Connect with us

Publications

Cyber Hero’s: WANTED

Published

on

Some of the most intellectually sound and prophetically intense, and intelligent people in the world spend much of their time behind a keyboard, mouse, and about 5.5 lbs of LCDs and plastic. Cyber predators are like internet thugs with cyber weapons that they mostly use to extort the helpless and innocent. The scary thing is, the internet, in my opinion, has given people a newfound power to spy or inflict their will on others by forcing them into submission through Cyberwarfare. Cybersecurity personnel has an obligation to the safety of their clients and data.

image

Vincent Alexander Hacker Noon profile picture

@theadaptationVincent Alexander

A motivated individual here to build mutually beneficial relationships

Zero to Hero

Let’s talk about Cybersecurity.

Aside from the fact that over 2020-2021 it has practically become a household name, it also sends a chill down the backs of hackers that have no idea just how crazy things get for them when they think they are getting away with committing Cyber-crime. Sometimes the area is gray but, when the crime is carried out by an infamous “blackhat” or “bad actor”, it changes the narrative of just how ugly the crime can be. If you’re a programmer or a security professional then you know what you’re capable of. I mean let’s face it, we’re dangerous, but in a good way. So, naturally, I would want to know how to stay in the loop while also shielding myself from some of the threats AND temptations of this industry. Look, some of the most intellectually sound and prophetically intense, and intelligent people in the world spend much of their time behind a keyboard, mouse, and about 5.5 lbs of LCDs and plastic. Some of us don’t have the time or care to spend time away or are distracted from things that matter. Anyway, the point of this article is to show some of the Cyber cadets and trainees that you can still be a badass without hurting people. Let’s look at a couple of different scenarios 

Cyber Predators

image

Ok, so I’ll just be blunt here, Cyber predators are like internet thugs with cyber weapons that they mostly use to extort the helpless and innocent. That’s not ok. What would be ok, is locating a bad actor and mitigating the proper protocol. You don’t want to make them suffer too much because that’s not our job, just the fact that the threat was eliminated and the bad actor’s position was revealed will be enough to send em’ packing. The scary thing is, the internet, in my opinion, has given people a newfound power to spy or inflict their will on others by forcing them into submission through Cyberwarfare. Not my problem, but let’s face it, we have all experienced a lack of privacy or some type of online bullying. Well, Cyber predators are just online bullies, but worse. So, you need to stay vigilant in your quest for justice! Cybersecurity personnel has an obligation to the safety and protection of their clients and data. It’s a tough pill to swallow, but being in this field, you can’t trust anyone. So let’s look at an example scenario. 

Here’s the Scenario

image

A student returns to school, he attends a back-to-school event. He spends most of his time in the STEM department. He approaches a programming professor and asks about the little sign on the front of the laptop that reads “Ask for a hacking demo”. So naturally, the student is intrigued. The professor tells the student to take a seat and he watches as the professor asks the student to log in to his Facebook. The student naively leans into the laptop with little hesitation and continues to click his way in. The student leans back in his chair and says “there, I’m in. What now?”. The professor replies, “Me Too”. The student then asks what the professor meant by that and the professor proceeds by informing the student that while he was login into his account, he failed to inspect the page or he would have noticed that instead of a Facebook address in the URL, it was replaced by these random numbers. Little did the student know that he has just been Social Engineered. The professor was kind enough to tell the student to change his password and log out completely, but mainly that he had just learned a valuable lesson. So you see, you can’t trust anyone 100%. 

Exploitation

image

With the vast increase in stupidity across the globe, along with the rise of social media, we have all had to bear witness to some of the most useless content on the internet. So, it’s no wonder that all the smart people go somewhere where none of the dumb people will ever look for them, on intellectual podcasts and physics, mathematics, and historical forums and blogs. You can also find intelligent people lurking outside the box, as most of them choose not to partake in the nonsensical transgression of some of the modern-day society. However, some of us within Cybersecurity is still tasked with the safety of the very same people. Although you may have the urge to lock down someone’s account or harvest credentials and DNS logs, don’t. You will be no better than the Cyber thugs waging war on the innocent. Here’s the thing about exploitation, it’s a form of abuse. I grew up and was mentored by a close friend that introduced me to programming and Cybersecurity. He was badly abused as a child and poorly treated by a system that failed him. If anyone has a right to be angry, it’s him. Unfortunately, the cycle of abuse continues and the attacks just keep on coming. You see, the exploitation methods that many bad actors use can be traced back to exploitation that they have experienced at one point and is now rooted within them. So, just remember that when you are looking for exploits in a defenseless target, you are essentially exploiting yourself and sinking to a lower level by continuing the cycle of abuse. 

AWS (not Amazon)

image

Autonomous Weapon’s Systems, we all know they exist. Look, I’m not sure if anyone else is making an effort to produce content that warns of the dangers of A.I. and Autonomous Weapons Systems, but I’d like to at least try and deter you from getting involved for the wrong reasons. See, weapons systems such as these are scary and it treads into a territory that may be unfamiliar for most. If these weapons were to break loose at any point, we could have a real problem on our hands. One day you may find yourself on the front lines of protecting our air and spaceways. You will be thoroughly briefed on the ins and outs of all these machines. What we don’t need is for an angry or disgruntled employee making their way onto a predator drone. The likelihood of this is low, but I do foresee someone developing a new piece of technology that’s held up by the reediness of the algorithm and is shipped and ready for d-d-d-destrcution…not good. Again, you need to stay vigilant and remain that way because the future we are moving into holds intentions, I believe, maybe beyond our current imaginations. 

The Moral

image

Well, at this point if you’re not convinced I don’t know what would convince you. Let’s be honest, this line of work is not for the faint of heart so if you don’t have a passion for technology and thirst for knowledge, maybe try retail. We need Cyber Heroes, not bullies, wannabe’s or thugs. We need the cream that is rising to the top and is not afraid to sink their Cyber teeth into a growing and potentially endless field. Be a Cyber Hero, it’s more rewarding and the pay is great. 

“Happiness can be found even the darkest of times, if one only remembers to turn on the light.” – Albus Dumbledore

Tags

Join Hacker Noon

Create your free account to unlock your custom reading experience.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://hackernoon.com/cyber-heros-wanted?source=rss

Publications

About The Current Global Collapse Trajectory and COP26 – Tuesday, October 26th

Published

on

Sustainable Consumption at COP 26
Implementing SDG 12

Update to Limits to Growth Author and IPCC Contributor on the Panel
Tuesday, October 26, 2021
1:15 to 2:45 PM EDT
Alert Colleagues. Register and get the recording link.

Please attend our next lead-up to COP26 webinar focusing on the current economic and social collapse trajectory. First, Gaya Herrington, author of the recent “Update to Limits to Growth,” will present her findings from updated modeling. Then, Russian climatologist and IPCC contributor Oleg Anisimov will examine evidence of Arctic destabilization, and Karim Ahmed will discuss health and populations at risk.

Nancy Gillis, the Global Electronics Council CEO, will moderate the session and discuss GEC’s new campaign to better manage the natural resources required to change the trajectory. More details and panel bios are below.

Register

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://www.ethicalmarkets.com/about-the-current-global-collapse-trajectory-and-cop26-tuesday-october-26th/

Continue Reading

Publications

Perspectives: The Real “Right to Life”

Published

on

Manchin’s fear of an “Entitlement Society”

By Rinaldo S. Brutoco

The following Perspectives column was published in the October 21, 2021 (online and printed) edition of the Montecito Journal as well as on the World Business Academy website.
Roe v. Wade appears to be on its last legs. The current, radical, Supreme Court sits poised to riddle Roe with Texas-sized exceptions or to overturn it all together. Ever since Roe was handed down on January 22, 1973, the press has been full of, and our national politics traumatized by, charges and counter-charges concerning the “right to life.” What is at stake in this current Supreme Court term is whether a woman has a right to control her own body in consultation with her private physician, or whether women will lose that right and be forced to act as baby machines because external political forces are allowed to impose their narrow view of morality on the rest of us.

 Continue reading…

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://www.ethicalmarkets.com/perspectives-the-real-right-to-life/

Continue Reading

Publications

COP26 to Break Ground for Zero Carbon Buildings Future

Published

on

By Christiana Hageneder, Head of the Programme for Energy Efficiency in Buildings (PEEB), and Martina Otto, Head of UNEP’s Cities Unit and GlobalABC Secretariat

In a few days, thousands of world leaders, CEOs, negotiators, activists and journalists will gather in Glasgow for COP26, which comes at a time of climate emergency.

When we think of the root causes of climate change, they are often represented by smoking exhaust pipes, cargo ships, planes, coal mines or oil fields; rarely by our own homes, offices, heating boilers and air-conditioners, or construction sites and cement plants.

Yet buildings are a top emitter of climate-changing gases into our atmosphere: 37 per cent of energy-related CO2 emissions in 2020 came from the construction and operation of our buildings – houses, apartments, offices, hospitals, schools, markets, train stations or airports.

The buildings and construction sector must urgently be decarbonized through a triple strategy: Reducing energy demand, decarbonizing the power supply, and addressing embodied carbon stored in building materials, if we are to have any chance of meeting the Paris Agreement goal of limiting global warming to 1.5C

According to the 2021 Global Status Report for Buildings and Constructions, which was released on 19 October 2021, the challenges to reaching a net zero, energy-efficient and resilient buildings and construction sector are considerable: GlobalABC’s Global Buildings Climate Tracker shows improvements in energy investment and power decarbonization, yet these efforts are insufficient, both in terms of speed and scale, to achieve the deep sectoral transformation that is needed.

