RSS

Tag Archives: Safer Internet Day 2014

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

.

Evolution of Education: Wordle Logo.


I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

programmerman-animatedActually it is not really a question BUT a statement from MOST people ===> I Have Installed An Anti-Virus And A Firewall, I Am Protected NOW! <=== BUT is that true!? NO, NOT anymore, this was true ages ago BUT NOT anymore today! When YOU use the two above mentioned then YOU are already a bit protected, but far away that YOU can say, I am safe now! WHY? First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

..

I will cite ALSO my online friend https://twitter.com/dougpete about WHAT he has to say about. Check below, please.

.

Doug PETERSON - coding- nobody is perfect

Check the original blog here ===> http://dougpete.wordpress.com/2014/03/01/a-wakeup-call/ <===

.

Find out more about Doug PETERSON here:

.

SO… NOW WE know that WE have to be aware a bit MORE and that WE have to create a Cyber-Security Mentality for ourselves and for the community! Even Anti-Virus programs have sometimes ALSO vulnerabilities! These vulnerabilities can even bypass the installed protection software, such as Anti-Virus and Firewall and the bad boys (Cyber-Criminals) can take the control over the computers by exploiting these vulnerabilities! Once a computer controlled by the cyber-criminals (===> YOU don’t remark it <===) they include it into a network of other controlled computers, that network is called a “Botnet”! These so called “Botnets” are getting used to attack Government websites and ALSO other websites as well as “Spam” generating computers, and this ALL without the knowledge of THEIR owners!!! So, let us find out NOW what “Botnets” are and WHAT they can perform, YOU might get impressed, there is a BIG POWER behind, and that with OUR computers and without OUR knowledge!!!

Learn more:

Thus meaning ALSO that YOUR computer could become a Cyber-Weapon who is attacking YOUR own Government and this without YOUR knowledge!!! Sounds strange, isn’t it!? BUT that’s REALITY! Check my blog post below for more information, please:

As YOU might have remarked (for those who follow my posts…) I bring every time a bit of creativity and also music in to my posts, so this time it will be a music video from ===> “Weird Al” Yankovic – called Virus Alert <=== Check it, watch it and listen to the music as well, it is funny and great to watch. It shows the REALITY 😉 BTW: there are lots of other interesting music videos from  “Weird Al” Yankovic”, check them ALSO…

.

.

===> Forewarned is Forearmed!!! <===

.

As WE know NOW, after reading the above mentioned, there is certainly the question: WHAT else SHOULD I do then to get BEST protection!?

.


WHAT else SHOULD I do to get BEST protection!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01WE learned already that even Antivirus-Programs could have vulnerabilities and ALSO the reason WHY (inevitable bugs in programming code, as a reminder), SO, what’s NEXT!? Thus meaning: ===> Nobody Is Perfect <=== (Mac, Apple and Linux included)! WHEN such problems are getting known by the manufacturers of software programs, THEY release as soon as possible (asap) UPDATES!!! These UPDATES are NOT ONLY an option BUT a MUST to install!!! YOU understood already NOW THAT UPDATES are a MUST, right 😉 And a MUST for any “Operating System” (OS)!!! NO exception!!!

So, let us have a look on those vulnerabilities on any “Operating system” (OS):

OK, I got the message NOW and I don’t have THAT much time to spend to UPDATE manually ALL my installed programs and WHATEVER, this is stressing me really!!! I can’t cope with THAT!!! Isn’t there around some solution for ALL THAT, an automated solution!? Of course there is an automated solution for the so called “Third Party Applications“, and that on is actually very easy to install and FREE, check my blog post (tutorial) about it below, please:

BUT: please don’t let us forget about the ===> Patch-Tuesday <===, that is THE day to UPDATE YOUR Windows machines and ALSO ADOBE related products such as FLASH-PLAYER and ADOBE READER (PDF), and THIS for any Operating System (OS)!!! Make sure to get THE ===> reflex <=== to UPDATE them! BTW: this is any second Tuesday on each month!

An OTHER, OH YES, there is STILL some OTHER, sorry: ===> Browsers (ALL of them…) <=== are THE Gateway for Malware infections, this is NOT known by MOST users!!!

Learn more below, please:

.

OH MY GOD, again so much stuff to remember, how could I do this!? Well, I agree with that and therefore I started ages ago (???) on Social-Media Twitter the “Hashtag” ===> #FSCD <=== who means ===> Friday Security Check Day <=== and who reminds YOU on any FRIDAY about to get THE ===> REFLEX <=== to take care about YOUR security 😉

.

book-question-markI invite YOU ALSO to read my following blog posts:

.

