Age of Hackers Drops to 17

The average age of suspected cyber-attackers has dropped dramatically to just 17, the UK  National Crime Agency has said.

Experts believe the “kudos” of committing crime lures teenagers on to the wrong side of the law, and pranks used in online gaming can spiral out of control. In the past year investigators from the agency, which is Britain’s equivalent of the FBI, have seen those accused of online crime getting markedly younger. The average age of 17 compares with 24 in the previous 12 months.

In one case a 12-year-old had bought the Blackshades virus – software that lets hackers secretly take control of another computer.

Robert Nowill, who works for the Cyber Security Challenge, an industry scheme, said: “Young people are becoming increasingly savvy and switched on to the world of cyber, something that is critical to the future defence of our country.

“The issue is keeping them on the right side of the law; many become attracted to the environment and the kudos they earn from getting involved in criminal activities.”

Anti-cybercrime teams say teenagers might use distributed denial of service (DDoS) to knock an opponent offline while playing a game. But this could then escalate into targeting a website and causing an outage costing businesses tens of thousands of pounds.

Organised criminal gangs scour forums to find talented young hackers, and the youngsters themselves boast about their abilities if they carry out a hack or find a security flaw that can be exploited.

Recently the NCA launched a campaign called CyberChoices, aimed at helping the parents of boys aged 12 to 15 to steer them away from crime.

Richard Jones, from the NCA’s national cybercrime unit said: “Over the past few years the NCA has seen the people engaging in cybercrime becoming younger and younger. We know that simply criminalising young people cannot be the solution to this and so the campaign seeks to help motivate children to use their skills more positively.

“We have aimed the campaign initially at parents, because we know from research that they often are unaware of what their children are doing online. These individuals are really bright and have real potential to go on to exciting and fulfilling jobs. But by choosing the criminal path they can move from low-level ‘pranking’ to higher-level cybercrime quite quickly, sometimes without even considering that what they’re doing is against the law.”

Guardian:

 

« French Government Proposals To Block Tor and Forbid Free Wi-Fi
The Future Of Healthcare Systems Is ‘Unsexy Plumbing’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.