While watching Rogue One – especially during the scenes where they infiltrate the data center and transmission tower – there were several plot devices that were head-scratchers from an IT perspective.
Apparently I am not the only person who felt that way.
Last week, Wired ran a story on how Trump is still using an unsecured phone. The risks involved with this are almost endless. And, with all the talk during the campaign season about hacking, mail servers, etc., one would think this wouldn’t be an issue.
The end of the year was spent in Shanghai and Thailand.
I was able to knock two things off my bucket list:
- Visited Shanghai Disneyland – which means I have now visited every Disney park in the world.
- Got certified (along with my girlfriend) for open water diving.
Shanghai Disneyland just opened in June, so the park is pretty sparse. Not many rides. Tron is fun, but their version of Pirates of the Caribbean is amazing. Line jumping was out of control. There are signs all over the park and in the maps / guides telling people not to jump line. Yet they did anyway. It quickly became pointless to argue.
Diving was great. Went to New Heaven Diving School in Thailand. The entire course was open water – no training in a pool beforehand. The sights were amazing. Sadly, I missed one dive due to seasickness. But I was able to do all remaining dives and get my certification.
What has been really tragic, though, is that just days after we left, the island was hit by a massive monsoon. Forty-eight straight hours of rain flooded most of the island.
2017 is here. And soon, the world will look very different than it does today. If you want a meta-view of The Media and what’s going on in the world, follow Dan Rather on Facebook. You won’t be disappointed.
Happy New Year, be good to yourself. Make 2017 the year you get serious about your online security.
New Year’s Beach Party in Thailand
Found this on reddit recently.
Even if YOU are consistently vigilant about your private information, other people’s sloppiness can be catastrophic for you.
Because holding your data for ransom wasn’t enough, now hackers want you to infect your friends’ computers for them.
It’s a twisted, evolutionary step in both ransomware and social engineering.
Cory Doctorow recently wrote an article on the trend of Hollywood portraying hackers in a more realistic fashion. He cites Mr. Robot as an example of how hacker’s really work – through social engineering, white paper analysis, etc. Gone are the days of an on screen hacker typing a few commands and shouting, “I’m in!”. We now see the long, methodical process that goes into hacking and the societal weaknesses they exploit in the process.
Online privacy and security takes a multi-fold approach. Make sure your software is secure, but at the same time, make sure you’re not opening yourself up to exploitation by sharing information with the wrong people.
The US National Institute for Standards and Technology has formulated new guidelines for password administration, including doing away with both password hints and password expiration. It’s an interesting read.
Ransomware has been hitting users – both individuals and large corporations. And not just Windows users, either. There are known ransomwares for Mac OS X and Linux as well.
The best protection is not to get infected in the first place. Use anti-virus programs with active monitoring.
Also, make sure you have multiple, secure backups in place. If you do get infected, you can restore from backup.
Read more about preventing and recovering from ransomware hits here.