RSS

Category Archives: TOR-Anonymat

Luxembourg and Cyber-Security: HOW did it START?

Luxembourg and Cyber-Security: HOW did it START?

.

Evolution of Education: Wordle Logo

 

.


Luxembourg and Cyber-Security: HOW did it START?

HACKATHON LUXEMBOURG-2016.

Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.

.

Learn more:

First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:

 

1996: Creation of the CLUSSIL

Just a few months after the publication of the European Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) the CLUSSIL (CLUb de la Sécurité de Systèmes d’Information – Luxembourg) was created by 13 IT Security Specialists:
Jean-Marc Buchet, Jean-Marie Déom, Francis Durigneux, Hans-Werner Eiden, Sandrine Gallouédec, Carlo Harpes, Anne Hendrick, Claude Lenert, Bruno Mamer, August Mordijck, Yves Reding, Stephen Purser, Marc Schintgen.

1998: Gust MEES

First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).

2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.

2002: CASES

Personnes :

  • Serge Allegrezza – Directeur Direction de la Propriété Intellectuelle
  • Jean-Marie Reiff – Responsable OLAS
  • Henri Grethen – Ministre de l’Économie
  • François Biltgen – Ministre délégué aux Communication
  • Alexandre Dulaunoy – Consultant serveurs du monde du libre
    • Organisateur Hack.lu
    • Plus tard responsable CIRCL
  • Yves de Pril et William Robinet – CONOSTIX
    • Développeur du premier managed security system pour SME

 

2004-2007: MySecureIT 

Gust-MySecureIT

Click image to enlarge, please.

.

Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7ème” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.

2004: Gust MEES created the website http://www.internetmonitor.lu

2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)

04.02.2005: Lancement officiel de CASES

Le site web de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur. 

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

2005

Personnes

  • Etienne Schneider
  • Angélique Joyeux – rédaction français
  • Cyril Pierre-Bausse
  • Pour Telindus
    • Carlo Harpes
    • Cédric Mauny
    • Thierry Zoller

Le site de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

La version beta de l’outil de communication CASiX développée par CASES a été présentée et délivré à plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communauté et pour la communication avec le nœud national CASES. CASES a lancé une étude d’analyse des risques basée sur la méthode française EBIOS dans le Ministère de l’Économie et du Commerce extérieur, et ce en vue de formaliser une politique de sécurité pour le Ministère.

Lancement officiel de cases 04.02.2005

Première Hack.lu dans la chambre des métiers

Conférence sécurité pour PME dans la chambre des métiers

Début des formations MySecureIt

2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI

2006: Gust MEES

In February 23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

2006

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 4 octobre 2006, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectué sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.

Le Ministère de l’Économie et du Commerce extérieur a signé pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de Montréal dans le domaine de la sensibilisation des PME aux risques informatiques.

Les relations avec la Direction Centrale de Sécurité des Systèmes d’Information en France ont été intensifiées en vue de pouvoir conclure une entente de collaboration en 2007.

Le Ministère de l’Économie et du Commerce extérieur a, dans un effort commun avec le Ministère de l’Éducation nationale et de la Formation professionnelle, continué sa campagne de sensibilisation pour les enfants des classes de septième des lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une trentaine de classes.

2007-LUSI:

.

2007

Présentations et participation aux conférences

  • Au cours de l’année 2007, l’équipe de CASES a fait plus de quarante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le « Internet Security Day » , et à l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es écoles primaires et secondaires luxembourgeoises.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale HACK.lu. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants. À cause des attaques de type phishing, CASES a organisé un workshop tenu par l’organisation hautement renommée AntiPhishingWorkingGroup.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministèrede l’Économie et du Commerce extérieur, du Centre Informatique de l’État, de la Représentation Permanente du Luxembourg à Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a organisé un stand à la Belle Étoile pour le Safer Internet Day, une initiative de la Commission européenne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a été accueillie et plusieurs classes d’école sont venues faire leur permis web.

  • Une campagne contre le cyberbullying (harcèlement via les nouvelles technologies de l’information et de la communication) a été lancée en forme de projet pilote dans un lycée du Luxembourg. CASES a réussi à motiver tous les opérateurs de téléphones mobiles, le ministère de l’Éducation nationale, la Police grand-ducale, le Parquet, l’Université de Luxembourg ainsi que le projet www.lusi.lu à s’investir dans le projet et à trouver une réponse à ce nouveau fléau.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations expliquant comment faire du commerce électronique sécurisé. Grâce aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invité sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).

