Latest Social Media News
112.9K views | +0 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | Latest Social Media News | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...

Via Gust MEES
Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Gust MEES's curator insight, April 14, 2013 9:25 AM

 

Awareness and Protection!!!


Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Mobile Devices: The Gateway for Hackers to Your Digital Identity

Mobile Devices: The Gateway for Hackers to Your Digital Identity | Latest Social Media News | Scoop.it

While it is widely understood that mobile devices are more than just phones – they are a lifeline to the outside world, entertainment platform, GPS system, little black book and a shopping and banking tool – it’s lesser known that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone.


Hackers can use your mobile device as an access point to data that have historically been exclusively stored to your laptop or desktop, such as social network and bank accounts. One of the most harmful (and popular) mobile threats has to do with apps. Installing apps from unknown or untrusted sources like apps outside the official Google Play Market could allow hackers to steal sensitive and private information stored on your mobile device including passwords, photos, contacts and location data.

 

=============================================

 

Gust MEES

 

Critical Thinking: "While it is widely understood that mobile devices are more than just phones", really!?? Most people still think that it is ONLY a phone, but in reality it is a mini computer with phone capabilities! And any computer is vulnerable and at risk!!!

 

Check out also:

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Especially check the video under this topic "Ever thought about that your smartphone is also a computer with phone capabilities?" to understand!

 

=============================================

 

Read more, a MUST:

http://blogs.mcafee.com/consumer/mobile-devices-the-gateway-for-hackers-to-your-digital-identity?utm_source=twitterfeed&utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

McAfee Mobile Security gets additional privacy features

McAfee Mobile Security gets additional privacy features | Latest Social Media News | Scoop.it

To stay safe from malicious apps, users should research apps and their publishers thoroughly and check the ratings before installing. They should also purchase their apps from a well-known reputable app store market, watch for permissions (stay away from installing apps that don’t look right) and install antivirus software on their phone.

 

McAfee announced enhancements to its McAfee Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure apps are not ===> accessing their personal information without their knowledge <===

 

Read more:

http://www.net-security.org/secworld.php?id=13470&amp;amp;amp;utm_source=dlvr.it&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Sophos Mobile Security - Applications Android

Sophos Mobile Security - Applications Android | Latest Social Media News | Scoop.it

Sophos Mobile Security is a lightweight app which protects your Android device without reducing performance or battery life. Using up-to-the-minute intelligence from SophosLabs, we automatically scan apps as you install them. This anti-virus functionality helps you to avoid undesirable software and malicious code which can lead to data loss and unexpected costs. And if your device is lost or stolen, a remote lock will shield your personal information from prying eyes.


Keep malware at bay
• Scans apps as you install them
• Scans previously installed apps both on your device and on your SD card
• Gray-lists apps which could pose a potential threat
• Uses SophosLabs threat intelligence from the cloud with up-to-the-minute information.
Lock or locate a device which is lost or stolen
• Performs a remote lock on any Android device which you have lost or stolen
• Uses tracking technology to attempt to find your device (optional feature)
Use our Privacy Advisor to stay safe
• Detects apps which access personal data such as your address book
• Lets you easily identify apps which could create costs

 

Read more:

http://play.google.com/store/apps/details?id=com.sophos.smsec

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Facebook unveils new mobile security measures

Facebook unveils new mobile security measures | Latest Social Media News | Scoop.it
Facebook has introduced three security updates for protecting its mobile users: a code generator, the ability to report unwanted content on your phone, and improved mobile recovery flows.

The code generator should make it easier to confirm logins made on new devices, as users will be able to receive Login Approval codes through their Facebook Application and via SMS, so it will work regardless of whether the users have cellular or Internet access.

 

Read more:

http://www.net-security.org/secworld.php?id=13065

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | Latest Social Media News | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 


Via Gust MEES
Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Rescooped by Gerrit Bes from Social Media and its influence
Scoop.it!

Facebook shows its support for joint EU-US online safety declaration

Facebook shows its support for joint EU-US online safety declaration | Latest Social Media News | Scoop.it
Sheryl Sandberg confirms Facebook's commitment to keeping people safe online with support for the joint declaration today between the European Commission and US Department of Homeland Security.

 

=============================================

 

Gust MEES

 

Check out ALSO 

 

My curation about "World efforts for a more secure Internet":

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Worldwide+efforts+4+more+secure+Internet

 

=============================================

 

Read more:

http://www.zdnet.com/facebook-shows-its-support-for-joint-eu-us-online-safety-declaration-7000007664/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | Latest Social Media News | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Sophos helps businesses embrace BYOD

Sophos helps businesses embrace BYOD | Latest Social Media News | Scoop.it

“BYOD is top of mind for myriad organisations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organisations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”

 

In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations. For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.

 

Gust MEES: a MUST read for anyone who uses "Bring Your Own Device" (Hashtag for Twitter =#BYOD):

http://www.net-security.org/secworld.php?id=13423

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

New site offers a whole new approach to online safety | eSchool News

New site offers a whole new approach to online safety | eSchool News | Latest Social Media News | Scoop.it
While schools are right in teaching students about the dangers that exist online, a new website aims to promote the benefits of internet use—as well as bridge the generational gap in online use and knowledge between youth and their teachers and...

 

Gust MEES: A very good approach which I agree too, but the need of learning IT-Security is still there and a MUST!

 

Critical-Thinking: Existing problems don't go away with a makeup ;) Internet will not look more sexy after that, sorry...

 

Protect your computer and you protect ALSO the community on Internet, check my free courses to learn more:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

 

 

-  http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

 

 

 


Via Gust MEES
No comment yet.