Glasgow must mark a breakthrough for climate action in buildings.

The good news is that the world is waking up to the reality that the built environment is a critical sector for climate action. Six years after COP21 in Paris that put buildings on the agenda, 2021 features a Cities, Regions and Built Environment Day. Taking place on 11 November, it is spearheaded by a strong alliance of partners rallying under the #BuildingToCOP26 campaign, with support from the COP26 UK presidency and the High-Level Climate Champions.

Read more

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://www.ethicalmarkets.com/cop26-to-break-ground-for-zero-carbon-buildings-future/

Continue Reading

Publications

Labor and Workers in the Food System

Published

on

Sustainable food must be produced in a way that takes not only the environment and consumers into account, but also the people who grow, harvest and process it.

Current methods of production of crops, like corn and soybeans, rely heavily on machinery. Thousands of acres can be planted, sprayed and harvested by just a few people operating large equipment like tractors and combines; the latest versions of which have built-in GPS and computers to analyze the field.

But for raising and processing fruits, vegetables, meat and poultry, the agriculture industry still relies primarily on human labor. Farm and food workers are mainly an immigrant workforce, many of whom are undocumented. They are often poorly paid and work in harsh or dangerous conditions. This is just the latest chapter in a long history: the US was built on exploitative agricultural labor that dates back to slavery. Today, however, some of the most successful worker-organizing strategies are emerging from the fields, as farm and food workers fight for their rights and dignity.

A Brief History of US Farm and Food Labor

The struggles of today’s food and farmworkers are not new. The National Farm Worker Ministry spells out that since the earliest US history, agricultural workers have been a disenfranchised group, often brought against their will and denied the right to vote once in the US. A brief examination of a history of US farm labor shows that it is inseparable from a history of state-sponsored racism. 1

In the 1600s, indentured servants were brought from England with the agreement to work as field laborers in exchange for their passage to the so-called New World. When farm labor demand began to outstrip the supply of willing servants, land owners and bosses expanded the African slave trade, developing an economy reliant on the labor of enslaved people kidnapped from Africa. The practice continued legally for 200 years, enriching businesses in both North and South, until the end of the Civil War in 1865.

Following the war, constitutional amendments passed prohibiting slavery and granting citizenship to formerly enslaved men, and promises were made to help integrate them into society. But instead of granting formerly enslaved people their promised “40 acres and a mule,” the white power structure passed the sweeping Jim Crow laws of the 1890s, institutionalizing discrimination and ensuring that cruel treatment of African-Americans would continue for decades to come. As a result, many former slaves and their descendants continued working in the fields sharecropping or to pay off debts, often in conditions not notably better than enslavement.

Continue reading

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://www.ethicalmarkets.com/labor-and-workers-in-the-food-system/

Continue Reading
Blockchain4 days ago

People’s payment attitude: Why cash Remains the most Common Means of Payment & How Technology and Crypto have more Advantages as a Means of payment

Energy3 days ago

U Power ties up with Bosch to collaborate on Super Board technology

Startups4 days ago

The 12 TikTok facts you should know

Supply Chain4 days ago

LPG tubes – what to think about

Energy3 days ago

Notice of Data Security Breach Incident

Energy3 days ago

Piperylene Market Size to Grow by USD 428.50 mn from 2020 to 2024 | Growing Demand for Piperylene-based Adhesives to Boost Growth | Technavio

Blockchain3 days ago

Blockchain & Infrastructure Post-Event Release

Blockchain4 days ago

Week Ahead – Between a rock and a hard place

Esports3 days ago

How to get Shiny Zacian and Zamazenta in Pokémon Sword and Shield

Cyber Security3 days ago

Ransomware Took a New Twist with US Leading a Law Enforcement Effort to Hack Back

Esports3 days ago

Phasmophobia Nightmare Halloween Update Coming Oct. 25

Code3 days ago

How does XML to JSON converter work?

AR/VR2 days ago

The VR Job Hub: Make Real, Survios, SAIC & Armature Studio

Cleantech2 days ago

Q3 Saw Europe’s EV Share Break New Ground Above 20% & Overtake Diesel For First Time

AR/VR4 days ago

Review: Spacefolk City

Gaming3 days ago

BetSofa Review – Online Casino Real Money

AR/VR4 days ago

Hero Brawler Quantaar to Hold Week-Long Steam Demo

Medical Devices5 days ago

Align Technology to Host Investor Day on October 29, 2021

Artificial Intelligence4 days ago

Morgan Stanley’s robot Libor lawyers saved 50,000 hours of work

Blockchain3 days ago

Analyst Puts Bitcoin Bottom At $50,000, Here’s Why

Trending