-Virus, Firewall, Third Party Programs, Updates, Drive-By-Download, Flash vulnerabilities, adobe vulnerabilities, Plugins vulnerabilities, Bad programming, Cyber-Security, Responsibility, links to related blog posts, Cyber-Crime, Passwords, human behavior, naivety, Computer as Cyber-Weapon, malware bypasses anti-virus and Firewall, Countries worldwide and Cyber-Security,

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.
.Stay tuned for next blog(s) 😉

.

.

 
5 Comments

Posted by on February 9, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Europe, Facebook, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Motivation, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Security in Schools, SID2014, Social Engineering, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

.

Evolution of Education: Wordle Logo.


Are WE Becoming Too Paranoid About Cyber-Security?

This is a question I get asked very often, and I got remembered again by my online friend Doug PETERSON ===> @dougpete <=== about it on a Social-Media conversation (BTW: it’s called a “convo” on Twitter) on Twitter, check below please:

.

Twitter Conversation about cyber-Security

.

SO… As I can’t answer Doug’s very good question on a Twitter based conversation, as it would be too long, I took the challenge to create a new blog post here. And actually it inspired me to create a series of new blog posts with the TOPIC ===> Often Asked Questions:… <=== This was the introduction, now let us go for it…

.


Shouldn’t WE Have A bit Of Paranoia Anyway!?

sharing-iconA good question back, isn’t it? My direct answer to this would be, YES! A healthy paranoia attitude, why!? Let us try to go a bit for Deep-THINKing if YOU permit 😉 Let us ALSO try to make a comparison between the Real-World and the Virtual-World (the internet). WHEN YOU take the time to compare both worlds YOU would find out that there really few differences, apart that the internet is technology driven and that WE connect global on instantly actions

===> BUT: Let us first admit that the Real-World and the Virtual-World have MORE positive attributes than negative ones!!! <===

Mausi-parapluie.

BUT ALSO: WE have to accept THAT WE are NOT gods, and therefore WE are ALSO on a status as ===> Nobody-Is-Perfect!!! <=== 

ALSO negative things as present in the Real-World are ALSO present in the Virtual-World, as WE copy ourselves ONLY into the Virtual-World with ALL OUR character

.

.

Let us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

WHAT do the Governments worldwide say!? Check below, please:

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Check ALSO:

Coming back to the negative things as THEY are present in both worlds, let us be honest, as new born people into the Virtual-World  (mostly…), WE have to acknowledge THAT there is a STRONG (actually on 2014) dominance of the bad boys, the criminal ones!!! Don’t believe me? BETTER to check out the shown resources below, please:

Please, take YOUR time to UNDERSTAND the shown resources above, OTHERWISE YOU won’t get THEIR importance and YOU will go on with YOUR same question, which is NOT the goal of this blog post anyway! YOU SHOULD read it to get the message and the answer to YOUR question 😉 To give YOU an answer to YOUR question, the BEST way is to read about it and to go for Deep-THINKing anyway, NO ONE can convince YOU about WHAT YOU don’t want to accept, so build YOUR own Mentality about it through the published facts 😉

.

Meanwhile listen to the music below… Bridge Over Troubled Water (Simon & Garfunkel)

.

.

As the title of the music video tells us “Bridge Over Troubled Waters“, it is exactly THAT what this blog post wants to bring over! Trying to get YOU convinced about the present dangers , to make YOU aware about the present dangers (OH YES, there are MORE as YOU might expect…) and to SHOW YOU as well WHERE those dangers are and making YOU fit to fight against THOSE dangers, to make YOU responsible “Digital-Citizens“! YES, the word RESPONSIBILITY is being used again, YOU SHOULD remember it 😉

.

I invite YOU ALSO to read my following blog posts as well, please:

.

WHEN coming back to the TOPIC ===> Are WE Becoming Too Paranoid About Cyber-Security? <=== I think that YOU, after reading the above mentioned, that YOUR question is answered and that YOU go for a ===> Community-Mentality <=== as it is THIS what would fight against the bad boys

.