Le site Internet www.cases.lu

  • De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont été publiés sur le site de CASES. Plus de quatre-vingt alertes ont été mises sur le site pour avertir les internautes de vulnérabilités critiques ou importantes. La version allemande du site a également été lancée en 2007. CASES est aujourd’hui un des portails publics les plus visités au Luxembourg.

  • Deux permis web ont été conçus et mis en ligne. Le premier http://pwws.cases.lu est destiné aux enfants et vérifie leur savoir-faire dans plusieurs domaines du cyber-mode. Après avoir passé le test avec succès, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vérifiant les bons reflexes nécessaires pour faire du commerce électronique en toute sécurité a été publié sous l’adresse http://epass.cases.lu.

  • -Des conseils spécifiques pour le commerce électronique sécurisé ont été publiés sur le site de CASES. Un “flyer”commerce électronique a été rédigé et sera mis à disposition dans les guichets de banques dès début 2008.

Les collaborations de CASES

  • CASES, ensemble avec le CERT luxembourgeois, a aidé plusieurs banques de la place ainsi que l’ABBL à réagir de façon coordonnée contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin août 2007. PREMIERES attaques de type physhing.au Luxembourg.

Un projet pilote qui a pour but d’établir de bonnes pratiques sécuritaires au cœur des maisons de jeunesse a été lancé en collaboration avec le Service National de la Jeunesse et le ministèrede la Famille. Le but est de sécuriser le réseau informatique des maisons de jeunesse et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour adolescents.

  • CASES a contribué à l’élaboration d’un guide de bonnes pratiques pour la mise en place de réseaux sans fil dans des locaux publics. Le but de ce guide est de sécuriser le réseau sans fil et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour les clients. WiFi sécurisé

  • CASES a entamé une coopération avec le nouveau service de la DCSSI française en matière de sensibilisation du grand public.

  • CASES a été élu parmi les projets phares du domaine de la sensibilisation en Europe et a été invité pour la troisième fois de suite par l’European Network and Information Security Agency (ENISA) à faire une présentation sur le fonctionnement du projet.

  • CASES a, au cours des dernières années, su acquérir plusieurs partenariats avec des organisations étatiques étrangères ayant les mêmes missions de sensibilisation.

Projet CIP – Critical Infrastructure Protection La Direction du Commerce extérieur et de la Sécurité informatique a lancé, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont été élaborées. Des principes d’établissement du glossaire contenant les définitions et abréviations utilisées à travers tous les documents du projet ont été définis et un glossaire a été rédigé. Un schéma de classification selon trois dimensions (confidentialité, intégrité, disponibilité) avec plusieurs classes par dimension et règles de sécurité a été conçu et publié sur le site de CASES. Ce schéma servira de base pour un schéma de classification interne aux organisations. Il est destiné en premier lieu à créer un cadre pour l’échange d’informations entre le ministère de l’Economie et du Commerce extérieur et les opérateurs CIP. Finalement une cartographie des menaces a été rédigée.

Projet de mise en place d’un CSIRT gouvernemental

La Direction du Commerce électronique et de la Sécurité informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sécurité de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sécurité informatique fournira les services suivants aux entités gouvernementales:

  • gestion et réponse sur incidents,

  • veille technologique,

  • bulletins d’alertes et d’avertissements,

  • point de contact et de coordination national pour toutes questions du domaine de la sécurité de l’information.

Dans le cadre du projet CSIRT, la Direction du Commerce électronique et de la Sécurité informatique a participé aux réunions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de développer des partenariats importants pour la suite du projet.Démontrant sa forte implication dans le domaine CSIRT, le ministère a co-organisé et hébergé la formation TRANSITS (formation spécialisé CSIRT, effectué par TF-CSIRT, et unique dans sons genre) au Luxembourg.

