Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Are YOU aware of the dangers of WiFi on public places? YOU should!
.
.
Protect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
Click the above image, please, to access the video explaining in detail.
.
.
128
.
.
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
.
A public, non secured WiFi Access can intercept all of our internet traffic…
With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
.
Read here the full article who explains very well:
So how can we protect us against those threats (MAC and Windows and Linux)???
By using a public WiFi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway.
.
.
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:
Get behind the SHIELD! 100% FREE!
Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
Protect yourself from identity theft online.
Hide your IP address for your privacy online.
Access all content privately without censorship; bypass firewalls.
Protect yourself from snoopers at WiFi hotspots, hotels, airports, corporate offices.
Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)
Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
Any device connecting to public WiFi could get sniffed, even Smartphones, so use DroidSheep Guard to secure your Facebook, eBay, Twitter, LinkedIn etc accounts from “Man In The Middle” attacks on public WiFi!
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).....
Learning from the fails of others for a BETTER more secure Internet!
Keywords for this free course:
.
Naivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
.
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!
.
What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvety, naïveté, etc.), is the state of being naive—having or showing a lack of experience, understanding or sophistication, often in a context where one neglectspragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]
.
.
Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…
Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…
.
Smile: Your Selfie Is A Mugshot For The NSA | Naivety
Image Credit: Click image please to access the article
Strava fitness app divulges heatmap of secretive British SAS base
A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.
A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!
If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]
An external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.
This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.
[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.
The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:
Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]
In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.
==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==
While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.
===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===
Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
.. Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:
Good example on how an App accesses your data below .
.
This App from ThingLink is one of the best examples of good practice as it doesn’t access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage
===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===
Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.
As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===
Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:
Naivety in the Digital Age means not realizing and accepting thedangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinkingskills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!
.
.
.
Concerning download sites, here are the trustful download websites:
One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!
It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!
But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:
In21st CenturyInternet-SafetyALONEisn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!
Would YOU like to get called a naif because not having those skills?
Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…
[Beginning Text from Mashable] In our Cybercrime Series, presented by Norton, Mashableexplores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]
Not so clever after all…man falls victim to IQ test scam
A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.
After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.
Read the whole story here, you will get a big laugh:
It took me a really a while before I took the courage to post the following now:
Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudesfrom people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!
.
Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:
Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((
A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉
.
The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!
.Anything else which is important? YES, ICT Awareness!
To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:
YOU will learn NOT to be a naif and to see the reality!
Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===
===> The roots of education are bitter, but the fruit is sweet. Aristotle <===
.Take your time, please! There are a lot of information for some to learn; take it easy .
.
..
WHAT YOU MUST KNOW!
.
We are ALL responsible for a secure Internet!
Automatic Windows Update must be enabled
For Apple devices: ALL the updates must be installed also!
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
While using “BYOD” we need a strong “BYOD-Policy” at least!
While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.
===> I created a new Hashtag: #FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===
.
. .
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!