.

Keywords as a reminder for me to create this blog post: Anti-Virus, Firewall, Third Party Programs, Updates, Drive-By-Download, Flash vulnerabilities, adobe vulnerabilities, Plugins vulnerabilities, Bad programming, Cyber-Security, Responsibility, links to related blog posts, Cyber-Crime, Passwords, human behavior, naivety, Computer as Cyber-Weapon, malware bypasses anti-virus and Firewall, Countries worldwide and Cyber-Security,

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.
.Stay tuned for next blog(s) 😉

.

.

 
5 Comments

Posted by on February 9, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Europe, Facebook, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Motivation, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Security in Schools, SID2014, Social Engineering, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

.

Evolution of Education: Wordle Logo.


Are WE Becoming Too Paranoid About Cyber-Security?

This is a question I get asked very often, and I got remembered again by my online friend Doug PETERSON ===> @dougpete <=== about it on a Social-Media conversation (BTW: it’s called a “convo” on Twitter) on Twitter, check below please:

.

Twitter Conversation about cyber-Security

.

SO… As I can’t answer Doug’s very good question on a Twitter based conversation, as it would be too long, I took the challenge to create a new blog post here. And actually it inspired me to create a series of new blog posts with the TOPIC ===> Often Asked Questions:… <=== This was the introduction, now let us go for it…

.


Shouldn’t WE Have A bit Of Paranoia Anyway!?

sharing-iconA good question back, isn’t it? My direct answer to this would be, YES! A healthy paranoia attitude, why!? Let us try to go a bit for Deep-THINKing if YOU permit 😉 Let us ALSO try to make a comparison between the Real-World and the Virtual-World (the internet). WHEN YOU take the time to compare both worlds YOU would find out that there really few differences, apart that the internet is technology driven and that WE connect global on instantly actions

===> BUT: Let us first admit that the Real-World and the Virtual-World have MORE positive attributes than negative ones!!! <===

Mausi-parapluie.

BUT ALSO: WE have to accept THAT WE are NOT gods, and therefore WE are ALSO on a status as ===> Nobody-Is-Perfect!!! <=== 

ALSO negative things as present in the Real-World are ALSO present in the Virtual-World, as WE copy ourselves ONLY into the Virtual-World with ALL OUR character

.

.

Let us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

WHAT do the Governments worldwide say!? Check below, please:

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Check ALSO:

Coming back to the negative things as THEY are present in both worlds, let us be honest, as new born people into the Virtual-World  (mostly…), WE have to acknowledge THAT there is a STRONG (actually on 2014) dominance of the bad boys, the criminal ones!!! Don’t believe me? BETTER to check out the shown resources below, please:

Please, take YOUR time to UNDERSTAND the shown resources above, OTHERWISE YOU won’t get THEIR importance and YOU will go on with YOUR same question, which is NOT the goal of this blog post anyway! YOU SHOULD read it to get the message and the answer to YOUR question 😉 To give YOU an answer to YOUR question, the BEST way is to read about it and to go for Deep-THINKing anyway, NO ONE can convince YOU about WHAT YOU don’t want to accept, so build YOUR own Mentality about it through the published facts 😉

.

Meanwhile listen to the music below… Bridge Over Troubled Water (Simon & Garfunkel)

.

.

As the title of the music video tells us “Bridge Over Troubled Waters“, it is exactly THAT what this blog post wants to bring over! Trying to get YOU convinced about the present dangers , to make YOU aware about the present dangers (OH YES, there are MORE as YOU might expect…) and to SHOW YOU as well WHERE those dangers are and making YOU fit to fight against THOSE dangers, to make YOU responsible “Digital-Citizens“! YES, the word RESPONSIBILITY is being used again, YOU SHOULD remember it 😉

.

I invite YOU ALSO to read my following blog posts as well, please:

.

WHEN coming back to the TOPIC ===> Are WE Becoming Too Paranoid About Cyber-Security? <=== I think that YOU, after reading the above mentioned, that YOUR question is answered and that YOU go for a ===> Community-Mentality <=== as it is THIS what would fight against the bad boys

.

