Education 2.0 & 3.0
148.6K views | +0 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Microsoft is developing blockchain tech that lets you manage your digital identity | #Privacy 

Microsoft is developing blockchain tech that lets you manage your digital identity | #Privacy  | Education 2.0 & 3.0 | Scoop.it
Microsoft is out to prove blockchain naysayers wrong. In an effort to show the potential of the technology beyond its applications in cryptocurrency, the Redmond giant has announced plans to use blockchain tech as the foundation for storing and processing digital identity data.

Following a collaboration with the Decentralized Identity Foundation (DIF), Microsoft has revealed its plans to rely on blockchain technology to solve some of the challenges we face when managing our identities and personal data digitally, such as improving privacy and security across the physical and digital world.

“We believe it is essential for individuals to own and control all elements of their digital identity,” the company said in a blog post. “Rather than grant broad consent to countless apps and services, and have their identity data spread across numerous providers, individuals need a secure, encrypted digital hub where they can store their identity data and easily control access to it.”

To this end, the company is developing an off-chain solution – akin to the Lightning Network – that will allow it to process massive volumes of ID data without congesting the blockchain network.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Digital+Identity

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 


Via Gust MEES
Gust MEES's curator insight, February 15, 2018 7:07 AM
Microsoft is out to prove blockchain naysayers wrong. In an effort to show the potential of the technology beyond its applications in cryptocurrency, the Redmond giant has announced plans to use blockchain tech as the foundation for storing and processing digital identity data.

Following a collaboration with the Decentralized Identity Foundation (DIF), Microsoft has revealed its plans to rely on blockchain technology to solve some of the challenges we face when managing our identities and personal data digitally, such as improving privacy and security across the physical and digital world.

“We believe it is essential for individuals to own and control all elements of their digital identity,” the company said in a blog post. “Rather than grant broad consent to countless apps and services, and have their identity data spread across numerous providers, individuals need a secure, encrypted digital hub where they can store their identity data and easily control access to it.”

To this end, the company is developing an off-chain solution – akin to the Lightning Network – that will allow it to process massive volumes of ID data without congesting the blockchain network.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Digital+Identity

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Vivalist's curator insight, February 16, 2018 6:32 AM
It's good to see big companies start to see the power of the blockchain logic beyond the overly advertized cryptocurrencies. The tech needs to be improved, but its potential for legal applications (smart contracts, digital citizenship, etc...) is real.

And in my opinion, it's the most interesting part of blockchain.
Aleksej Vasyliev's curator insight, February 19, 2018 3:11 AM
#microsoft and #cybersecurity
Rescooped by Yashy Tohsaku from Westminster International College Assignment Help
Scoop.it!

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT 

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT  | Education 2.0 & 3.0 | Scoop.it

Via Gust MEES, ava smith
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Initiative „Datenschutz geht zur Schule“ veröffentlicht Arbeitsmaterialsammlung für Lehrer | #DigitalCitiZENship

Initiative „Datenschutz geht zur Schule“ veröffentlicht Arbeitsmaterialsammlung für Lehrer | #DigitalCitiZENship | Education 2.0 & 3.0 | Scoop.it

Via Gust MEES
No comment yet.
Rescooped by Yashy Tohsaku from Didactics and Technology in Education
Scoop.it!

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy | Education 2.0 & 3.0 | Scoop.it
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES, michel verstrepen, Rui Guimarães Lima
Gust MEES's curator insight, January 30, 2015 3:32 PM
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT

Choosing the VPN That's Right for You | CyberSecurity | Privacy | eSkills | ICT | Education 2.0 & 3.0 | Scoop.it

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Via Gust MEES
Gust MEES's curator insight, December 30, 2014 3:33 PM

It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network—benefiting from the functionality, security, and management policies of the private network.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Cookies : les outils pour les maîtriser - CNIL - Commission nationale de l'informatique et des libertés | Privacy

Cookies : les outils pour les maîtriser - CNIL - Commission nationale de l'informatique et des libertés | Privacy | Education 2.0 & 3.0 | Scoop.it
Conseils pour maîtriser les cookies et autres traceurs avec le navigateur Firefox

Via Gust MEES
Gust MEES's curator insight, December 2, 2014 9:24 AM

Conseils pour maîtriser les cookies et autres traceurs avec le navigateur Firefox


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

iBeacon – Wikipedia

iBeacon

Der Markenname ist ein 2013 von Apple Inc. eingeführter, proprietärer Standard für Navigation in geschlossenen Räumen, basierend auf Bluetooth Low Energy (BLE). Das Verfahren wird ab iOS 7 bzw. Android Version 4.3 unterstützt und kann somit ab dem iPhone 4S, iPad (dritte Generation) und iPod Touch (fünfte Generation) sowie aktuellen Android-Geräten genutzt werden.