Keywords:  often asked questions, what do people think about Cyber-Security, Mac Mentality, I installed Antivirus & Firewall, I am secure, Cyber-Security is ONLY for paranoia people, Cyber-Security is ONLY a hype, Sharing Responsibility, community, Critical Thinking, Proactive Thinking, any device as Cyber-Weapon possibility, patriotism, holistic view, selfish mentality, community mentality, Technology and maintenance as well as Safety and Security, Education’s Responsibility, everybody’s Responsibility, Curation about Cyber-Security, it’s ONLY ALL about commercial to sell…, Cyber-Espionage, NEUTRALITY of the internet?, Privacy, 20th Century Mentality expressed through 21st Century Technology,

 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

.
.Stay tuned for next blog(s) 😉

.

.

 
8 Comments

Posted by on February 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, browser, Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Home-Work, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Quality Courses, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Technology Integration, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

.

Wordl Logo Malware-Adware.


What Is Potentially Unwanted Programs (PUPs)? And How-To Remove Them.

programmerman2Potentially Unwanted Programs (PUP)” are a piece of software that is also downloaded when a user downloads a specific program or application. THEY are similar to malware in that it will cause problems when it is downloaded and installed. THEY can be very embarrassing as one doesn’t get rid of them with normal tools, one needs definitely to use special tools to remove them.

Freeware publishers offer their products for free, but bundle them with PUPs in order to earn revenue and users are unaware of these additional installations because ===> they do not read agreements thoroughly. <===

WE will take an practical example while WE are downloading a specific FREEWARE program and discuss on it on How-To. Here below on example where YOU MUST take care when downloading FREEWARE:

.

PUPS-1

.

As YOU might see in above screenshot there are pre-installed PUPs integrated, uncheck these boxes before YOU click the “Next” button!

Once the software installed, I recommend to shut down the PC and to restart it. If there is STILL a PUP on YOUR PC YOU will see it then! BUT, it isn’t a 100% sure way to know if so, BETTER is to install a FREEWARE program (without PUPs) to check the PC, find THEM and to remove THEM! WE will see this in the section below…

.

Related links to PUPs:

.


How-To Check And Remove PUPs On My PC?

1ibdy1vf6wghd-n05dgl-aigainformation1I tried out a lot of solutions over the years and this one, the one WE will describe below, gave me the best results to remove ONLY the PUPs! WE will discuss, in an other section as well, How-To prevent that PUPs get installed. SO, before installing and running the test of that program, let me give YOU an advice, please: depending on how many programs YOU have installed on YOUR PC the test and removing process could take about 30 minutes; the time YOU can’t work anymore with YOUR PC. Make sure when YOU do this task to have foreseen something else to do. Some possibilities are, running the program before a meal, a shower, before shopping, and… YOU decide 😉 As WE are using the download page from Bleeping Computer, I will use their text as well…

BleepingComputer Review:

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.

So let us go now and download this program at following address:

Once having installed the program and started it, it will look like this (see screenshot). YOU don’t have to fear as well to lose some programs as the program creates ALSO a “Registry Backup”!

.

jrtcmdsm

.

As mentioned already above, it will take time, so wait and see 😉 YOU will get later provided a detailed report about what was removed, report which YOU could save, see screenshot below, please.

.

JRT Report

.


How-To Prevent The Installation Of PUPs?

SO… NOW WE know How-To remove those unwanted, stressing programs, BUT doesn’t there are existing programs who help us to protect against those PUPs? YES, there is actually one very good program existing since ages and STILL developed, who makes a great job on preventing and ALSO on removing PUPs, Adware, Spyware, and… It is called “SpyBot Search&Destroy”

Spybot for private use

Why use the Free Edition?

