21st Century Learning and Teaching
586.7K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cloud-Security', 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

So tickt die Cloud - AWS, Azure und Docker auf der Überholspur | ICT

So tickt die Cloud - AWS, Azure und Docker auf der Überholspur | ICT | 21st Century Learning and Teaching | Scoop.it

1060 Unternehmen weltweit verraten, welche Cloud-Services sie am liebsten nutzen, welche Business-Vorteile sie realisiert haben und wo es Probleme gab. Der State-of-the-Cloud-Report 2016.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cloud


Gust MEES's insight:

1060 Unternehmen weltweit verraten, welche Cloud-Services sie am liebsten nutzen, welche Business-Vorteile sie realisiert haben und wo es Probleme gab. Der State-of-the-Cloud-Report 2016.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cloud


No comment yet.
Scooped by Gust MEES
Scoop.it!

Google Docs hijacked by Trojan.APT.Seinup malware

Google Docs hijacked by Trojan.APT.Seinup malware | 21st Century Learning and Teaching | Scoop.it
FireEye spots crooks using old tricks to avoid detection

 

A cyber attack that uses Google Docs to avoid detection in order to steal information has been spotted in the wild.

 

Security firm FireEye reported uncovering the campaign, warning that the crooks are using advanced malware to mount a targeted spear phishing campaign designed to steal corporate and personal data from a variety of victims.

 

FireEye researcher Chong Rong Hwa wrote: "The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN [Association of Southeast Asian Nations]. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."

 

Gust MEES's insight:

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Gust MEES's curator insight, June 23, 2013 10:28 AM

 

"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."


Jason Toy's curator insight, June 23, 2013 11:04 AM

Interesting read. Looks like FireEye's sandboxing techniques paid off in this regard.

Scooped by Gust MEES
Scoop.it!

The 9 Top Threats Facing Cloud Computing

The 9 Top Threats Facing Cloud Computing | 21st Century Learning and Teaching | Scoop.it
The Cloud Security Alliances's latest survey of cloud security threats show a rising fear of cybercriminals topping the list.

 

 

 

 

 

 

 

 

 

 

 

The Notorious Nine: Cloud Computing Top Threats in 2013

 

- Data Breaches

 

- Data Loss

 

- Account Hijacking

 

- Insecure APIs

 

- Denial of Service

 

- Malicious Insiders

 

- Abuse of Cloud Services

 

- Insufficient Due DiligenceShared

 

- Technology Issues

 

Gust MEES's insight:

 

===> The weakest link in a security chain ist still and will still be the human!!! <===

 

 

Gust MEES's curator insight, March 4, 2013 12:29 PM

===> The weakest link in a security chain ist still and will still be the human!!! <===


Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Dropbox Security Breach: Who's Guarding Your Secrets In The Cloud?

Dropbox Security Breach: Who's Guarding Your Secrets In The Cloud? | 21st Century Learning and Teaching | Scoop.it
Drew Houston of Dropbox speaks during the Digital Life Design conference (DLD) at HVB Forum on January 23, 2012 in Munich, Germany. Dropbox is investigating whether its security was breached, leading to spam messages to users.

 

Cloud services are the ballyhooed future of software, information storage, device management and whatever else you can think of that requires the use of a computer or device. Which is why Dropbox’s current investigation into itself gives pause. The preeminent cloud-company is checking to see whether its security has been breached, leading to a rash of spam emails sent to users.

 

If such hack-attacks are not subdued when aimed at massive central information-storage servers, can the cloud be trusted?

 

Read more:

http://www.forbes.com/sites/karstenstrauss/2012/07/19/dropbox-security-breach-security-in-the-cloud/?ss=cio-network

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index | 21st Century Learning and Teaching | Scoop.it
Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Infographic: Security and the Cloud 2012

Infographic: Security and the Cloud 2012 | 21st Century Learning and Teaching | Scoop.it
CloudPassage provides this infographic reflecting the answers of IT pros to its survey about cloud uses and security issues.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, May 1, 2013 11:52 AM

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

Scooped by Gust MEES
Scoop.it!

Secure your digital self: auditing your cloud identity

Secure your digital self: auditing your cloud identity | 21st Century Learning and Teaching | Scoop.it
An Apple iCloud service hack highlights the need for personal cloud security.

 

Read more:


http://arstechnica.com/information-technology/2012/08/secure-your-digital-self-auditing-your-cloud-identity/


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud


 

Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud

No comment yet.