Age of Hackers Drops to 17

The average age of suspected cyber-attackers has dropped dramatically to just 17, the UK  National Crime Agency has said.

Experts believe the “kudos” of committing crime lures teenagers on to the wrong side of the law, and pranks used in online gaming can spiral out of control. In the past year investigators from the agency, which is Britain’s equivalent of the FBI, have seen those accused of online crime getting markedly younger. The average age of 17 compares with 24 in the previous 12 months.

In one case a 12-year-old had bought the Blackshades virus – software that lets hackers secretly take control of another computer.

Robert Nowill, who works for the Cyber Security Challenge, an industry scheme, said: “Young people are becoming increasingly savvy and switched on to the world of cyber, something that is critical to the future defence of our country.

“The issue is keeping them on the right side of the law; many become attracted to the environment and the kudos they earn from getting involved in criminal activities.”

Anti-cybercrime teams say teenagers might use distributed denial of service (DDoS) to knock an opponent offline while playing a game. But this could then escalate into targeting a website and causing an outage costing businesses tens of thousands of pounds.

Organised criminal gangs scour forums to find talented young hackers, and the youngsters themselves boast about their abilities if they carry out a hack or find a security flaw that can be exploited.

Recently the NCA launched a campaign called CyberChoices, aimed at helping the parents of boys aged 12 to 15 to steer them away from crime.

Richard Jones, from the NCA’s national cybercrime unit said: “Over the past few years the NCA has seen the people engaging in cybercrime becoming younger and younger. We know that simply criminalising young people cannot be the solution to this and so the campaign seeks to help motivate children to use their skills more positively.

“We have aimed the campaign initially at parents, because we know from research that they often are unaware of what their children are doing online. These individuals are really bright and have real potential to go on to exciting and fulfilling jobs. But by choosing the criminal path they can move from low-level ‘pranking’ to higher-level cybercrime quite quickly, sometimes without even considering that what they’re doing is against the law.”

Guardian:

 

« French Government Proposals To Block Tor and Forbid Free Wi-Fi
The Future Of Healthcare Systems Is ‘Unsexy Plumbing’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.