If all you require is to be able to scan and remove malware and rootkits from your system. Or if you want to protect your PC by immunizing your browser and hosts file, the ‘Free Edition’ is the choice for you. If you are a more experienced user you can also check various ‘autostart’ locations using the ‘Startup Tools’. Spybot 2 can scan single files or specific folders and unlike other software it doesn’t matter if the file is located on your local drives or on a network share. Spybot 2 comes with its own whitelist which helps to identify if files are legitimate or not. This useful addition helps to speed up the scan. Even though this fully functioning product is free of charge you can still get free support by emailing our support team.

SO… Let us go to download it from the original website of its creator here:

I recommend to use the FREEWARE version, but anyway YOU might chose what YOU want…

SO… Once installed it will look like this, see screenshot below, please.

.

Spyware Search&Destroy 1

.

Once started, the first step to do is to look for up updates by clicking on the button “Search for Updates” (see screenshot). Once the Updates downloaded click the button “Check for problems“, see screenshot below, please.

.

Spybot Search & Destroy 2

.

The program will get launched (this will take some time, be patient…) and meanwhile YOU STILL can work with YOUR PC, but it will slow down…

.

Check the screenshot below to find out how the scanning process looks and YOU will see ALSO that YOU can use some tutorials through the scan window, in the “Help” menu, read carefully 😉

.

Spybot Search&Destroy 3

.

Once the scan is finished, WE will see the results, check screenshot, please.

.

Spybot Search&Destroy-NO infection

.

If there were some infections, WE will see this (see screenshot below, please).

.

Spybot

.

YOU need NOW to click the button “Fix selected problems” and the found problems will get removed.

BUT, there is STILL something more and very smart to do, using the “Immunize” function! This allows YOU to get a passive protection  as well, see text here, please ===> Spybot – Search & Destroy offers the Immunization – a feature to allow you to immunize your computer against certain pieces of spyware.
It also allows you to use native browser settings to block cookies, malware installations, bad websites and other threats via ActiveX. SDHelper is an Internet Explorer plugin that adds a second layer for blocking threats. While the Permanent Immunity blocks installers by their ActiveX ID, this one blocks anything that should come through by different aspects.

Anything else WE could do? Of course, I invite YOU to read my following blog posts:

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.Stay tuned for next blog(s) 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Cyber-Security And Privacy Knowledge As Skills In The 21st Century Are NOT Yet Enough Taught And Present, WHY!?

.

userfredericmoser01Did YOU realize already that WE are living in the 21st Century and that WE nearly ALL are using the so called NEW TECHNOLOGIES, the internet, the smartphone(s), laptops, computerstablets, household goods who are connected to the internet, and this on a daily base!? Did YOU ever started THINKING about such consequences concerning YOUR Privacy and vulnerability to Cyber-Security!? As far as I know, from practice while talking to people, most people are NOT as nobody has given them advice, NOR were they taught about it in schools, and there is the problem!

In the digital age, as WE are living NOW in it, WE MUST learn on a daily base to adapt to its very quick change! Education can’t follow with that as it is and was almost years behind… It needs to have a ===> RETHINK <=== to catch up!

SO… By knowing this and accepting it ALSO (the most difficult, BUT…) WE would be good advised for learning on a daily base to get the MOST out of necessary knowledge and skills to give OUR kids the BEST Education possible, an ===> Up-To-Date <=== knowledge, a knowledge who isn’t ONLY a cherry-picked knowledge, BUT a knowledge who includes ALSO Privacy and Cyber-Security as also skills!

The future is also that any device, even in the household, will be connected to the internet. It is called “The Internet Of Things” and as with any NEW technical stuff, it brings risks and vulnerabilities

MOST of people don’t realize the importance of privacy, especially for Cyber-Security and Identity Theft, check the video below who explains very good, please.

.

.

After watching the video YOU certainly are surprised and hopefully also willing to learn a bit more, it is actually NOT that difficult as most people think.


Who’s To Blame For Cyber-Security problems!?

Surveys from professional companies are NOW ALSO showing that Cyber-Security is OUR ALL responsibility, check below, please…

.