Via Gust MEES
Gust MEES's curator insight, November 6, 2014 3:15 PM

Der Markenname ist ein 2013 von Apple Inc. eingeführter, proprietärer Standard für Navigation in geschlossenen Räumen, basierend auf Bluetooth Low Energy (BLE). Das Verfahren wird ab iOS 7 bzw. Android Version 4.3 unterstützt und kann somit ab dem iPhone 4S, iPad (dritte Generation) und iPod Touch (fünfte Generation) sowie aktuellen Android-Geräten genutzt werden.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

A Cyber Privacy Parable | Digital CitizenShip | Video

Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands....

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/

 


Via Gust MEES
Gust MEES's curator insight, October 20, 2014 10:01 AM
Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands....


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Here's How Websites Spy On Us

Here's How Websites Spy On Us | Education 2.0 & 3.0 | Scoop.it
Wondered why the adverts you see online appear linked to your browsing habits? We explain.

 

 

 

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, October 11, 2014 10:09 AM
Wondered why the adverts you see online appear linked to your browsing habits? We explain.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit"

NSA-System Treasuremap: "Jedes Gerät, überall, jederzeit" | Education 2.0 & 3.0 | Scoop.it
Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.

Via Gust MEES
Gust MEES's curator insight, September 18, 2014 9:58 AM

Die NSA und ihre Verbündeten sammeln unzählige Informationen über das Internet. In der Datenbank Treasuremap tragen sie alles ein, was sie wissen - zum Spionieren und Angreifen. Es ist die Generalstabskarte für den Cyberwar.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Specialized Magazines For Apps

Specialized Magazines For Apps | Education 2.0 & 3.0 | Scoop.it

Why Is It Important To Read Specialized Magazines? There are masses of Apps from any kind of Topics and from anywhere around from the world, difficult to know WHAT choice to make, as well as th...

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 


Via Gust MEES
Gust MEES's curator insight, September 15, 2014 9:02 PM

Why Is It Important To Read Specialized Magazines? There are masses of Apps from any kind of Topics and from anywhere around from the world, difficult to know WHAT choice to make, as well as th...


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Gust MEES's curator insight, September 15, 2014 9:07 PM

Why Is It Important To Read Specialized Magazines? There are masses of Apps from any kind of Topics and from anywhere around from the world, difficult to know WHAT choice to make, as well as th...


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Did You Know You Had Diabetes? It's All Over the Internet | Privacy

Did You Know You Had Diabetes? It's All Over the Internet | Privacy | Education 2.0 & 3.0 | Scoop.it

Dan Abate doesn’t have diabetes nor is he aware of any obvious link to the disease. Try telling that to data miners.

 

 

 

 

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, September 15, 2014 5:52 PM

Dan Abate doesn’t have diabetes nor is he aware of any obvious link to the disease. Try telling that to data miners.




Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Goldman Sachs | What is the Internet of Things? [Infographic]

Goldman Sachs | What is the Internet of Things? [Infographic] | Education 2.0 & 3.0 | Scoop.it

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom | Education 2.0 & 3.0 | Scoop.it
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 


Via Gust MEES
Gust MEES's curator insight, October 9, 2017 1:22 PM
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

Rescooped by Yashy Tohsaku from ICT Security-Sécurité PC et Internet
Scoop.it!

How to Keep Your Browsing Private from Your ISP – Safe and Savvy Blog by F-Secure

How to Keep Your Browsing Private from Your ISP – Safe and Savvy Blog by F-Secure | Education 2.0 & 3.0 | Scoop.it
A bill that has now passed both the U.S. Senate and House of Representatives would repeal a Federal Communications Commission rule issued last year that allows consumers to decide how internet service providers use their information.

 

“Your ISP can already monetize you based on your demographics,” Sean Sullivan, Security Advisor at F-Secure, tells me. “Still, they feel that they’re behind Facebook and Google’s ad technology — and arguably they are. But the difference is you can avoid Google and Facebook. You can’t avoid your ISP.”

 

There is still something that you can do that gives you more control over who has access to your browsing history.

“Your ISP is privy to all the web destinations you visit, unless you’re using a VPN,” Sean says. “Then they’re only privy to seeing that you went to, for instance, VPN.F-Secure.com.”

A VPN is a virtual private network and it puts all of your browsing data in the hands of one provider who encrypts it.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, March 29, 2017 2:30 AM
A bill that has now passed both the U.S. Senate and House of Representatives would repeal a Federal Communications Commission rule issued last year that allows consumers to decide how internet service providers use their information.

 

“Your ISP can already monetize you based on your demographics,” Sean Sullivan, Security Advisor at F-Secure, tells me. “Still, they feel that they’re behind Facebook and Google’s ad technology — and arguably they are. But the difference is you can avoid Google and Facebook. You can’t avoid your ISP.”

 

There is still something that you can do that gives you more control over who has access to your browsing history.

“Your ISP is privy to all the web destinations you visit, unless you’re using a VPN,” Sean says. “Then they’re only privy to seeing that you went to, for instance, VPN.F-Secure.com.”