Keywords:  often asked questions, what do people think about Cyber-Security, Mac Mentality, I installed Antivirus & Firewall, I am secure, Cyber-Security is ONLY for paranoia people, Cyber-Security is ONLY a hype, Sharing Responsibility, community, Critical Thinking, Proactive Thinking, any device as Cyber-Weapon possibility, patriotism, holistic view, selfish mentality, community mentality, Technology and maintenance as well as Safety and Security, Education’s Responsibility, everybody’s Responsibility, Curation about Cyber-Security, it’s ONLY ALL about commercial to sell…, Cyber-Espionage, NEUTRALITY of the internet?, Privacy, 20th Century Mentality expressed through 21st Century Technology,

 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

.
.Stay tuned for next blog(s) 😉

.

.

 
8 Comments

Posted by on February 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, browser, Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Home-Work, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Quality Courses, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Technology Integration, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

HELP! My PC Is Infected With Adware, Toolbars, And Potentially Unwanted Programs (PUPs)!

.

Wordl Logo Malware-Adware.


What Is Potentially Unwanted Programs (PUPs)? And How-To Remove Them.

programmerman2Potentially Unwanted Programs (PUP)” are a piece of software that is also downloaded when a user downloads a specific program or application. THEY are similar to malware in that it will cause problems when it is downloaded and installed. THEY can be very embarrassing as one doesn’t get rid of them with normal tools, one needs definitely to use special tools to remove them.

Freeware publishers offer their products for free, but bundle them with PUPs in order to earn revenue and users are unaware of these additional installations because ===> they do not read agreements thoroughly. <===

WE will take an practical example while WE are downloading a specific FREEWARE program and discuss on it on How-To. Here below on example where YOU MUST take care when downloading FREEWARE:

.

PUPS-1

.

As YOU might see in above screenshot there are pre-installed PUPs integrated, uncheck these boxes before YOU click the “Next” button!

Once the software installed, I recommend to shut down the PC and to restart it. If there is STILL a PUP on YOUR PC YOU will see it then! BUT, it isn’t a 100% sure way to know if so, BETTER is to install a FREEWARE program (without PUPs) to check the PC, find THEM and to remove THEM! WE will see this in the section below…

.

Related links to PUPs:

.


How-To Check And Remove PUPs On My PC?

1ibdy1vf6wghd-n05dgl-aigainformation1I tried out a lot of solutions over the years and this one, the one WE will describe below, gave me the best results to remove ONLY the PUPs! WE will discuss, in an other section as well, How-To prevent that PUPs get installed. SO, before installing and running the test of that program, let me give YOU an advice, please: depending on how many programs YOU have installed on YOUR PC the test and removing process could take about 30 minutes; the time YOU can’t work anymore with YOUR PC. Make sure when YOU do this task to have foreseen something else to do. Some possibilities are, running the program before a meal, a shower, before shopping, and… YOU decide 😉 As WE are using the download page from Bleeping Computer, I will use their text as well…

BleepingComputer Review:

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.

So let us go now and download this program at following address:

Once having installed the program and started it, it will look like this (see screenshot). YOU don’t have to fear as well to lose some programs as the program creates ALSO a “Registry Backup”!

.

jrtcmdsm

.

As mentioned already above, it will take time, so wait and see 😉 YOU will get later provided a detailed report about what was removed, report which YOU could save, see screenshot below, please.

.

JRT Report

.


How-To Prevent The Installation Of PUPs?

SO… NOW WE know How-To remove those unwanted, stressing programs, BUT doesn’t there are existing programs who help us to protect against those PUPs? YES, there is actually one very good program existing since ages and STILL developed, who makes a great job on preventing and ALSO on removing PUPs, Adware, Spyware, and… It is called “SpyBot Search&Destroy”

Spybot for private use

Why use the Free Edition?

If all you require is to be able to scan and remove malware and rootkits from your system. Or if you want to protect your PC by immunizing your browser and hosts file, the ‘Free Edition’ is the choice for you. If you are a more experienced user you can also check various ‘autostart’ locations using the ‘Startup Tools’. Spybot 2 can scan single files or specific folders and unlike other software it doesn’t matter if the file is located on your local drives or on a network share. Spybot 2 comes with its own whitelist which helps to identify if files are legitimate or not. This useful addition helps to speed up the scan. Even though this fully functioning product is free of charge you can still get free support by emailing our support team.

SO… Let us go to download it from the original website of its creator here:

I recommend to use the FREEWARE version, but anyway YOU might chose what YOU want…

SO… Once installed it will look like this, see screenshot below, please.