CyberSecurity-Responsibility

Check the full article here, please:

To start with learning, I would suggest YOU to read my blog about it first:

.


The Internet Of Things

Check out my curation about it and read the articles to find out what “The Internet Of Things” is, please…

.

Internet Of Things

Click image OR follow this link ===> http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Internet+Of+Things

.


The Dangers And Vulnerabilities Of  The Internet Of Things

.

Same procedure again, read my curation about it to find out, it is THE easiest way to get aware of the existing dangers and to get convinced about that LEARNing about Cyber-Security is a MUST…

.

Internet Of Things Vulnerabilities and Dangers

Click image OR follow this link ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

.


Wearables

[Start text from Kaspersky] The word “wearable” was once merely an adjective describing an article of clothing that was easy to wear. Now “wearable” refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week. New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.” [End text from Kaspersky]

Learn more:

.


Additional And Informative Stuff

programmerman-animatedBelow YOU will find some Tweets which I posted, related to this Topic of Cyber-Security and who will give YOU also an overview on How-To YOU could create Tweets (Posts) on Social-Media Twitter. YOU may use them, BUT please give credit to me as I was its creator, thanks 😉

.

#THINK global ===> #act global <=== #CyberSecurity is a MUST as WHEN WE are ONLINE WE are already #surfing #2gether on THE #DataHIGHWAY 😉

.

#Naivety in the Digital Age? http://wp.me/p20Rwv-u4 

.

Do YOU realize WHAT’s happening in the #VirtualWorld!? #EdChat

.

Like in #RealWorld YOU need #1stAidKit & #Safety WHEN using tools, SO ALSO in #VirtualWorld! #EdTechChat #InternetSafety #CyberSecurity 1/2

.

2/2 Using tools in #VirtualWorld WE need ALSO #1stAidKit which is #Protection #Antivirus as well as #InternetSafety #knowledge! #EdTechChat

.

By analogy, anyone who selects only the data that appeals to them and supports their personal view or theory is called a cherry picker. SO… WHEN using #BYOD #EdTech tools #iWHATEVER #Apps ===> #LEARNing & #TEACHing about #CyberSecurity & #Privacy is a MUST! <===

.

NEW #Technology gives YOU the possibility 2 SHOW UP as… BUT its a dreaming world! DON’T loose the #REALITY 😉 Do YOU got #Maturity!??? InternetSafety existing but NOT for adults, seniors… MUST get updated and created .

.

.

That’s WHAT #Teachers #EDUcators are today, DON’T see #REALITY ===> The aim of art is to represent not the outward appearance of things, but their inward significance. -Aristotle <=== #EDUcators .

.

WHEN #Researchers #EDUcators #TEACHers are relating #CyberSecurity to #software ===> #BackToSchool with THEM!

.

Please #Update YOUR #knowledge WE need 2 #RETHINK how WE are using #ICT #Technology #EdTech #iWHATEVER #Apps as WE do it unconsciously MOSTLY without #Responsibility#EDU

.

WE MUST #RETHINK #HowTo use #ICT #Technology #EdTech #iWHATEVER #Apps as WE use unconsciously MOSTLY without #Responsibility#CyberSecurity

.

WE have to prepare OUR children a safe internet… #EDUcation SHOULD lead learners 4 the #FUTURE, BUT actionnaly is a #Century behind, especially its #LEADERS ===> #LeaderShip #CyberSecurity

.

Remember these words ===> #Responsibility & #NotYET <== as a guide 2 GO a step FURTHER as #preparation 4 THE #FUTURE of OUR #Kids 😉

.

Keywords necessary for me to create this blog:

RETHINK, habits, bidirectional, 2 way, technology in 21st Century, connected, household goods, internet of things, BYOD, EDU, teachers and educators role, teachers create other professions, NO HALF-BAKED KNOWLEDGE, NO GADGETS MENTALITY, NOT ONLY a software problem,”Critical-Thinking, Proactive-Thinking, community sharing, Twitter Chat, Life-Long-Learning, MORAL, ETHICS, PRIVACY, Maturity, naivety, Zeitgeist, Smart Homes, wearables, Augmented Reality, ..