Projet Politique de Sécurité

La Direction du Commerce extérieur et de la Sécurité informatique a commencé à rédiger une politique de sécurité basée sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sécurité des systèmes d’information. Une vingtaine de politiques ont été rédigées, les procédures y référant sont rédigées au cours de l’année 2008. Ce projet vise premièrement à réaliser une politique de sécurité pour le ministère de l’Économie et du Commerce extérieur et, deuxièmement, à donner aux autres Ministères et administrations intéressées un guide de mise en place.

2008.

2008: LISA Stopline started 2008

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((

Knol-Author-of-the-week

Through the way-back-machine web.archive.org I found back some stuff:

2008

Au cours de l’année 2008, l’équipe de CASES a fait plus que cinquante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et à l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministères et administrations luxembourgeoises.

  • CASES a su réaliser l’exploit de former dans l’année scolaire 2007-2008, les enfants des lycées classiques et techniques fréquentant les classes de 7 ème au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont été réalisées. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet.CASES a aussi réalisé une dizaine de soirées d’informations pour parents d’élèves.CASES sensibilise aussi aux risques d’arnaques sur Internet.

  • CASES a participé au salon de l’éducation organisé par la Ville de Luxembourg et à la journée “Summer –Spill a Spass” organisée par la Ville de Dudelange, aux ateliers pédagogiques du Lycée Marie Consolatrice à Esch/Alzette. CASES est intervenu lors des journées pédagogiques de la Banque de Luxembourg et a participé à la “e-City roadshow” organisée par la Ville de Luxembourg. CASES a activement participé au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” à Contern et aux “Journées du livre” à Bascharage.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale “HACK.lu”. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministère de la Fonction Publique et de la Réforme administrative, Trésorerie de l’État, Centre de Logopédie, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a su réaliser un partenariat avec “Le Luxemburger Wort”. CASES a publié chaque semaine un article de sensibilisation dans ce journal de très grande couverture. Ainsi plus de quarante articles de presse ont été publiés.- Dans le cadre de la coopération avec le “Luxemburger Wort”,

  • un test de “Wardriving” a été réalisé dans la Ville de Luxembourg. Ce test a démontré que la sécurité dans le domaine des réseaux sans fil est déplorable.

  • – CASES a contribué à une dizaine d’émissions radio sur 100,7.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sécurité a été proposé avec un très grand succès. Lors de la foire d’automne, une campagne de sensibilisation aux risques liés à “Bluetooth” a été réalisée.

  • Une enquête sur les performances du social engineering a été réalisée en partenariat avec l’Université de Luxembourg. Lors de cette enquête, il a été essayé d’inciter les personnes questionnées à donner leur mot de passe. Plus de 1000 personnes ont été questionnées. Un rapport détaillé a été publié sur le site de CASES.

  • – CASES a lancé le label “suivant les réflexes CASES”. Une première déclinaison de ce label a été réalisée avec le label “WiFi sécurisé” qui a été attribué, après audit, à 3 sociétés sur 6 sites

Projet Politique de Sécurité

  • CASES a, ensemble avec le ministère de la Famille et le SNJ, réalisé un projet d„envergure pour mettre en sécurité les Maisons de Jeunes. Une politique de sécurité ainsi que des guides de bonnes pratiques ont été réalisés.

  • En collaboration avec le ministère de l’Éducation, un projet pour la mise en sécurité des Écoles primaires a été entamé. Deux projets pilotes ont été entamés.

  • Un projet de mise en place d’une politique de sécurité a été lancé en 2008 au sein d’une administration gouvernementale

 

2009

CASES a su réaliser l’exploit de former dans l’année scolaire 2008-2009, tous les enfants des lycées classiques et techniques fréquentant les classes de 7èmeau Luxembourg. Beaucoup de classes primaires ont été formées, et ce à partir de l’âge de 9 ans. En tout CASES a sensibilisé les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet. CASES a aussi réalisé une vingtaine de soirées d’informations pour parents d’élèves.

CASES a participé au «Kannerstaat» de la ville de Junglinster.

CASES a publié un support scolaire, destiné aux instituteurs et aux parents. Ce livre vise à fournir les informations nécessaires pour pouvoir éduquer les enfants dans différents domaines liés à la sécurité de l’information. LEITFADEN

Collaboration avec le DNR

NACKT im NETZ

2010

  • Campagne brosses à dents
  • Création de smile GIE

 

2010: BEESECURE

Le ministre de l’économie Jeannot Krecké a présenté le 8 novembre 2010 BEE SECURE, un projet commun du Ministère de l’Economie et du Commerce extérieur, du Ministère de la Famille et de l’Intégration et du Ministère de l’Education et de la Formation Professionnelle.

