RSS

Tag Archives: Mac

Dangers of WiFi in public places

Dangers of WiFi in public places

.

Learning basics of IT-Security and Cyber-Security.


Are YOU aware of the dangers of WiFi on public places? YOU should!

.

.
wifi-hotspotProtect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
.
Follow this BBC investigation and be surprised:
.
.
1,226
.
Check ALSO the video below, please (08-07-2015) from F-Secure
.

.
And read the article here, please:

And the MOST IMPORTANT!!! Update from 16-10-2017:  A major WPA2 security flaw puts almost every Wi-Fi device at risk!!!

.


Terms Of Service: Do YOU READ THEM!?

.

NAIVETY-First Born Child-2014

Click the above image, please, to access the video explaining in detail.

.


.
128
.
.
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
.
  • A public, non secured WiFi Access can intercept all of our internet traffic…
  • With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
firesheep sample
.
Read here the full article who explains very well:
.

.

Sophos Project Warbike

.

Check the video who explains all…

.

5,935 (27.05.2013)

.

15,432 (12.08.2014)

.

So how can we protect us against those threats (MAC and Windows and Linux)???
 
By using a public WiFi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway. 
.

.
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:

Get behind the SHIELD! 100% FREE!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at WiFi hotspots, hotels, airports, corporate offices.

Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

Here is the address to download it http://hotspotshield.com/.

.
.
1,627,152
.
.
.
AND a solution from Europe <===> F-Secure FREEDOME:
.

.
Check out ALSO the FREEWARE “BlackSheep” who shows you when someone is using “FireSheep“! Knowing your enemy is every time good ;)
.
.
26,523
.
And here is the download link:

What YOU should know about Mobile-Security

.

.

.

.


Protection for the SmartPhones

.

Any device connecting to public WiFi could get sniffed, even Smartphones, so use DroidSheep Guard to secure your Facebook, eBay, Twitter, LinkedIn etc accounts from “Man In The Middle” attacks on public WiFi!

.

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).....

 

.

Stay tuned for next free courses and tutorials ;)

.

.

.

.

.

Advertisement
 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security

Evolution of Education: Wordle Logo

.


What should get be taught and learned more in the 21st Century while using ICT?

.

Learning basics of IT-Security and Cyber-Security


.

sid2014-anim-banner

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===


HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities from students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU ;) Read also my blog: 21st Century Learning and Teaching: Multilingual Books Recommendations



Nobody Is Perffect! Any OS Is Vulnerable!


 The facts which you should know and who will make you (hopefully) think, even critical think:

First of all, you should know and realize that any “Operating System” (OS) is vulnerable! Follow the links below to learn more:

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

=> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <=

..

Cyberattacks the greatest threat to nations

A MUST READ!!! ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.

.

And this Infographic YOU should really read!!!

.

hacker-target-victim-statistics-infogrphic-e1367241780834

Image credit: http://www.scoop.it/t/securite-pc-et-internet/?tag=Are+you+a+hacker%27s+target%3F+%5Binfographic%5D

.

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.

.


What can be done to turn this around?

.

teacherSeriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!

So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:

Apart from teaching the basics of Cyber-Security in schools by traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:

.

.

See also below the “Security Incidents By Industry”:

.

Security Incidents by Industry

Image Credit: ComputerWorldUK
.
.

See ALSO Real Time Cyber-Attacks worldwide and THINK!!!

.

Real Time Web Monitor

Check here to go to the website ===> AKAMAI Real Time Web Monitor <===

.

Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE  <=== ;)


Malware encounter rate Education April 2013

Check here for more info: ===> SC-MAGAZINE

Check also:

.

FBI-US-Cybersecurity is National Priority

Check here for more info: ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=US-Cybercrime+a+national+security+threat

 .


With Smartphones and tablets WE are ALSO confronted with BYOD!

.

Uneducated employees (Infographic)

Uneducated employees (Infographic)

Click image to go to source and to learn more…

.

I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):

Read ALSO my “Curation” about it which will get updated as soon as there are some NEWS:

Hint: Don’t know yet what “Curation” is? Check:

.


Internet-Safety and Cyber-Security, Both a MUST!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safety and basic knowledge of Cyber-Security TOGETHER are a MUST to teach in schools!
.
.

.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===

Some wise words:

With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama

By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama

.

.

.

programmerman-animated===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

 
.

.


 School Network Downtime Due to Malware    

Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!


School Network DownTime Due To Malware 2012

When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.

EdTech versus ICT?

.
boxer.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
.
.
.
.
.
.
Check the following link, please:
.
.
Hint: What is a Twitter-Chat?
.

Tips for the IT-Admin

.

Chat iconLots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

..

.

.

My advice: 

.

I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-Admin SHOULD try to make it a REFLEX on any FRIDAY thus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!

.

Check it out here ===> https://twitter.com/search?q=%23FSCD&src=typd

And here is How-To:

.

.

.
.
.

Infographics, Videos and Curation as a pedagogical help for Learning

.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
.
.
.
.

Sharing the good PracTICE

.

Gust MEES

.

.

Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:

.

.


.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.

