21st Century Learning and Teaching
586.7K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD', 'Digital Citizen'. Clear
Scooped by Gust MEES
Scoop.it!

Mobile botnets detected since 2010 [pdf] | MobileSecurity | CyberSecurity

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity | 21st Century Learning and Teaching | Scoop.it
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Gust MEES's insight:
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


No comment yet.
Scooped by Gust MEES
Scoop.it!

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.




1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Gust MEES's insight:
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.


1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Elizabeth Milovidov's curator insight, December 1, 2014 9:24 AM

Is your phone secure?  Read these 10 tips for guidance.

Scooped by Gust MEES
Scoop.it!

BYOD Pros and Cons in Education [Infographic]

BYOD Pros and Cons in Education [Infographic] | 21st Century Learning and Teaching | Scoop.it
The BYOD Pros and Cons in Education Infographic highlights many of the advantages and disadvantages to letting students use personal devices in the classrooms.


Learn more:



Gust MEES's insight:


The BYOD Pros and Cons in Education Infographic highlights many of the advantages and disadvantages to letting students use personal devices in the classrooms.


Learn more:



Monty Bell's curator insight, April 10, 2014 11:35 AM

A balanced discussion on a very contentious issue

Scooped by Gust MEES
Scoop.it!

Smartphone pictures pose privacy risks

Smartphone pictures pose privacy risks | 21st Century Learning and Teaching | Scoop.it

..Did You Know: You and your kids could get easily tracked!.Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Digital+Citizen

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

handysektor | Sicherheit im mobilen Netz

handysektor | Sicherheit im mobilen Netz | 21st Century Learning and Teaching | Scoop.it
Die Internetseite www.handysektor.de ist ein werbefreies Informationsangebot für Jugendliche. Die sichere Nutzung von WLAN, Mobiltelefon, Notebook, Game Konsole, Bluetooth steht dabei im Vordergrund.

 

Mehr erfahren:

http://www.handysektor.de/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security / Smartphones sind AUCH Mini-Computer!

Mobile Security / Smartphones sind AUCH Mini-Computer! | 21st Century Learning and Teaching | Scoop.it

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm

Gust MEES's insight:

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm


No comment yet.
Scooped by Gust MEES
Scoop.it!

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:28 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Gust MEES
Scoop.it!

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy? | 21st Century Learning and Teaching | Scoop.it
. . WHAT Are Apps? [START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile dev...
Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's curator insight, March 12, 2014 6:25 PM


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

Jacqueline Taylor-Adams's curator insight, March 27, 2014 11:55 AM

We rescooped this article from our (the Urban Tech Fair's) Czar of Education, Bonnie Bracey Sutton who shared this thought provoking article. What say, ye?


______________________

Be part of the Access, Education, and Commerce movement, the Urban Tech Fair www.UrbanTechFair.org

Scooped by Gust MEES
Scoop.it!

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own

BYOD: 11 Sample Education BYOT Policies To Help You Create Your Own | 21st Century Learning and Teaching | Scoop.it
11 sample BYOT policies to help a school or district create their own.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Blue Jay Bridge's curator insight, June 6, 2013 8:59 PM

I've seen folks asking for this info on twitter. Hope this helps.

Scooped by Gust MEES
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | 21st Century Learning and Teaching | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD