RSS

Tag Archives: Nobody is perfect

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphonestablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

..

Learning IT-Security

Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!

.

.

.

.

Check the map below to see in real time DDoS attacks, attacks made with infected computers!

.

denial-of-service attacks in real time

Click image map to see in real time the DDoS attacks!

.

Check ALSO my blog below, who shows you more interactive maps:

.

 

..

.

In this ctraffic light greenourse you will learn:

          • Why there is a need to protect your computer.
          • Why a computer is in danger to get a virus, trojan, and other malware infections.
          • Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!

Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…

.

===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===

Keywords for learners and especially for teachers and educators who want to use this free course to build their own course

community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…

.

 

 

.

English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !

.


Introduction to Visual IT-Security

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

Video 1: “Weird Al” Yankovic – Virus Alert

.

.


Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

Video MALWARE: What is Botnet?.

Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.

.

.

Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!

Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:

 

.


Video Beyond Today: Mikko Hypponen – Zeitgeist 2012

.


Critical Thinking

Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chat icon, speeching people

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected computer is same ===> epidemic danger!
        • You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
  • Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do you know that Cyber-Criminals earn more money than others with Drugs?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.

Some important data who should wake you up!

.

Image source

.

[Start] Text from AllThingsDigital (JULY 4, 2012 AT 7:24 AM PT)

If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.

Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]

.

Video: U.S. is under “Cyber Attack”

.

.
Related links:
.
.

Flame Proves Cyber Warfare is ACTIVE

A MUST READ:
.
Flame proves cyberwarfare is active
.

Video E: VOLUTION

Computer crime is getting worse?

  • What three indicators mentioned in the video indicate to you that computer crime is getting worse?
  • What does it mean when someone says “a virus has evolved”??

Check the video to find out…

.
.

Video A Quick Guide To Scary Stuff on the Internet (Part 3)

After watching this video you will be able to answer the following five questions:



.

Ever thought about that your smartphone is also a computer with phone capabilities?

.
.
.
See screenshot below who shows you the Quarter Report 2012 from McAfee and download the PDF document with full report by clicking the image…
.
McAfee Threats Report - First Quarter 2012
.
.

SUMMARY

So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do you realize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:

.

community logo

Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update yourThird Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.

It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:

  • The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)

.

Additional Questions on Cyber Weapons & Government Attacks

help books logo

          • This sounds strange to me, never heard about Government attacks!?
          • How can it happen that my computer helps attacking Government web sites?
          • I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
          • I have a Mac computer, I don’t worry, I am not concerned! BIG LOL for that, check here http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security and wake up please!

.

As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!


Video DDoS Angriff (Theorie) – German

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


.Video INTERNET: La cyber-criminalité –  French

Video in French.

cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,

Check video by clicking the link here or click image: L’Essentiel (LU)

..


IT SECURITY Expert Reports

.

Curation about IT-Security, Cyberwar, Cyber-Warfare,Internet-Safety,Online-Safety,Cyber-Security

itsecurity,cybersecurity,cyberwar,cyberwarfare,curation,internetsafety,onlinesafety,infosec,

.

.
The Costs Of Cybercrime

 

The Costs Of Cyber-Crime: click image
.

Definition of IT Security in simple words

.

computer logoIT-Security means proactive thinking, acting before it happens! Knowing the dangers of Internet and being prepared for them!

.

.

IT-Security is:

  1. Critical-Thinking
  2. Think everytime on worst-case who could happen
  3. Forewarned is Forearmed, stay informed!
.

Additional Readings

.

Attention logoCyber-Attacks on Governments

Read also the news about already known Cyber-Attacks on Government web sites (will get updated as soon as there are new attacks):

.

Cyber-Crime


IT Security, Twitter, & the Use of Hashtags (#)

Twitter logo

As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.

What are Hashtags?

.
.

Follow me

Gust MEES on Twitter and best Hashtags on Twitter for following news about IT-Security.


share with different persons

.

Other IT‐Security People to Follow on Twitter, my suggestions are:

Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbett who gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…


Freeware & Commercial Protection Software

gearing

Check here to find best freeware and commercial protection software:

.
.
.

Final Word

===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===

Best Hashtag for Social Media is #SoMe.

I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!

As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…

.

..

Image showing community

BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!

PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!

.

.

.

blue man pointing to an important textRecommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security


as on Wednesday 06, 2012 @WebrootRescue We’re very happy to be recommended and used by @knolinfos, an #ITsecurity expert & instructor! Our story: http://bit.ly/GRkX6l

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next courses and tutorials 😉

.

 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Hi,

I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security 😉

.Learning IT-Security

.


.

sid2014-anim-banner

.

 

What we already learned in Part1 + Part2 + Part3 + Part4:

.

The browser, such as: Internet Explorer [IE], Mozilla FirefoxGoogle ChromeSafari + … is the entrance portal for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computer by only visiting a web site!!!

.

.

Very important and what most of people don’t know and don’t realize: 

  • Any installed software on your computer must be updated as older versions might have a vulnerability who could get exploited by the bad guys to take control over your computer!
  • Not every web site you are visiting and/or who you find in the search results of search Engines are trustworthy and/or secure!
  • ===> You can ALSO infect your computer without being connected to Internet! Any connected USB and other storage device (CD, DVD, Flash-Cards, Floppy Disk…) who is infected will also infect your computer if not protected!!! <===
  • Not ONLY the reflexes to stay secure as told worldwide by organisations and Education do help for a secure Internet, Internet-Safety tips are a NEED, for sure but there is more: the NEED to secure the computers!

.


Let’s go for part 5: Not Only Internet-Safety/ALSO IT-Security!

.

A bit of theory. If you don’t like, switch to first screenshot shown below to start straight of for practice. But it might be good (important) to know that theory, take your time, please 😉

.

And don’t forget this reminder, please! 

.

 What you MUST KNOW!

      • Automatic Windows Update must be enabled
      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.


Not any tutorial should be technological but also based on life experience… The practice lived…

Today, in this 5 minutes tutorial we will ONLY talk a bit, no technical advice for change. This is necessary sometimes

The author Gust MEES is online since 1998 and was given courses to adult people, seniors and youth, helping women to find a job again and preparing them to have necessary ICT knowledge to get a job in an officeprimary school classes as also to teachers in primary school more than 8 years long and this on an 8 hours a day and this alone…

..

Normal classes were 10 people with different ages from 16-79 (10 computers) and with primary schools and teachers it was 20 people (2 persons per computer), where he gave the learners also the opportunity to bring their computers and Laptops to the learning place.

.

People who wished so could also have checked their computers and Laptops for security issues and I cleaned those devices from malware and I installed FREE security programs on those computers. After a few days people came back and I taught them about the security issues (screenshots provided with a report in their language [FR, DE, EN]) and showed them how to use the FREE programs

.

From 100 computers and Laptops checked there was “ONLY 1” computer, and this from a male person aged 69 who followed my IT-Security courses carefully, the Windows computer was “clean” and not infected!!!

.

Other lived example: women (young and elder) which I gave courses and/or help about ICT for Office work had to write their CV’s and brought me their passport photo from a professional Photo Service in the North of my country, where the photo was stored on a Flash-Card from a photo machine. By scanning first that Flash-Card on my computer with my installed antivirus suite  (Norton Internet Security) and also with an anti-malware I found malicious trojans on the Flash-Card! This happens 5 times in 2 years, even after I gave a phone call to that so called professional Photo Service to tell them that their computer is infected!

So, thus meaning, e.g. above, this Photo Service infected probably hundred of customers with trojans (Trojan Horses malware) and their customers (as their Flash-Cards were infected) infected also any other computer where those Flash-cards were connected to. This could result to a mass infection of computers, even by being not connected to Internet!!!

.

This shows the impact of not having the right knowledge about the need to install security programs on a computer, even today also on a Mac!

Check about Mac malware here: Nobody is perfect!

.

Today (May 2012) we are are talking and reading about Cyber-Security, attacks on Government web sites, Cyber-Crime, National Security, Cyber-War, Cyber-Warfare and much more… Check links below to learn more:

.

..

MUST KNOW: once a computer is infected with malware it can infect also thousands of different other computers through Internet! So we all have a certain responsibility to the “Internet Community”, making sure not to infect others by applying best protection on our computers!

.

So, this was a bit life experience which I think is necessary for learners to understand the context of IT-Security! In next 5 minutes tutorial we will talk about “Visual IT-Security” where I will try to make IT-Security visual to you with real life examples. Stay tuned, coming soon 😉

.

We can have best “Internet-Safety” knowledge, but when our computer is not protected we will face serious problems and the most important; once our computer infected we infect also our contacts and the Internet-Community! We need to protect our Community!!! Don’t let Cyber-crime take over Internet, otherwise we will have a “MadMax-Scenario” in a couple of years, no need for that! But we have to protect ourselves and to share the acquired knowledge over Social Medias (Hashtag is #SoMe), that’s our role in Education, follow it please, thx!


.===> Internet-Safety is similar to the traffic rules in real world and IT-Security is the security of the vehicle! Bad breaks on a vehicle = similar to bad security on a computer! You will hurt Community one day, think on that please 😉 <===

.

.

.


Don’t want to read all the above text and start the practice?

.

gears icon Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identifying suspect web sites
      • McAfee Site Advisor ===> helps you identifying suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

.

.

Good to know:

.

.

Lots of new technical words, isn’t it? I will try to prepare also a technical dictionary about ALL these strange used words and review my tutorials by publishing inside them the signification of these words, coming soon, stay tuned… Step by step we go further 😉

.

.

Gust MEES.Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)...


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,