Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
Gust MEES's curator insight,
November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. Learn more:
Gust MEES's curator insight,
November 17, 2014 8:28 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. Learn more:
Monty Bell's curator insight,
April 10, 2014 11:35 AM
A balanced discussion on a very contentious issue
Dr Pam Hill's curator insight,
November 1, 2013 4:04 PM
Great ideas for BYOD PD sessions. I will be using these ideas!
Elena Evtukh's curator insight,
November 8, 2013 11:43 PM
Эффективные мобльные приложения и сетевые ресурсы для BYOD класса. В - bring (принеси) Y - your (свое) O - own (собственное) D - device (устройство)
Melissa Marshall's curator insight,
November 11, 2013 2:24 AM
Great graphic for when you are unsure as to what your kids may have access to.
Gust MEES's curator insight,
September 22, 2013 4:47 PM
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Learn more:
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
Gust MEES's curator insight,
September 22, 2013 4:50 PM
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Learn more: - http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
malek's curator insight,
September 17, 2013 8:23 AM
A myriad of threats: * Employers often cannot assess data breach exposure on unmanaged BYODs *Lost or stolen BYODs that contain sensitive data, with less than 1 in 4 can be remotely wiped. * When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware and the list goes on and on
TheSoulfulEMU's curator insight,
September 24, 2013 10:12 AM
Now that you know it, so DONT- BYOD!!! Got it?
Gust MEES's curator insight,
August 16, 2013 8:40 AM
===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===
Learn more:
- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free
|
Elizabeth Milovidov's curator insight,
December 1, 2014 9:24 AM
Is your phone secure? Read these 10 tips for guidance.
Gust MEES's curator insight,
July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices. Zdziarski's questions for Apple include:
... and his last slide (page 57 of the PDF) sums it up nicely:
Learn more:
Jacqueline Taylor-Adams's curator insight,
March 27, 2014 11:55 AM
We rescooped this article from our (the Urban Tech Fair's) Czar of Education, Bonnie Bracey Sutton who shared this thought provoking article. What say, ye? ______________________ Be part of the Access, Education, and Commerce movement, the Urban Tech Fair www.UrbanTechFair.org
|
Learn more:
- https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/
- https://gustmees.wordpress.com/?s=twitter
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet
- http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet