Pedalogica: educación y TIC
127.4K views | +0 today
Pedalogica: educación y TIC
Pedalogica: educación y TIC
TIC, Educación, Pedagogía y noticas
Your new post is loading...
Your new post is loading...
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Who are the hackers? | #TED #recomiendo

Who are the hackers? | #TED #recomiendo | Pedalogica: educación y TIC | Scoop.it
The Internet connects us as never before, but there's a dark side to this web. Who are the hackers who wreak havoc online? And what is it they want?

Via Gust MEES
Gust MEES's curator insight, August 9, 2013 12:59 PM

 

Absolutely a MUST watch!!!

 

Rescooped by Alazne González from Web 2.0 for juandoming
Scoop.it!

Learning Cybersecurity: DDOS on the VideoLAN downloads infrastructure

The April 23, 2013 we experienced a major DDOS on our infrastructures this how it looked like from logstalgia. https://code.google.com/p/logstalgia/

Via Gust MEES, juandoming
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Observations on the Evolution of Cyber Tactics in 2013

Observations on the Evolution of Cyber Tactics in 2013 | Pedalogica: educación y TIC | Scoop.it
Tom Kellermann discusses the changes we can expect to see in 2013

 

The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that 2013 is the year of hacking for criminal gain.

 

In our recently released predictions for 2013, our CTO Raimund Genes illustrated his strategic vision per the future of cybercrime. The predictions highlight improvements in threats we will encounter in 2013, more specifically on the attack vectors used by cybercriminals. Raimund predicts that attackers will shift their strategy from developing sophisticated malware to focusing on the means to infiltrate networks and evade detection.


Via Gust MEES
Gust MEES's curator insight, December 23, 2012 11:09 AM

 

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Alazne González from Social Media and its influence
Scoop.it!

20 ways to keep your internet identity safe from hackers

20 ways to keep your internet identity safe from hackers | Pedalogica: educación y TIC | Scoop.it
Cybercrime costs Britain £27bn a year, and it could cost you dear too if you don't take basic precautions. James Silver asked experts for their top tips

Via Gust MEES
Gust MEES's curator insight, May 12, 2013 7:58 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

Gust MEES's curator insight, May 12, 2013 8:02 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Gust MEES's curator insight, May 12, 2013 8:03 AM

 

The weakest link in a security chain is and still will be the human!!! A security by 100% doesn't exist!!!

 

===> Read the article, a MUST!!! <===> ALSO for MAC & Linux users!!! <===

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics?API1=100&API2=3640290

 

 

Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Identity Theft: Keeping Safe in an Online World [Infographic]

Identity Theft: Keeping Safe in an Online World [Infographic] | Pedalogica: educación y TIC | Scoop.it

Via Gust MEES
Rescooped by Alazne González from 21st Century Learning and Teaching
Scoop.it!

Infographic of the week: Why ignoring information security is lethal

Infographic of the week: Why ignoring information security is lethal | Pedalogica: educación y TIC | Scoop.it

Infographic of the week: Why ignoring information security is lethal


Via Frederic GOUTH, Gust MEES
No comment yet.