RSS

Tag Archives: dangers of Internet

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Learning basics of IT-Security and Cyber-Security.


 .

sid2014-anim-banner

.

.

Learning from the fails of others for a BETTER more secure Internet!

Keywords for this free course:

.

programmerman-animatedNaivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.


Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!

.

programmerman2What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvetynaïveté, etc.), is the state of being naive—having or showing a lack of experienceunderstanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]

.

.

Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…

Some go even further and call it: The Internet Plays Role of Stupidity Amplifier

.

Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…

.

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

.


Wearables and the Army

GHCQ-WEARABLES-HEATMAP-FITNESS TRACKING

Image Credit: Click image please to access the article

Strava fitness app divulges heatmap of secretive British SAS base

A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.

A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.

Read more:

.


Terms Of Service: Do YOU READ THEM!?

.

NAIVETY-First Born Child-2014

Click the above image, please, to access the video explaining in detail.

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

 Click the image to access the full article, please.

.

I recommend STRONGLY to READ my article below, please:

.


Social Engineering

.

Social Engineering Infographic

 

Click the above image, please. to access its source.

.

Learn more about Social Engineering:


TOR And Anonymity!???

.

TOR-2014-cybercrime

Click the image above to access the article AND LEARN that ===> Anonymity DOESN’T exist!!! <===

.

Learn more:

.


Looks Like WE MUST Include Apple! 😉

.So, what does that mean? Analyzing what Wikipedia says, that’s meant for IT-Security and Cyber-Security:

mac-before-after-animated

.

Apple-first-automated-update-2014

Click the above image, please, to access the article.

.

August 2015

Mac-2015-Apple

Click the above image, please, to access the article.

.

Learn more:

 


WHAT about GOOGLE!?

Google-Router-NAIVETY.

.

.

.

Well, I didn’t expect that one, OH SHAME!!! Read the article below please:

.

.

.

.

.


More examples on NOT TO DO!

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.


WHAT’S YOUR PASSWORD!?

A PASSWORD should NEVER getting shared with others! A PASSWORD should be very STRONG! Check below the ===> NOT TO DO!!! <===

.

.

Read ALSO (in German) below, please.

.

NAIVETY-PASSWORDS

 

Click the above image, please, to access the article.

.

 

Army and PassWords

. prince-william-army . Find full story here: Prince William photos accidentally reveal RAF password .


Football (Soccer) WM2014

.

And the World Cup Security Centre’s WiFi password is…

.

WM2014-Football-Brazil

.

Check the article here:

.


Normal Users and PassWords

55% of net users use the same password for most, if not all, websites. When will they learn?

dunce-hat-170[START Text from SOPHOS] According to Ofcom’s “Adults’ Media Use and Attitudes Report 2013” report, a poll of 1805 adults aged 16 and over discovered that 55% of them used the same password for most – if not all! – websites.

Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!

If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]

.


Photos and GeoTagging

Army

.

Army-Photos-Geotagging

Credits to: http://gizmodo.com/5892054/us-soldiers-are-giving-away-their-positions-with-geotagged-photos

.


Jailed cybercriminal hacked into his own prison’s computer system after being put in IT class

. programmerman2 . .

.

What sounds like a joke isn’t one, that’s the truth! Read the full story here: .

.

.


Encryption:

Encryption-SecurityScore-before-after

Encryption-SecurityScore-before-after

. . . .

.

.

. . . .

.

.

.

..

. .


Lost USB-Sticks, External Hard Disks and Laptops

External Hard DiskAn external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.

This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.

.


Calif. Health vendor laptop stolen; nearly 70K affected

.

Encryption-SecurityScore-before-after

.

.

.

.

An unencrypted laptop belonging to a California health care vendor was stolen, leaving the sensitive information of thousands of patients at risk.

===> How many victims? More than 68,000. <===

.

.

.

.


US-Confetti-Scandal

.

US-Confetti-Scandal

US-Confetti-Scandal

.

[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.

“I’m just completely in shock,” said Finkelstein, 18. “How could someone have this kind of information, and how could it be distributed at the Thanksgiving Day Parade?” [End Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story]

.

.