.

Spyware Search&Destroy 1

.

Once started, the first step to do is to look for up updates by clicking on the button “Search for Updates” (see screenshot). Once the Updates downloaded click the button “Check for problems“, see screenshot below, please.

.

Spybot Search & Destroy 2

.

The program will get launched (this will take some time, be patient…) and meanwhile YOU STILL can work with YOUR PC, but it will slow down…

.

Check the screenshot below to find out how the scanning process looks and YOU will see ALSO that YOU can use some tutorials through the scan window, in the “Help” menu, read carefully 😉

.

Spybot Search&Destroy 3

.

Once the scan is finished, WE will see the results, check screenshot, please.

.

Spybot Search&Destroy-NO infection

.

If there were some infections, WE will see this (see screenshot below, please).

.

Spybot

.

YOU need NOW to click the button “Fix selected problems” and the found problems will get removed.

BUT, there is STILL something more and very smart to do, using the “Immunize” function! This allows YOU to get a passive protection  as well, see text here, please ===> Spybot – Search & Destroy offers the Immunization – a feature to allow you to immunize your computer against certain pieces of spyware.
It also allows you to use native browser settings to block cookies, malware installations, bad websites and other threats via ActiveX. SDHelper is an Internet Explorer plugin that adds a second layer for blocking threats. While the Permanent Immunity blocks installers by their ActiveX ID, this one blocks anything that should come through by different aspects.

Anything else WE could do? Of course, I invite YOU to read my following blog posts:

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.Stay tuned for next blog(s) 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Cyber-Security And Privacy Knowledge As Skills In The 21st Century Are NOT Yet Enough Taught And Present, WHY!?

.

userfredericmoser01Did YOU realize already that WE are living in the 21st Century and that WE nearly ALL are using the so called NEW TECHNOLOGIES, the internet, the smartphone(s), laptops, computerstablets, household goods who are connected to the internet, and this on a daily base!? Did YOU ever started THINKING about such consequences concerning YOUR Privacy and vulnerability to Cyber-Security!? As far as I know, from practice while talking to people, most people are NOT as nobody has given them advice, NOR were they taught about it in schools, and there is the problem!

In the digital age, as WE are living NOW in it, WE MUST learn on a daily base to adapt to its very quick change! Education can’t follow with that as it is and was almost years behind… It needs to have a ===> RETHINK <=== to catch up!

SO… By knowing this and accepting it ALSO (the most difficult, BUT…) WE would be good advised for learning on a daily base to get the MOST out of necessary knowledge and skills to give OUR kids the BEST Education possible, an ===> Up-To-Date <=== knowledge, a knowledge who isn’t ONLY a cherry-picked knowledge, BUT a knowledge who includes ALSO Privacy and Cyber-Security as also skills!

The future is also that any device, even in the household, will be connected to the internet. It is called “The Internet Of Things” and as with any NEW technical stuff, it brings risks and vulnerabilities

MOST of people don’t realize the importance of privacy, especially for Cyber-Security and Identity Theft, check the video below who explains very good, please.

.

.

After watching the video YOU certainly are surprised and hopefully also willing to learn a bit more, it is actually NOT that difficult as most people think.


Who’s To Blame For Cyber-Security problems!?

Surveys from professional companies are NOW ALSO showing that Cyber-Security is OUR ALL responsibility, check below, please…

.

CyberSecurity-Responsibility

Check the full article here, please:

To start with learning, I would suggest YOU to read my blog about it first:

.


The Internet Of Things

Check out my curation about it and read the articles to find out what “The Internet Of Things” is, please…

.

Internet Of Things

Click image OR follow this link ===> http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Internet+Of+Things

.


The Dangers And Vulnerabilities Of  The Internet Of Things

.

Same procedure again, read my curation about it to find out, it is THE easiest way to get aware of the existing dangers and to get convinced about that LEARNing about Cyber-Security is a MUST…

.

Internet Of Things Vulnerabilities and Dangers

Click image OR follow this link ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

.


Wearables

[Start text from Kaspersky] The word “wearable” was once merely an adjective describing an article of clothing that was easy to wear. Now “wearable” refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week. New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.” [End text from Kaspersky]

Learn more:

.


Additional And Informative Stuff

programmerman-animatedBelow YOU will find some Tweets which I posted, related to this Topic of Cyber-Security and who will give YOU also an overview on How-To YOU could create Tweets (Posts) on Social-Media Twitter. YOU may use them, BUT please give credit to me as I was its creator, thanks 😉

.

