The Atomic Age of Renegades – Hacktivists, Activists and Terrorists

In 1942, siblings Hans and Sophie Scholl began secretly protesting the government in power of their country.

In an act of non-violent resistance, they created leaflets calling for the sabotage of the industrial complex that created munitions for the war and called for the overthrow of their government. Collectively known as White Rose, these siblings — along with a handful of students and philosophers — did what they could against the Goliath that was the Nazi war machine.

In January of 1943, they were captured and executed in February of that year. To this day, they act as a symbol of resistance and freedom against tyranny. Several new groups have taken up Hans and Sophie’s cause in their own countries to resist the regimes they reside under. Continue reading “The Atomic Age of Renegades – Hacktivists, Activists and Terrorists”

The Ever-Increasing Cost of a Data Breach

Data breaches have been so common in professional businesses and retail in the last 5 or so years that, like stink bug invasions or polar vortex freezes, people simply accept them as a fact of life.

As individuals have found out, banks can cover most of the damage that a company’s financial data breach can do to their bank accounts or credit cards. But when it comes to personal data like social security numbers, birthdays and health records — data that can’t be changed — there isn’t much that can be done.

On the company side, a breach can devastate a small business and be incredibly costly to enterprises. And with every breach, trust in a company flags. As the Ponemon Institute’s recent Cost of Data Breach Study: United States report points out, the biggest financial cost to companies is in the form of lost business. Continue reading “The Ever-Increasing Cost of a Data Breach”

4 Reasons Why You Should Consider FTP Cloud Storage

FTP has been the staple of the IT industry since Bill Gates was a college student. FTP has many applications and one of them is FTP cloud storage. Basically, FTP cloud storage is the convenience of cloud storage (such as remote access) with the foundation and consistency of FTP to upload and download the files.

How is FTP cloud storage different from FTP for file transfers? The technology isn’t different, the use case is different. FTP cloud storage is mainly used for storing data and accessing files remotely. FTP without cloud storage is essentially used for transferring data to another server or computer. If you want a quick intro to FTP, check out this FTP roundup, otherwise keep reading to find out four benefits of FTP cloud storage. Continue reading “4 Reasons Why You Should Consider FTP Cloud Storage”

The Sacrifice of Ourselves to Technology: When Our Privacy Is No Longer Private

The altar of technology demands many sacrifices.

We sacrifice our time by keeping current with the endless streams of social media and news. We sacrifice a bit of our wealth in the constant desire to keep up with the latest technology that promises to be only slightly more convenient or innovative than the previous model.

We can even sacrifice our personal security by using “free” services that easily store our information for us, but are also susceptible to breach and thus exposure of our sensitive data. However, the largest sacrifice we, as a society, offer to the altar of technology is the loss of many aspects of personal privacy and it would seem that most of us are frankly okay with this. Continue reading “The Sacrifice of Ourselves to Technology: When Our Privacy Is No Longer Private”

To Hack or Not to Hack: From Russia with Love

Open up any decent history textbook and one can read about governments spying on each and trying to interfere with smooth operations, steal information and gain advantages over one another in technology development. One of the longest ongoing terms of espionage was between the Soviet Union and the United States in what is called “The Cold War.” The Soviets would spy on the Americans, and the Americans would spy on the Soviets.

After this period ended and the Soviet Union dissolved, it came to light just how vast and complex the espionage was on both sides. In the modern era, national intelligence agencies spy on each other for various reasons and the advent of the internet has made this a virtual free-for-all for interception of information and spying. Continue reading “To Hack or Not to Hack: From Russia with Love”

Know Your Frenemy: The Geography of Hackers

Lately, the world seems like a rather small place. Our data travels at around 3,000 miles a second globally, we can travel anywhere in about a day and we can share and collaborate with each other instantly in real-time over the internet.

People aren’t that different either; no matter the culture or customs, most people just want to live their lives in relative peace and safety. If there is one universal trait that we as a species share, it’s our ability to use the resources that are available to our advantage, usually for good, though sometimes for bad.

Because I speak on cybersecurity, cyberwarfare and their respective trends, I occasionally get the question, “So, why does it seem like certain regions of the world excel at one kind of cyberthreat or another?” Continue reading “Know Your Frenemy: The Geography of Hackers”

Safety First: A Cybersecurity Roundup

In the eternal battle between dark and light, it can seem like darkness is pulling ahead, especially when it comes to online security. Everything we do, from sharing personal milestones to business transactions to medical records takes place online and, unfortunately, those transactions plus the fact that we’re human and prone to error make us very vulnerable.

The good news is there are people out there fighting the good fight to keep us secure. Cybersecurity expert, Nick Espinosa, of BSSI2 is constantly updating our readers on how to stay secure from both personal and professional standpoints. If you’ve missed any of his security-focused articles in the past, now’s a good time to catch up on those and a few more. Continue reading “Safety First: A Cybersecurity Roundup”