Potentially Life-Threatening Apple Maps Flaw

Apple Map-potentially life-threatening issue . . . . .. .

.

.

.

.

[Start Text from FORBES]  Embarrassing defects in Apple‘s new Maps app may be inconvenient for some, but for others in Australia they could be deadly. [End Text from FORBES]

.

.

.

.

.

.


The VISA CARD Scam

.

VISA CARD Scam

.

The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:

.


Downloading from not trustful websites

programmerman2Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]

.

.

.


Game Hacks are dangerous

[Start Text from AVG]

programmerman2

.

In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.

==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==

While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.

===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===

.

[End Text from AVG]

.

Learn more:

.


Windows Users: check your PC for better Security

Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.

.

.

Find a detailed report about this fantastic tool from PC-MAG http://securitywatch.pcmag.com/none/305013-what-s-your-security-score.

===> Is there a FREE tool for encrypting my files and even the whole hard disk? YES, I suggest to install the OpenSource program TrueCrypt: <===


Apps, privacy and security

. Apps, privacy and security . Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:

Good example on how an App accesses your data below . apps thinglink

.

This App from ThingLink is one of the best examples of good practice as it doesn’t  access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage

===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===

.

Bad App Example

.

Read also:

  • Mobile app downloads doubling, privacy & identity risks rise
    • Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.

As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===

Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:


Be concerned about your Privacy while using Smartphones

Chat iconWhile using your Smartphone you probably send out more private data as you know, would like to and shouldn’t do! Read this story who should make you aware [Start Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101

Antivirus pioneer John McAfee, wanted for questioning as a person of interest in the murder of his neighbor in Belize, has been on the run from authorities ever since the incident occurred. Oops. Perhaps, when allowing reporters to taunt your pursuers with a headline like, “We are with John McAfee right now, suckers,” you should request that the Location Data is turned off on the phone[End Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101]

Here below some interesting links guiding you through on how to preserve your Privacy:

.


Naivety in the Digital Age, a Fact

Chat iconNaivety in the Digital Age means not realizing and accepting the dangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinking skills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!

.

.

.

Concerning download sites, here are the trustful download websites:

.

One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!

It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!

But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:

  • IT-Security and Cyber-Security:

===> Naif means ALSO thinking that a certain Operating System is secure and perfect! Nobody is perfect: <===

Check out also my curation here:

. .

In 21st Century Internet-Safety ALONE isn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!

Would YOU like to get called a naif because not having those skills?

Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…

Stay also tuned and follow my blog here to get the news:

.


Are You Safe From Cybercrime?

.

Cyber-Criminals[Beginning Text from Mashable] In our Cybercrime Series, presented by NortonMashable explores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]

Find out more:

.. .

Not so clever after all…man falls victim to IQ test scam

programmerman2A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.

After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.

Read the whole story here, you will get a big laugh:


And WHAT about Social Media publishing!???

.

It took me a really a while before I took the courage to post the following now:

Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudes from people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!

.

Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:

  • Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
  • SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((

..

A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉

.


 The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!


.Anything else which is important? YES, ICT Awareness!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:

.


KEYWORDS FOR THIS FREE COURSE AND WHAT YOU WILL LEARN:

Check out:

.

comp6_e0

YOU will learn NOT to be a naif and to see the reality!

Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. Aristotle <===

.   Take your time, please! There are a lot of information for some to learn; take it easy ;) .

.

 


..

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

. .

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 
28 Comments

Posted by on November 5, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Education, eLearning, Encryption, Europe, European Cyber Security Month, FAQ, FBI, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Worksheets, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Safer Internet Day 2014, Secure Surfing, SID2014, Skills, Social Engineering, Social Media, Students 21st Century Survival Guide, Technology Integration, TOR-Anonymat, Tracing, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

..

Learning IT-Security

Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!

.

.

.

.

Check the map below to see in real time DDoS attacks, attacks made with infected computers!

.

denial-of-service attacks in real time

Click image map to see in real time the DDoS attacks!

.

Check ALSO my blog below, who shows you more interactive maps:

.

 

..

.

In this ctraffic light greenourse you will learn:

          • Why there is a need to protect your computer.
          • Why a computer is in danger to get a virus, trojan, and other malware infections.
          • Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!

Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…

.

===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===

Keywords for learners and especially for teachers and educators who want to use this free course to build their own course

community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…

.

 

 

.

English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !

.


Introduction to Visual IT-Security

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

Video 1: “Weird Al” Yankovic – Virus Alert

.

.


Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

Video MALWARE: What is Botnet?.

Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.

.

.

Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!

Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:

 

.


Video Beyond Today: Mikko Hypponen – Zeitgeist 2012

.


Critical Thinking

Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chat icon, speeching people

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected computer is same ===> epidemic danger!
        • You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
  • Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do you know that Cyber-Criminals earn more money than others with Drugs?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.

Some important data who should wake you up!

.

Image source

.

[Start] Text from AllThingsDigital (JULY 4, 2012 AT 7:24 AM PT)

If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.

Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]

.

Video: U.S. is under “Cyber Attack”

.

.
Related links:
.
.

Flame Proves Cyber Warfare is ACTIVE

A MUST READ:
.
Flame proves cyberwarfare is active
.

Video E: VOLUTION

Computer crime is getting worse?

  • What three indicators mentioned in the video indicate to you that computer crime is getting worse?
  • What does it mean when someone says “a virus has evolved”??

Check the video to find out…

.
.

Video A Quick Guide To Scary Stuff on the Internet (Part 3)

After watching this video you will be able to answer the following five questions:



.

Ever thought about that your smartphone is also a computer with phone capabilities?

.
.
.
See screenshot below who shows you the Quarter Report 2012 from McAfee and download the PDF document with full report by clicking the image…
.
McAfee Threats Report - First Quarter 2012
.
.

SUMMARY

So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do you realize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:

.

community logo

Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update yourThird Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.

It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:

  • The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)

.

Additional Questions on Cyber Weapons & Government Attacks

help books logo

          • This sounds strange to me, never heard about Government attacks!?
          • How can it happen that my computer helps attacking Government web sites?
          • I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
          • I have a Mac computer, I don’t worry, I am not concerned! BIG LOL for that, check here http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security and wake up please!

.

As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!


Video DDoS Angriff (Theorie) – German

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


.Video INTERNET: La cyber-criminalité –  French

Video in French.

cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,

Check video by clicking the link here or click image: L’Essentiel (LU)

..


IT SECURITY Expert Reports

.

Curation about IT-Security, Cyberwar, Cyber-Warfare,Internet-Safety,Online-Safety,Cyber-Security

itsecurity,cybersecurity,cyberwar,cyberwarfare,curation,internetsafety,onlinesafety,infosec,

.

.
The Costs Of Cybercrime

 

The Costs Of Cyber-Crime: click image
.

Definition of IT Security in simple words

.

computer logoIT-Security means proactive thinking, acting before it happens! Knowing the dangers of Internet and being prepared for them!

.

.

IT-Security is:

  1. Critical-Thinking
  2. Think everytime on worst-case who could happen
  3. Forewarned is Forearmed, stay informed!
.

Additional Readings

.

Attention logoCyber-Attacks on Governments

Read also the news about already known Cyber-Attacks on Government web sites (will get updated as soon as there are new attacks):

.

Cyber-Crime


IT Security, Twitter, & the Use of Hashtags (#)

Twitter logo

As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.

What are Hashtags?

.
.

Follow me

Gust MEES on Twitter and best Hashtags on Twitter for following news about IT-Security.


share with different persons

.

Other IT‐Security People to Follow on Twitter, my suggestions are:

Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbett who gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…


Freeware & Commercial Protection Software

gearing

Check here to find best freeware and commercial protection software:

.
.
.

Final Word

===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===

Best Hashtag for Social Media is #SoMe.

I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!

As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…

.

..

Image showing community

BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!

PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!

.

.

.

blue man pointing to an important textRecommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security


as on Wednesday 06, 2012 @WebrootRescue We’re very happy to be recommended and used by @knolinfos, an #ITsecurity expert & instructor! Our story: http://bit.ly/GRkX6l

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next courses and tutorials 😉

.