5 Jahre sind im Internetzeitalter ganz schön lange und für BEE SECURE auf jeden Fall Grund genug, Partner und Unterstützer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.

So versammelten sich am 9. Oktober rund 100 geladene Gäste im Forum Geesseknäppchen, wo allerhand „Requisiten“ der letzten fünf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.

Annual Reports BEESECURE – Starting 2010

 

2011

Analyse des risques

2012

Stopline

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2012

My.cases.lu

 

May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com

 

2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD <===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.

2013

higher-education-tech-blogs-2013-Doug PETERSON.

Gust MEES got interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.


More to come here, lots of research necessary… Meanwhile follow the following articles (curation) and links:


2017: 

Cybersecurity week in October:

 

.


2016: WHAT is done in the country!? WHICH actors are helping to boost Cyber-Security!?

There are more and more companies and organisations offering courses about Cyber Security, such as:

 


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

.

 

.

Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,

.

 

 

 
Leave a comment

Posted by on November 22, 2017 in 21st Century Skills, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, European Cyber Security Month, History, History of the web, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning about Social Medias, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Phishing, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, PUPs, Quality Courses, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2014, SID2015, SID2016, SID2017, Skills, Skype insecurity, Smart TV's, Social Engineering, Social Media, Spam, Synthesizing Mind, Teacherpreneurs, Third Party Applications, TOR-Anonymat, TU-DRESDEN

 

Tags: , , , , , , , , , , ,

SID2017: Safer Internet Day 2017-Participation

SID2017: Safer Internet Day 2017-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2017 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2017 will be celebrated on Tuesday 07 February 2017, with the strapline of ===> „Be the change: unite for a better internet“ <=== following the success of last year’s campaign.

.

sid-gif

Click the animated image please to access the article.

 

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2017

programmerman-animatedWHAT is special this year with my participation on SID2017

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2017 in Luxembourg/Europe.

.

Click the image please to access the article.

 

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2017 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2017 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2017 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

 

 
Leave a comment

Posted by on January 30, 2017 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Analyzing, Apps, Autodidact, Awareness, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Big Data, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Comics, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Criticism, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Device Theft, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Emotional Intelligence, Encryption, Engagement, Entrepreneurship, EQ, eSkills, Ethical Mind, ethics, Europe, FAQ, Feedback, Free courses, Get smart with 5 minutes tutorials, Global, Global Collaboration, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learn with books, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Seniors, SID2017, Skills, Smart TV's, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, TOR-Anonymat, Tracing, Tutorials, understanding, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW!

.

.Learning IT-Security

.


.

sid2014-anim-banner

ICT Awareness: What YOU SHOULD KNOW!

.

programmerman2Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones…) as well as I blog a lot about it and it’s a NEVER ENDING story as the Virtual-World (Internet) is becoming more and more tricky and starting to become a trap for lots of people while surfing in the jungle of information worldwide… SO… There was published a lot about it and most people are worry of such a lot of BIG DATA and don’t know anymore where to START to learn about it! To make it handy for YOU, I will give YOU again a 5 minute small course about it, check below, please… YOU will see WHAT YOU have to take care about to stay secure and then YOU might click the links for a deeper knowledge, don’t fear as it’s easy 😉

===> Education and TEACHers, this is especially for YOU! <===

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===

.

programmerman-animatedTHE known issues (there might be some more to get discovered…):

.

The World’s Biggest Data Breaches in One Stunning Visualization

.

Data-Breaches

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

The above mentioned are ONLY the most relevant where YOU need to take care about and the blog post will get updated when NEW ones are on the front!

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01The above mentioned tools are ALL part in Education and are getting used on a daily base from teachers and students around the world, AND Education doesn’t find it STILL necessary to teach the basics of Cyber-Security up from the early age!??? Did I say, the early age!??? YES, one can teach the kids the reflexes to stay secure up from five (5) years age, see link below:

.

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please 😦 <===

.

7 Cybersecurity Myths Busted

.