#THINK global ===> #act global <=== #CyberSecurity is a MUST as WHEN WE are ONLINE WE are already #surfing #2gether on THE #DataHIGHWAY 😉

.

#Naivety in the Digital Age? http://wp.me/p20Rwv-u4 

.

Do YOU realize WHAT’s happening in the #VirtualWorld!? #EdChat

.

Like in #RealWorld YOU need #1stAidKit & #Safety WHEN using tools, SO ALSO in #VirtualWorld! #EdTechChat #InternetSafety #CyberSecurity 1/2

.

2/2 Using tools in #VirtualWorld WE need ALSO #1stAidKit which is #Protection #Antivirus as well as #InternetSafety #knowledge! #EdTechChat

.

By analogy, anyone who selects only the data that appeals to them and supports their personal view or theory is called a cherry picker. SO… WHEN using #BYOD #EdTech tools #iWHATEVER #Apps ===> #LEARNing & #TEACHing about #CyberSecurity & #Privacy is a MUST! <===

.

NEW #Technology gives YOU the possibility 2 SHOW UP as… BUT its a dreaming world! DON’T loose the #REALITY 😉 Do YOU got #Maturity!??? InternetSafety existing but NOT for adults, seniors… MUST get updated and created .

.

.

That’s WHAT #Teachers #EDUcators are today, DON’T see #REALITY ===> The aim of art is to represent not the outward appearance of things, but their inward significance. -Aristotle <=== #EDUcators .

.

WHEN #Researchers #EDUcators #TEACHers are relating #CyberSecurity to #software ===> #BackToSchool with THEM!

.

Please #Update YOUR #knowledge WE need 2 #RETHINK how WE are using #ICT #Technology #EdTech #iWHATEVER #Apps as WE do it unconsciously MOSTLY without #Responsibility#EDU

.

WE MUST #RETHINK #HowTo use #ICT #Technology #EdTech #iWHATEVER #Apps as WE use unconsciously MOSTLY without #Responsibility#CyberSecurity

.

WE have to prepare OUR children a safe internet… #EDUcation SHOULD lead learners 4 the #FUTURE, BUT actionnaly is a #Century behind, especially its #LEADERS ===> #LeaderShip #CyberSecurity

.

Remember these words ===> #Responsibility & #NotYET <== as a guide 2 GO a step FURTHER as #preparation 4 THE #FUTURE of OUR #Kids 😉

.

Keywords necessary for me to create this blog:

RETHINK, habits, bidirectional, 2 way, technology in 21st Century, connected, household goods, internet of things, BYOD, EDU, teachers and educators role, teachers create other professions, NO HALF-BAKED KNOWLEDGE, NO GADGETS MENTALITY, NOT ONLY a software problem,”Critical-Thinking, Proactive-Thinking, community sharing, Twitter Chat, Life-Long-Learning, MORAL, ETHICS, PRIVACY, Maturity, naivety, Zeitgeist, Smart Homes, wearables, Augmented Reality, ..

.

Will get updated often, as I have to publish it one day, otherwise I would NEVER finish it!

 

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

You are very welcome to give me new ideas, would be appreciated! Stay tuned for next blog(s) 😉

.

 
4 Comments

Posted by on January 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Books, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Evernote, Facebook, Free courses, FREE-courses, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Identity Theft, Internet Of Things, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tracing, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Privacy In The Digital World-SHOULDN’T We Talk About It!?

Privacy In The Digital World-SHOULDN’T We Talk About It!?

.

Evolution of Education: Wordle Logo


Privacy In The Digital World-A MUST To Talk About It!

.

Chat icon.

Since Edward SNOWDEN‘s revelations nearly everybody knows about the word “Privacy“, even those WHO were NOT interested about it, as it was worldwide broadcasted! This person did reveal WHAT is really happening in the so called “Virtual-World” (the internet) and how much secret services around the world are interested about to grab ANY information about ANY person WHO is online! BUT, it’s NOT ONLY them, ALSO Cyber-Criminals are looking for these information! And ALSO commercials who find out YOUR psychological profile through YOUR behavior on Social-Media!

.

Start Text from The Guardian:

The UN general assembly unanimously voted last week to adopt a resolution, introduced by Germany and Brazil, stating that “the same rights that people have offline must also be protected online, including the right to privacy”. Brazil’s president, Dilma Rousseff, and the German chancellor, Angela Merkel , were among those spied on, according to the documents leaked by Snowden.