.

Will get updated often, as I have to publish it one day, otherwise I would NEVER finish it!

 

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

You are very welcome to give me new ideas, would be appreciated! Stay tuned for next blog(s) 😉

.

 
4 Comments

Posted by on January 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Books, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Evernote, Facebook, Free courses, FREE-courses, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Identity Theft, Internet Of Things, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tracing, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Blogs To Follow

Cyber-Security Blogs To Follow

.

Learning basics of IT-Security and Cyber-Security.


WHY Should I Follow Security Blogs?

.

Chat iconWHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!?

Well, I will give YOU a question back: WHY should YOU read newspapers? It is as simple as that, WE need the information about WHAT is going on in the world and also WHAT is going on in the Virtual-World as both worlds, the Real-World and the Virtual-World (Internet), are influencing each other!

.

.

===> DON’T forget, in the word ICT is the letter “I“, which means “Information“, use it. <===

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online. SO… By reading those blogs and following ALSO those experts on Social-Media Twitter, YOU will learn slowly but surely about how to stay best protected and also what are the news where YOU need to be aware about! First step is ===> AWARENESS <===.


book-question-markNext step is to know how WE could get BEST protection and mostly for FREE:

WE need ALSO to get OUR daily stream of news, YES, I said daily stream of news as the Virtual-World is moving very quickly and WE need to be informed about WHAT is going on. A hard task indeed, BUT a MUST!!! Like everything else it is the beginning who is the most hardest, BUT once used to it it will just become a normal daily task, believe me 😉

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===

.

So, here below my selection of blogs from Cyber-Security experts, which I believe, are the most valuable ones which YOU should follow. These experts write on a style who is easily to understand and I learned a lot myself from them:

.

Graham CLULEY Blog

Graham CLULEY Blog

 

Naked Security (Sophos)

Naked Security Blog (Sophos)

Brian KREBS Blog

Brian KREBS Blog

F-Secure Blog

F-Secure Blog

SOFTPEDIA Security News

Softpedia Security News Blog

ZDNET

ZDNET

SCMAGAZINE

SCMAGAZINE Blog

arstechnica

arstechnica

PCWorld SECURITY

PCWorld

BBC Cyber-Security News

BBC Cybersecurity News

The Guardian

The Guardian

ITespresso (DE)

ITespresso (DE)

SECURELIST (KASPERSKY BLOG)

Securelist (KASPERSKY BLOG)

SILICON (FR)

SILICON (FR)

ZATAZ (FR)

ZATAZ (FR)

McAfee Labs Blog

McAfee Blog

.
sharing-iconThe above blogs are the blogs which I recommend as it is easy to understand them, that’s the ones I check first to understand as quick as possible what’s going on and to share my new acquired knowledge with others! Of course I use ALSO different OTHER sources for deeper learning, BUT that’s the sources from where one can grab information on the fly
.
.

As in a modern world WE use ALSO Social-Media, especially Twitter, I recommend the following people to follow:

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:

21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2014: Safer Internet Day 2014-Participation

SID2014: Safer Internet Day 2014-Participation

.

Evolution of Education: Wordle Logo

.


Safer Internet Day 2014 – Save the date!

.

sid2014-anim-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world.

Safer Internet Day 2014 will be celebrated on 11 February 2014. The strapline for the campaign is “Let’s create a better internet together”. 

This website showcases some of the exciting activities and events that took place across the globe to celebrate the day in 2013, and will be updated for 2014 as the campaign gathers pace. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You’ section to explore news from the many countries and institutions which were involved.

Alternatively, read the summary or the full public report on Safer Internet Day 2013 activities and successes.

Keep checking back for the latest news as the SID 2014 starts to take shape.

.SID2014-logo-BS-small

.


.

Learning IT-Security

.