===> PRINT IT OUT and DISPLAY IT in YOUR CLASSROOM!!! <===

.

Read ALSO my daily NEWS:

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)………

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.

Stay tuned for next free courses and tutorials ;)

.

.

 
21 Comments

Posted by on June 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Education, eLearning, Encryption, Engagement, Environment, Evernote, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, Ideas for a more secure Internet, Instagram, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, JOOMLA, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Motivation, Naivety, Not ONLY rights but also responsibilities, OpenOffice Vulnerabilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, SID2014, Skype insecurity, Smart TV's, Social Engineering, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, TOR-Anonymat, Tracing, Tumblr, Tutorials, UBUNTU Forums, vBulletin Forum, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Learning basics of IT-Security and Cyber-Security.


 .

sid2014-anim-banner

.

.

Learning from the fails of others for a BETTER more secure Internet!

Keywords for this free course:

.

programmerman-animatedNaivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.


Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!

.

programmerman2What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvetynaïveté, etc.), is the state of being naive—having or showing a lack of experienceunderstanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]

.

.

Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…

Some go even further and call it: The Internet Plays Role of Stupidity Amplifier

.

Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…

.

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

.


Wearables and the Army

GHCQ-WEARABLES-HEATMAP-FITNESS TRACKING

Image Credit: Click image please to access the article

Strava fitness app divulges heatmap of secretive British SAS base

A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.

A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.

Read more:

.


Terms Of Service: Do YOU READ THEM!?

.

NAIVETY-First Born Child-2014

Click the above image, please, to access the video explaining in detail.

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

 Click the image to access the full article, please.

.

I recommend STRONGLY to READ my article below, please:

.


Social Engineering

.

Social Engineering Infographic

 

Click the above image, please. to access its source.

.

Learn more about Social Engineering:


TOR And Anonymity!???

.

TOR-2014-cybercrime

Click the image above to access the article AND LEARN that ===> Anonymity DOESN’T exist!!! <===

.

Learn more:

.


Looks Like WE MUST Include Apple! 😉

.So, what does that mean? Analyzing what Wikipedia says, that’s meant for IT-Security and Cyber-Security:

mac-before-after-animated

.

Apple-first-automated-update-2014

Click the above image, please, to access the article.

.

August 2015

Mac-2015-Apple

Click the above image, please, to access the article.

.

Learn more:

 


WHAT about GOOGLE!?

Google-Router-NAIVETY.

.

.

.

Well, I didn’t expect that one, OH SHAME!!! Read the article below please:

.

.

.

.

.


More examples on NOT TO DO!

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.


WHAT’S YOUR PASSWORD!?

A PASSWORD should NEVER getting shared with others! A PASSWORD should be very STRONG! Check below the ===> NOT TO DO!!! <===

.

.

Read ALSO (in German) below, please.

.

NAIVETY-PASSWORDS

 

Click the above image, please, to access the article.

.

 

Army and PassWords

. prince-william-army . Find full story here: Prince William photos accidentally reveal RAF password .


Football (Soccer) WM2014

.

And the World Cup Security Centre’s WiFi password is…

.

WM2014-Football-Brazil

.

Check the article here:

.


Normal Users and PassWords

55% of net users use the same password for most, if not all, websites. When will they learn?

dunce-hat-170[START Text from SOPHOS] According to Ofcom’s “Adults’ Media Use and Attitudes Report 2013” report, a poll of 1805 adults aged 16 and over discovered that 55% of them used the same password for most – if not all! – websites.

Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!

If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]

.


Photos and GeoTagging

Army

.

Army-Photos-Geotagging

Credits to: http://gizmodo.com/5892054/us-soldiers-are-giving-away-their-positions-with-geotagged-photos

.


Jailed cybercriminal hacked into his own prison’s computer system after being put in IT class

. programmerman2 . .

.

What sounds like a joke isn’t one, that’s the truth! Read the full story here: .

.

.


Encryption:

Encryption-SecurityScore-before-after

Encryption-SecurityScore-before-after

. . . .

.

.

. . . .

.

.

.

..

. .


Lost USB-Sticks, External Hard Disks and Laptops

External Hard DiskAn external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.

This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.

.


Calif. Health vendor laptop stolen; nearly 70K affected

.