.

 


Final Word


trafficlightgreendan01

If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…

.

..

.

.

programmerman-animated

.

===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:
.
 
21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
 
.

..

.


FeedBack Poll

.

Coming soon… in preparation…

.


..

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

.

.

.

 
12 Comments

Posted by on December 30, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, Environment, European Cyber Security Month, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, Ideas for a more secure Internet, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), PLN, PracTICE, Proactive Thinking, Project Based Learning, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Student Centred, Students 21st Century Survival Guide, Sustainability, Tutorials, Twitter Chat, Visual IT-Security

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

..

Learning IT-Security

Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!

.

.

.

.

Check the map below to see in real time DDoS attacks, attacks made with infected computers!

.

denial-of-service attacks in real time

Click image map to see in real time the DDoS attacks!

.

Check ALSO my blog below, who shows you more interactive maps:

.

 

..

.

In this ctraffic light greenourse you will learn:

          • Why there is a need to protect your computer.
          • Why a computer is in danger to get a virus, trojan, and other malware infections.
          • Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!

Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…

.

===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===

Keywords for learners and especially for teachers and educators who want to use this free course to build their own course

community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…

.

 

 

.

English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !

.


Introduction to Visual IT-Security

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

Video 1: “Weird Al” Yankovic – Virus Alert

.

.


Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

Video MALWARE: What is Botnet?.

Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.

.

.

Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!

Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:

 

.


Video Beyond Today: Mikko Hypponen – Zeitgeist 2012

.


Critical Thinking

Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chat icon, speeching people

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected computer is same ===> epidemic danger!
        • You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
  • Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do you know that Cyber-Criminals earn more money than others with Drugs?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.

Some important data who should wake you up!

.

Image source

.

[Start] Text from AllThingsDigital (JULY 4, 2012 AT 7:24 AM PT)

If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.

Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]

.

Video: U.S. is under “Cyber Attack”

.

.
Related links:
.
.

Flame Proves Cyber Warfare is ACTIVE

A MUST READ:
.
Flame proves cyberwarfare is active
.

Video E: VOLUTION

Computer crime is getting worse?

  • What three indicators mentioned in the video indicate to you that computer crime is getting worse?
  • What does it mean when someone says “a virus has evolved”??

Check the video to find out…

.
.

Video A Quick Guide To Scary Stuff on the Internet (Part 3)

After watching this video you will be able to answer the following five questions:



.

Ever thought about that your smartphone is also a computer with phone capabilities?

.
.
.
See screenshot below who shows you the Quarter Report 2012 from McAfee and download the PDF document with full report by clicking the image…
.
McAfee Threats Report - First Quarter 2012
.
.

SUMMARY

So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do you realize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:

.

community logo

Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update yourThird Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.

It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:

  • The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)

.

Additional Questions on Cyber Weapons & Government Attacks

help books logo

          • This sounds strange to me, never heard about Government attacks!?
          • How can it happen that my computer helps attacking Government web sites?
          • I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
          • I have a Mac computer, I don’t worry, I am not concerned! BIG LOL for that, check here http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security and wake up please!

.

As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!


Video DDoS Angriff (Theorie) – German

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


.Video INTERNET: La cyber-criminalité –  French

Video in French.

cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,

Check video by clicking the link here or click image: L’Essentiel (LU)

..


IT SECURITY Expert Reports

.

Curation about IT-Security, Cyberwar, Cyber-Warfare,Internet-Safety,Online-Safety,Cyber-Security

itsecurity,cybersecurity,cyberwar,cyberwarfare,curation,internetsafety,onlinesafety,infosec,

.

.
The Costs Of Cybercrime

 

The Costs Of Cyber-Crime: click image
.

Definition of IT Security in simple words

.

computer logoIT-Security means proactive thinking, acting before it happens! Knowing the dangers of Internet and being prepared for them!

.

.

IT-Security is:

  1. Critical-Thinking
  2. Think everytime on worst-case who could happen
  3. Forewarned is Forearmed, stay informed!
.

Additional Readings

.

Attention logoCyber-Attacks on Governments

Read also the news about already known Cyber-Attacks on Government web sites (will get updated as soon as there are new attacks):

.

Cyber-Crime


IT Security, Twitter, & the Use of Hashtags (#)

Twitter logo

As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.

What are Hashtags?

.
.

Follow me

Gust MEES on Twitter and best Hashtags on Twitter for following news about IT-Security.


share with different persons

.

Other IT‐Security People to Follow on Twitter, my suggestions are:

Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbett who gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…


Freeware & Commercial Protection Software

gearing

Check here to find best freeware and commercial protection software:

.
.
.

Final Word

===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===

Best Hashtag for Social Media is #SoMe.

I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!

As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…

.

..

Image showing community

BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!

PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!

.

.

.

blue man pointing to an important textRecommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security


as on Wednesday 06, 2012 @WebrootRescue We’re very happy to be recommended and used by @knolinfos, an #ITsecurity expert & instructor! Our story: http://bit.ly/GRkX6l

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next courses and tutorials 😉

.

 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Hi,

I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security 😉

.Learning IT-Security

.