My participation for the SID2014

.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2014 with my FREE courses here:

and also with my curation here:

.


Final word

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2014 on their blogs and/or websites :)

Where can I get the banners?

People who are on Twitter may use the hashtag #SID2014 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 
1 Comment

Posted by on July 10, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, HotSpot, HowTo, Ideas for a more secure Internet, Internet Monitor, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tutorials, Twitter Chat, Visual IT-Security, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW!

.

.Learning IT-Security

.


.

sid2014-anim-banner

ICT Awareness: What YOU SHOULD KNOW!

.

programmerman2Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones…) as well as I blog a lot about it and it’s a NEVER ENDING story as the Virtual-World (Internet) is becoming more and more tricky and starting to become a trap for lots of people while surfing in the jungle of information worldwide… SO… There was published a lot about it and most people are worry of such a lot of BIG DATA and don’t know anymore where to START to learn about it! To make it handy for YOU, I will give YOU again a 5 minute small course about it, check below, please… YOU will see WHAT YOU have to take care about to stay secure and then YOU might click the links for a deeper knowledge, don’t fear as it’s easy 😉

===> Education and TEACHers, this is especially for YOU! <===

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===

.

programmerman-animatedTHE known issues (there might be some more to get discovered…):

.

The World’s Biggest Data Breaches in One Stunning Visualization

.

Data-Breaches

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

The above mentioned are ONLY the most relevant where YOU need to take care about and the blog post will get updated when NEW ones are on the front!

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01The above mentioned tools are ALL part in Education and are getting used on a daily base from teachers and students around the world, AND Education doesn’t find it STILL necessary to teach the basics of Cyber-Security up from the early age!??? Did I say, the early age!??? YES, one can teach the kids the reflexes to stay secure up from five (5) years age, see link below:

.

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please 😦 <===

.

7 Cybersecurity Myths Busted

.

===> PRINT IT OUT and DISPLAY IT in YOUR CLASSROOM!!! <===

.

Read ALSO my daily NEWS:

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)………

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.

Stay tuned for next free courses and tutorials ;)

.

.

 
21 Comments

Posted by on June 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Education, eLearning, Encryption, Engagement, Environment, Evernote, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, Ideas for a more secure Internet, Instagram, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, JOOMLA, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Motivation, Naivety, Not ONLY rights but also responsibilities, OpenOffice Vulnerabilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, SID2014, Skype insecurity, Smart TV's, Social Engineering, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, TOR-Anonymat, Tracing, Tumblr, Tutorials, UBUNTU Forums, vBulletin Forum, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions!

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions!

.

Learning basics of IT-Security and Cyber-Security

.


.

sid2014-anim-banner

.

 

Introduction

programmerman2

In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human and I provided you also with some great FREE tools to get protected, as well that I gave you advice such as learning to become “Proactive -Thinking“, “Critical-Thinking” and I provided you also a plan on how to learn to get a maximum protection in a week time by applying protection on a step by step guide, as different other important articles… Just check the navigation menu on right hand side to find out, please…

.

YOU might say OK, WE did that, BUT: How To be sure that this is working!??? YOU are right, so here WE go to find it out!

.

I discovered today through Twitter a very interesting Tweet from http://www.virusbtn.com/blog/2013/06_04.xml which brought me to the following website and where I tried out the below:

.

Welcome to the AMTSOFeature Settings Check” for your favorite Anti-Malware solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.

  1. Test if my protection against the manual download of malware (EICAR.COM) is enabled
  2. Test if my protection against a drive-by download (EICAR.COM) is enabled
  3. Test if my protection against the download of a Potentially Unwanted Application (PUA) is enabled
  4. Test if protection against accessing a Phishing Page is enabled
  5. Test if my cloud protection is enabled

.

With these tools YOU could get more confidence about the Cyber-Security tools, BUT don’t forget that a protection of 100% doesn’t exist and that  The Weakest Link In The Security Chain Is The Human!

.


.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next free courses and tutorials ;)

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,