===> The resolution called on the 193 UN member states “to review their procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, with a view to upholding the right to privacy of all their obligations under international human rights law”. It also directed Pillay to publish a report on the protection and promotion of privacy “in the context of domestic and extraterritorial surveillance … including on a mass scale”. <===

She told Berners-Lee that it was “very important that governments now want to discuss the matters of mass surveillance and right to privacy in a serious way”.

Read the full article here:

.

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

Der Nutzer wird entmündigt-CES2015

Click the above image, please, to access the article ===> A MUST READ!!! <===

.

Check ALSO the videos below, watch and listen carefully to it…

.

.


.

.


.

.

Check below the resources to find out more, please:

.

Google Glass PrivacyBUT is THAT all why I created this blog!? Certainly NOT, there is much more behind, mostly hidden by its creators BUT WHAT MUST get said to tell YOU to stay aware about WHAT YOU are publishing and on what you are get tracked in the “Virtual-World“, such as:

===> Critical-THINKing: are WE creating a “Stalking-Society”!? <===

.

. .


WHAT do the above mentioned articles really mean!?

sharing-iconWHEN WE are online WE are transparent already as website owners are using OUR data for commercial purposes and with posting more about OUR private life, especially on Social-Media (Twitter, Facebook and…) WE give THEM even more information about ourselves!

.

.

..

Network Hacking May Lead to Bigger Problems

[START Text from links below] While social networks don’t have your bank account information or credit card number, they may provide enough personal data for hackers to answer security questions on other sites. If you use the same password for your Facebook as your PayPal or Amazon login, hackers could then take control of these accounts. [END Text from  links below]

.   Check out also:

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.

ALSO commercials who find out YOUR psychological profile through YOUR behavior on Social-Media!  Check the articles below:

. .


THE danger with photos on the internet

. .

.

Check also:

.


Phishing, Spear-Phishing through Privacy sharing

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand

.

.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1According to latest press releases: Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

.

Check YOUR PRIVACY ===> Clueful   –   Privacy Monitoring App for iPhone & Android

.

This blog will get updated as soon as I get new information and certain Topics, such as Google Glass, Skype in Global Education and Google+ Hangouts in Global Education will get updated and described later…

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

My personal reminder keywords for creating this blog: Cyber-Security and privacy ===> Phishing, Kettenbriefe, chain letters, IBM, psychological profile, ads used by knowing psychological profile on Social Media, NSA, PRISM, GHCQ, HTML5, Apps, Google Glass, Skype, Google+ Hangouts, Laws in different countries, global EDUcation, smartphones, photos, GeoTagging, Google Latitude, Google’s Location History, WiFi, Foursquare, Klout… … . . . . ..

.

Stay tuned for next blogs 😉 .

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Habits You SHOULD Apply For The New Year

Habits You SHOULD Apply For The New Year

.

Learning basics of IT-Security and Cyber-Security.


Introduction

Chat iconA New Year is approaching and WE SHOULD think about WHAT WE learned during this year to make the next coming year even BETTER! When revising my curation about Cyber-Security YOU MUST agree that Cyber-Criminals are getting more and more professional and that WE as users MUST learn to stay secure while surfing and to be prepared to avoid the pitfalls of cyber-criminals.

.

.

Check also a new report from KASPERSKY here: Dangers of not securing your Internet Device

Check it out in the different proposed languages, please:

The above Curation gives YOU an overview what happened during the year with:


OK, NOW WE Know The Dangers, BUT How To Protect Against Them!?

.

programmerman-animatedThat’s a good question, isn’t it? WHERE to start? Actually it isn’t THAT difficult at all, ALL YOU need (mostly) is to get the right reflexes! YOU need to get used on a daily base to be aware of the dangers YOU are used to this in Real-Life, so do it ALSO in Virtual-Life [internet]). BUT HOW!? I will present to YOU a couple of automated software programs who will make it very easy for YOU, the rest is just routine and reflexes 😉

Remember that in real life WE do Hygiene: brushing OUR teeth is ALREADY (OR SHOULD be) a daily task, reflex, which WE are using; right? WE SHOULD get such daily reflexes in the Virtual-World as well, WE need to get educated to it so that it becomes a daily reflex! SO… Here WE go NOW…

MOST of the below mentioned TIPS are for Windows users, BUT as “Nobody Is Perfect“, so lots of the advice’s are ALSO a MUST for Mac users!