 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Get smart with 5 minutes tutorials/IT-Security/Part 4: Surf more secure-which web sites to trust?

Get smart with 5 minutes tutorials/IT-Security/Part 4: Surf more secure-which web sites to trust?

Hi,

I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security 😉

.Learning IT-Security

.

What we already learned in Part1 + Part2 + Part3:

.

The browser, such as: Internet Explorer [IE], Mozilla FirefoxGoogle ChromeSafari + … is the gateway for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computer by only visiting a web site!!!

.

.

Very important and what most of people don’t know and don’t realize: 

  • Any installed software on your computer must be updated as older versions might have a vulnerability who could get exploited by the bad guys to take control over your computer!
  • Not every web site you are visiting and/or who you find in the search results of search Engines are trustworthy and/or secure!

.


Let’s go for part 4: Surf more secure-which web sites to trust?

.

A bit of theory. If you don’t like, switch to first screenshot shown below to start straight of for practice. But it might be good (important) to know that theory, take your time, please 😉

.

First a reminder and the most important to know to have best protection on your computer:

 What you MUST KNOW!

      • Automatic Windows Update must be enabled
      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

 

.


Secure Surfing Behavior

.

One can’t trust any web site and any content published on Internet, don’t be naive! It’s the same as on real world, there are bad guys and good guys, but how to find out? My favorite FREE Software to make me my Online Life easier and more secure as they show me which web sites are trustworthy and which web sites I shouldn’t visit at all because they are malicious and could infect my computer is McAfee SiteAdvisor!!! But don’t forget also, there is and never will be a 100% security!

.

Tip: you may use different similar software and add-ons together, there is no problem to do so. I use McAfee SiteAdvisor, WOT and as I have installed Symantec Internet Security (security suite) I get also their results shown… Other Security-Suites from different security manufacturers are also proposing similar solutions…

.

First look what happens when clicking on any link without knowing if that web site is trustworthy and/or secure (not malicious), watch the video below please.

.

..


McAfee SiteAdvisor™ software

McAfee SiteAdvisor™ software

McAfee SiteAdvisor™, software is an award-winning, free browser plug-in that gives safety advice about Websites before you click on a risky site. These site ratings are based on tests conducted by McAfee using an army of computers that look for all kinds of threats (detailed below). The result is a guide to Web safety. The SiteAdvisor software is free, easy to install and even easier to use. And it doesn’t collect any personally identifiable information.

.

===> Check out here for downloadMcAfee SideAdvisor: http://home.mcafee.com/store/free-services <===

.

Let me show an practice example here with a request on a Search Engine (Google) with search word “serialz“, I choose this word to show you ALSO the danger of trying to use illegal software, as you will get a “special bonus“, an infection of your computer with a “Trojan“, “backdoor” and other “malware” while downloading them and/or by using these not serious and illegal services, but check yourself by “learning by doing“; search first without having installed McAfee SiteAdvisor (but without clicking the proposed links, otherwise your computer will be infected) and then install the FREE service from McAfee SiteAdvisor and make the same search, screenshot below shows you the results obtained with different protection software installed (WOT, McAfee SiteAdvisor)…

.

Google search result screenshot

.

First result found in Google shows a web site which is detected as malicious, so don’t use the web sites marked wit a red dot!

.

By moving the cursor over that “red dot” you will get more information about the state of security of that web site, so NEVER click on such links!!!

.

McAfee SiteAdvisor in practice

.


This works ALSO for photos, e.g. search for “justin bieber”, check out screenshot below please.

.

McAfee SiteAdvisor in practice

.

You will see again this “red dot” on right hand photo, NEVER click on such photos and don’t download them also!!!


ALSO available for Mac users now

.

McAfee SiteAdvisor for Mac

Other similar products:



..Don’t want to read all the above text and start the practice?

.

ruotadentata2architet01 Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identifying suspect web sites
      • McAfee Site Advisor ===> helps you identifying suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

 

.

.

Lots of new technical words, isn’t it? I will try to prepare also a technical dictionary about ALL these strange used words and review my tutorials by publishing inside them the signification of these words, coming soon, stay tuned… Step by step we go further 😉

.

.

Gust MEES.Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)......


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,