Encryption-SecurityScore-before-after

.

.

.

.

An unencrypted laptop belonging to a California health care vendor was stolen, leaving the sensitive information of thousands of patients at risk.

===> How many victims? More than 68,000. <===

.

.

.

.


US-Confetti-Scandal

.

US-Confetti-Scandal

US-Confetti-Scandal

.

[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.

“I’m just completely in shock,” said Finkelstein, 18. “How could someone have this kind of information, and how could it be distributed at the Thanksgiving Day Parade?” [End Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story]

.

.


Potentially Life-Threatening Apple Maps Flaw

Apple Map-potentially life-threatening issue . . . . .. .

.

.

.

.

[Start Text from FORBES]  Embarrassing defects in Apple‘s new Maps app may be inconvenient for some, but for others in Australia they could be deadly. [End Text from FORBES]

.

.

.

.

.

.


The VISA CARD Scam

.

VISA CARD Scam

.

The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:

.


Downloading from not trustful websites

programmerman2Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]

.

.

.


Game Hacks are dangerous

[Start Text from AVG]

programmerman2

.

In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.

==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==

While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.

===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===

.

[End Text from AVG]

.

Learn more:

.


Windows Users: check your PC for better Security

Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.

.

.

Find a detailed report about this fantastic tool from PC-MAG http://securitywatch.pcmag.com/none/305013-what-s-your-security-score.

===> Is there a FREE tool for encrypting my files and even the whole hard disk? YES, I suggest to install the OpenSource program TrueCrypt: <===


Apps, privacy and security

. Apps, privacy and security . Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:

Good example on how an App accesses your data below . apps thinglink

.

This App from ThingLink is one of the best examples of good practice as it doesn’t  access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage

===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===

.

Bad App Example

.

Read also:

  • Mobile app downloads doubling, privacy & identity risks rise
    • Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.

As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===

Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:


Be concerned about your Privacy while using Smartphones

Chat iconWhile using your Smartphone you probably send out more private data as you know, would like to and shouldn’t do! Read this story who should make you aware [Start Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101

Antivirus pioneer John McAfee, wanted for questioning as a person of interest in the murder of his neighbor in Belize, has been on the run from authorities ever since the incident occurred. Oops. Perhaps, when allowing reporters to taunt your pursuers with a headline like, “We are with John McAfee right now, suckers,” you should request that the Location Data is turned off on the phone[End Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101]

Here below some interesting links guiding you through on how to preserve your Privacy:

.


Naivety in the Digital Age, a Fact

Chat iconNaivety in the Digital Age means not realizing and accepting the dangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinking skills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!

.

.

.

Concerning download sites, here are the trustful download websites:

.

One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!

It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!

But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:

  • IT-Security and Cyber-Security:

===> Naif means ALSO thinking that a certain Operating System is secure and perfect! Nobody is perfect: <===

Check out also my curation here:

. .

In 21st Century Internet-Safety ALONE isn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!

Would YOU like to get called a naif because not having those skills?

Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…

Stay also tuned and follow my blog here to get the news:

.


Are You Safe From Cybercrime?

.

Cyber-Criminals[Beginning Text from Mashable] In our Cybercrime Series, presented by NortonMashable explores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]

Find out more:

.. .

Not so clever after all…man falls victim to IQ test scam

programmerman2A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.

After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.

Read the whole story here, you will get a big laugh:


And WHAT about Social Media publishing!???

.

It took me a really a while before I took the courage to post the following now:

Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudes from people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!

.

Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:

  • Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
  • SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((

..

A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉

.


 The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!


.Anything else which is important? YES, ICT Awareness!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:

.


KEYWORDS FOR THIS FREE COURSE AND WHAT YOU WILL LEARN:

Check out:

.

comp6_e0

YOU will learn NOT to be a naif and to see the reality!

Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. Aristotle <===

.   Take your time, please! There are a lot of information for some to learn; take it easy ;) .

.

 


..

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

. .

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 
28 Comments

Posted by on November 5, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Education, eLearning, Encryption, Europe, European Cyber Security Month, FAQ, FBI, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Worksheets, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Safer Internet Day 2014, Secure Surfing, SID2014, Skills, Social Engineering, Social Media, Students 21st Century Survival Guide, Technology Integration, TOR-Anonymat, Tracing, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,