A VPN is a virtual private network and it puts all of your browsing data in the hands of one provider who encrypts it.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship | Education 2.0 & 3.0 | Scoop.it
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.

 

To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.

 


Via Gust MEES
Gust MEES's curator insight, April 7, 2015 4:13 PM
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity

The hidden dangers of third party code in free apps | eLeaderShip | eSkills | MobileSecurity | Education 2.0 & 3.0 | Scoop.it

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.

 

Learn more:

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 


Via Gust MEES
Gust MEES's curator insight, January 5, 2015 4:05 PM

 eLeaderShip | eSkills | Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Wron Ga's curator insight, January 18, 2015 1:44 PM

Kolejna walka z przęklętymi reklamami, artykuł opisuje reklamy w aplikacjach które wykorzystuja wolne luki, mnie osobiście sie to nie podoba psuja cały wizerunek aplikacji i przeszkadza uzotkownikom w uzytkowaniu ich .

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Panopticlick | Browser FingerPrint | Tracking | Privacy

Panopticlick | Browser FingerPrint | Tracking | Privacy | Education 2.0 & 3.0 | Scoop.it

Via Gust MEES
Gust MEES's curator insight, December 30, 2014 3:03 PM

#Panopticlick | Browser #FingerPrint | #Tracking | #Privacy  


Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Digital CitizenShip: Social Media AND Privacy

Digital CitizenShip: Social Media AND Privacy | Education 2.0 & 3.0 | Scoop.it

Social Media is about sharing, right!? That’s WHAT it is mostly, BUT there are the HIDDEN commercial intents which MOST people don’t see (OUR Privacy is sold and OUR friends one too…) and there isALSO OUR responsibility about it WHEN WE share, WE will discuss in detail here…

First of ALL, there isn’t ANYTHING for FREE in this world, even the death costs the life and a lot of money for the funerals ;)

SO… Let us analyse WHY WE get Social Media and other services on the internet for “FREE“. BTW: there isn’t anything for FREE, WE pay with OUR information which the companies are gathering!


Via Gust MEES
Carlos Rodrigues Cadre's curator insight, November 28, 2014 9:55 AM

adicionar a sua visão ...

Pyush Pandey's curator insight, November 29, 2014 1:47 AM

Is #Social#Media frog-marching on paths of an Orwellian Future!

Ness Crouch's curator insight, September 21, 2015 7:04 AM

This is a very good infographic that can help teach about digital citizenship and online safety. 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | eSkills

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | eSkills | Education 2.0 & 3.0 | Scoop.it

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To? Well, there is a lot of different views! WE will explore WHAT could be THE BEST way to teach and to learn about Digital...


Via Gust MEES
Michael Millard's curator insight, November 2, 2014 1:20 PM

Något för mig. 

IKT för äldre är inte helt lätt. 

Lindsey Hammonds's curator insight, November 3, 2014 9:50 AM

Digital Citizenship!

Tony Guzman's curator insight, November 7, 2014 4:36 PM

Some excellent tips on being a good digital citizen. How many of these have you implemented already?

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The POODLE bug! SSL vulnerability explained - YouTube

The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.

 

http://grahamcluley.com/2014/10/poodle-b..

.


Via Gust MEES
Gust MEES's curator insight, October 15, 2014 5:46 PM
The POODLE SSL vulnerability, explained by security expert Graham Cluley. How to test if your browser is vulnerable.


http://grahamcluley.com/2014/10/poodle-b..

.

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Protecting Privacy In The Digital Age: Mikko Hyppönen Answers Your Questions

Protecting Privacy In The Digital Age: Mikko Hyppönen Answers Your Questions | Education 2.0 & 3.0 | Scoop.it
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, October 6, 2014 10:46 AM
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Willem Kuypers's curator insight, October 7, 2014 3:44 AM

Un Avis dont on peut tenir compte. A voir aussi sa prensetation au TED Talk En 2011.

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Seven privacy settings you should change immediately in iOS 8 | Digital Citizen

Seven privacy settings you should change immediately in iOS 8 | Digital Citizen | Education 2.0 & 3.0 | Scoop.it
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/

 

http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 


Via Gust MEES
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The FBI Just Finished Its Insane New Facial Recognition System | Privacy

The FBI Just Finished Its Insane New Facial Recognition System | Privacy | Education 2.0 & 3.0 | Scoop.it
After six years and over one billion dollars in development, the FBI has just announced that its new biometric facial recognition software system is finally complete. Meaning that, starting soon, photos of tens of millions of U.S. citizen's faces will be captured by the national system on a daily basis.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, September 15, 2014 6:06 PM

After six years and over one billion dollars in development, the FBI has just announced that its new biometric facial recognition software system is finally complete. Meaning that, starting soon, photos of tens of millions of U.S. citizen's faces will be captured by the national system on a daily basis.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Same Security Threats, Different Devices: Wearables and Watchables

Same Security Threats, Different Devices: Wearables and Watchables | Education 2.0 & 3.0 | Scoop.it
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

 

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/




Via Gust MEES