First of ALL, WE SHOULD try to find a way THAT WHEN WE make a mistake (Nobody Is Perfect…) that WE don’t get infected OUR computers and devices (smartphones, tablets…)! So WE MUST first look for a protection software, I advice YOU to install a commercial “Internet Security Suite“, NOT ONLY an Anti-Virus, BUT an “Internet Security Suite“. Let’s say this ALSO, any installed Anti-Virus protection (FREEWARE) is BETTER than NO Protection, BUT commercial software has STILL BETTER results in protection, check the following links, please:

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01So, WE have NOW a protection installed, are WE safe NOW!? NO not at all! As already mentioned, “Nobody Is Perfect” and so it is also for the Anti-Virus programs. WE MUST be aware ALSO of OUR behavior (WE are nearly new born kids in the Virtual-World) and OUR Naivety (YES, some are STILL…):

The above mentioned links might be seen as lot of information, BUT it isn’t as ALL of them are very easy to understand and to apply! Take YOUR time and follow the instructions on How To apply them, please. BEST would be to read my FREE courses here:

.

Guidelines for securing your home

 

Click the above image to access the article, please.

.


Stay Informed About New Threats

.

SOPHOS Security Threat Report 2014

Click image to download the report.

.

[START Text from SOPHOS]

It includes a range of security tips, and a section on proactive protection, entitled Staying Ahead of Today’s Most Sophisticated Attacks.

The report isn’t just about Windows and Windows malware, either.

You’ll find a wealth of information about how the cybercrooks are broadening their attack horizons to the Mac, Linux and Android platforms, too.

This is important material because it necessitates that we broaden our defensive horizons in reply.

The report also looks the technology and the underground economy behind crimeware tools such as exploit kits, botnets, click fraud, ransomware, and more.

As well as being a fascinating read, the Security Threat Report 2014 will help you to understand and to protect yourself against an enemy that is becoming ever smarter, shadier and stealthier.

[END Text from SOPHOS]

.


Get THE Weekly Reflex!

thumbs upAs already mentioned it are the reflexes who are very important! SO, let’s create them by checking every Friday OUR computer(s), as a reminder: I created the ===> Hashtag #FSCD <=== on Twitter! #FSCD means ===> “Friday Security Check Day”! <=== Follow it to make sure that YOU don’t forget about it 😉

.

Learn more:

.

.


GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
.

Stay tuned for next blog posts 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Blogs To Follow

Cyber-Security Blogs To Follow

.

Learning basics of IT-Security and Cyber-Security.


WHY Should I Follow Security Blogs?

.

Chat iconWHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!?

Well, I will give YOU a question back: WHY should YOU read newspapers? It is as simple as that, WE need the information about WHAT is going on in the world and also WHAT is going on in the Virtual-World as both worlds, the Real-World and the Virtual-World (Internet), are influencing each other!

.

.

===> DON’T forget, in the word ICT is the letter “I“, which means “Information“, use it. <===

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online. SO… By reading those blogs and following ALSO those experts on Social-Media Twitter, YOU will learn slowly but surely about how to stay best protected and also what are the news where YOU need to be aware about! First step is ===> AWARENESS <===.


book-question-markNext step is to know how WE could get BEST protection and mostly for FREE:

WE need ALSO to get OUR daily stream of news, YES, I said daily stream of news as the Virtual-World is moving very quickly and WE need to be informed about WHAT is going on. A hard task indeed, BUT a MUST!!! Like everything else it is the beginning who is the most hardest, BUT once used to it it will just become a normal daily task, believe me 😉

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===

.

So, here below my selection of blogs from Cyber-Security experts, which I believe, are the most valuable ones which YOU should follow. These experts write on a style who is easily to understand and I learned a lot myself from them:

.

Graham CLULEY Blog

Graham CLULEY Blog

 

Naked Security (Sophos)

Naked Security Blog (Sophos)

Brian KREBS Blog

Brian KREBS Blog

F-Secure Blog

F-Secure Blog

SOFTPEDIA Security News

Softpedia Security News Blog

ZDNET

ZDNET

SCMAGAZINE

SCMAGAZINE Blog

arstechnica

arstechnica

PCWorld SECURITY

PCWorld

BBC Cyber-Security News

BBC Cybersecurity News

The Guardian

The Guardian

ITespresso (DE)

ITespresso (DE)

SECURELIST (KASPERSKY BLOG)

Securelist (KASPERSKY BLOG)

SILICON (FR)

SILICON (FR)

ZATAZ (FR)

ZATAZ (FR)

McAfee Labs Blog

McAfee Blog

.
sharing-iconThe above blogs are the blogs which I recommend as it is easy to understand them, that’s the ones I check first to understand as quick as possible what’s going on and to share my new acquired knowledge with others! Of course I use ALSO different OTHER sources for deeper learning, BUT that’s the sources from where one can grab information on the fly
.
.

As in a modern world WE use ALSO Social-Media, especially Twitter, I recommend the following people to follow:

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:

21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Smartphone pictures pose privacy risks

Smartphone pictures pose privacy risks

.

Evolution of Education: Wordle Logo

..
.


.

SID2014

SID2014

.


Did You Know: You and your kids could get easily tracked!

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos!

.

.

.


Keep It Private Till Everything Is Checked In Depth

.

What YOU should know:

    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
    • WHAT is Geotagging?

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.

Stay tuned for next blogs ;)

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2014: Safer Internet Day 2014-Participation

SID2014: Safer Internet Day 2014-Participation

.

Evolution of Education: Wordle Logo

.


Safer Internet Day 2014 – Save the date!

.

sid2014-anim-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world.

Safer Internet Day 2014 will be celebrated on 11 February 2014. The strapline for the campaign is “Let’s create a better internet together”. 

This website showcases some of the exciting activities and events that took place across the globe to celebrate the day in 2013, and will be updated for 2014 as the campaign gathers pace. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You’ section to explore news from the many countries and institutions which were involved.

Alternatively, read the summary or the full public report on Safer Internet Day 2013 activities and successes.

Keep checking back for the latest news as the SID 2014 starts to take shape.

.SID2014-logo-BS-small

.


.

Learning IT-Security

.

My participation for the SID2014

.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2014 with my FREE courses here:

and also with my curation here:

.


Final word

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2014 on their blogs and/or websites :)

Where can I get the banners?

People who are on Twitter may use the hashtag #SID2014 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 
1 Comment

Posted by on July 10, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, HotSpot, HowTo, Ideas for a more secure Internet, Internet Monitor, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tutorials, Twitter Chat, Visual IT-Security, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW!

.

.Learning IT-Security

.


.

sid2014-anim-banner

ICT Awareness: What YOU SHOULD KNOW!

.

programmerman2Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones…) as well as I blog a lot about it and it’s a NEVER ENDING story as the Virtual-World (Internet) is becoming more and more tricky and starting to become a trap for lots of people while surfing in the jungle of information worldwide… SO… There was published a lot about it and most people are worry of such a lot of BIG DATA and don’t know anymore where to START to learn about it! To make it handy for YOU, I will give YOU again a 5 minute small course about it, check below, please… YOU will see WHAT YOU have to take care about to stay secure and then YOU might click the links for a deeper knowledge, don’t fear as it’s easy 😉

===> Education and TEACHers, this is especially for YOU! <===

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===

.

programmerman-animatedTHE known issues (there might be some more to get discovered…):

.

The World’s Biggest Data Breaches in One Stunning Visualization

.

Data-Breaches

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

The above mentioned are ONLY the most relevant where YOU need to take care about and the blog post will get updated when NEW ones are on the front!

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01The above mentioned tools are ALL part in Education and are getting used on a daily base from teachers and students around the world, AND Education doesn’t find it STILL necessary to teach the basics of Cyber-Security up from the early age!??? Did I say, the early age!??? YES, one can teach the kids the reflexes to stay secure up from five (5) years age, see link below:

.

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please 😦 <===

.

7 Cybersecurity Myths Busted

.

===> PRINT IT OUT and DISPLAY IT in YOUR CLASSROOM!!! <===

.

Read ALSO my daily NEWS:

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)………

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.

Stay tuned for next free courses and tutorials ;)

.

.

 
21 Comments

Posted by on June 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Education, eLearning, Encryption, Engagement, Environment, Evernote, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, Ideas for a more secure Internet, Instagram, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, JOOMLA, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Motivation, Naivety, Not ONLY rights but also responsibilities, OpenOffice Vulnerabilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, SID2014, Skype insecurity, Smart TV's, Social Engineering, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, TOR-Anonymat, Tracing, Tumblr, Tutorials, UBUNTU Forums, vBulletin Forum, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,