.

sid2014-anim-banner

.

 

What we already learned in Part1 + Part2 + Part3 + Part4:

.

The browser, such as: Internet Explorer [IE], Mozilla FirefoxGoogle ChromeSafari + … is the entrance portal for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computer by only visiting a web site!!!

.

.

Very important and what most of people don’t know and don’t realize: 

  • Any installed software on your computer must be updated as older versions might have a vulnerability who could get exploited by the bad guys to take control over your computer!
  • Not every web site you are visiting and/or who you find in the search results of search Engines are trustworthy and/or secure!
  • ===> You can ALSO infect your computer without being connected to Internet! Any connected USB and other storage device (CD, DVD, Flash-Cards, Floppy Disk…) who is infected will also infect your computer if not protected!!! <===
  • Not ONLY the reflexes to stay secure as told worldwide by organisations and Education do help for a secure Internet, Internet-Safety tips are a NEED, for sure but there is more: the NEED to secure the computers!

.


Let’s go for part 5: Not Only Internet-Safety/ALSO IT-Security!

.

A bit of theory. If you don’t like, switch to first screenshot shown below to start straight of for practice. But it might be good (important) to know that theory, take your time, please 😉

.

And don’t forget this reminder, please! 

.

 What you MUST KNOW!

      • Automatic Windows Update must be enabled
      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.


Not any tutorial should be technological but also based on life experience… The practice lived…

Today, in this 5 minutes tutorial we will ONLY talk a bit, no technical advice for change. This is necessary sometimes

The author Gust MEES is online since 1998 and was given courses to adult people, seniors and youth, helping women to find a job again and preparing them to have necessary ICT knowledge to get a job in an officeprimary school classes as also to teachers in primary school more than 8 years long and this on an 8 hours a day and this alone…

..

Normal classes were 10 people with different ages from 16-79 (10 computers) and with primary schools and teachers it was 20 people (2 persons per computer), where he gave the learners also the opportunity to bring their computers and Laptops to the learning place.

.

People who wished so could also have checked their computers and Laptops for security issues and I cleaned those devices from malware and I installed FREE security programs on those computers. After a few days people came back and I taught them about the security issues (screenshots provided with a report in their language [FR, DE, EN]) and showed them how to use the FREE programs

.

From 100 computers and Laptops checked there was “ONLY 1” computer, and this from a male person aged 69 who followed my IT-Security courses carefully, the Windows computer was “clean” and not infected!!!

.

Other lived example: women (young and elder) which I gave courses and/or help about ICT for Office work had to write their CV’s and brought me their passport photo from a professional Photo Service in the North of my country, where the photo was stored on a Flash-Card from a photo machine. By scanning first that Flash-Card on my computer with my installed antivirus suite  (Norton Internet Security) and also with an anti-malware I found malicious trojans on the Flash-Card! This happens 5 times in 2 years, even after I gave a phone call to that so called professional Photo Service to tell them that their computer is infected!

So, thus meaning, e.g. above, this Photo Service infected probably hundred of customers with trojans (Trojan Horses malware) and their customers (as their Flash-Cards were infected) infected also any other computer where those Flash-cards were connected to. This could result to a mass infection of computers, even by being not connected to Internet!!!

.

This shows the impact of not having the right knowledge about the need to install security programs on a computer, even today also on a Mac!

Check about Mac malware here: Nobody is perfect!

.

Today (May 2012) we are are talking and reading about Cyber-Security, attacks on Government web sites, Cyber-Crime, National Security, Cyber-War, Cyber-Warfare and much more… Check links below to learn more:

.

..

MUST KNOW: once a computer is infected with malware it can infect also thousands of different other computers through Internet! So we all have a certain responsibility to the “Internet Community”, making sure not to infect others by applying best protection on our computers!

.

So, this was a bit life experience which I think is necessary for learners to understand the context of IT-Security! In next 5 minutes tutorial we will talk about “Visual IT-Security” where I will try to make IT-Security visual to you with real life examples. Stay tuned, coming soon 😉

.

We can have best “Internet-Safety” knowledge, but when our computer is not protected we will face serious problems and the most important; once our computer infected we infect also our contacts and the Internet-Community! We need to protect our Community!!! Don’t let Cyber-crime take over Internet, otherwise we will have a “MadMax-Scenario” in a couple of years, no need for that! But we have to protect ourselves and to share the acquired knowledge over Social Medias (Hashtag is #SoMe), that’s our role in Education, follow it please, thx!


.===> Internet-Safety is similar to the traffic rules in real world and IT-Security is the security of the vehicle! Bad breaks on a vehicle = similar to bad security on a computer! You will hurt Community one day, think on that please 😉 <===

.

.

.


Don’t want to read all the above text and start the practice?

.

gears icon Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identifying suspect web sites
      • McAfee Site Advisor ===> helps you identifying suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

.

.

Good to know:

.

.

Lots of new technical words, isn’t it? I will try to prepare also a technical dictionary about ALL these strange used words and review my tutorials by publishing inside them the signification of these words, coming soon, stay tuned… Step by step we go further 😉

.

.

Gust MEES.Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)...


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,