Age of Hackers Drops to 17

The average age of suspected cyber-attackers has dropped dramatically to just 17, the UK  National Crime Agency has said.

Experts believe the “kudos” of committing crime lures teenagers on to the wrong side of the law, and pranks used in online gaming can spiral out of control. In the past year investigators from the agency, which is Britain’s equivalent of the FBI, have seen those accused of online crime getting markedly younger. The average age of 17 compares with 24 in the previous 12 months.

In one case a 12-year-old had bought the Blackshades virus – software that lets hackers secretly take control of another computer.

Robert Nowill, who works for the Cyber Security Challenge, an industry scheme, said: “Young people are becoming increasingly savvy and switched on to the world of cyber, something that is critical to the future defence of our country.

“The issue is keeping them on the right side of the law; many become attracted to the environment and the kudos they earn from getting involved in criminal activities.”

Anti-cybercrime teams say teenagers might use distributed denial of service (DDoS) to knock an opponent offline while playing a game. But this could then escalate into targeting a website and causing an outage costing businesses tens of thousands of pounds.

Organised criminal gangs scour forums to find talented young hackers, and the youngsters themselves boast about their abilities if they carry out a hack or find a security flaw that can be exploited.

Recently the NCA launched a campaign called CyberChoices, aimed at helping the parents of boys aged 12 to 15 to steer them away from crime.

Richard Jones, from the NCA’s national cybercrime unit said: “Over the past few years the NCA has seen the people engaging in cybercrime becoming younger and younger. We know that simply criminalising young people cannot be the solution to this and so the campaign seeks to help motivate children to use their skills more positively.

“We have aimed the campaign initially at parents, because we know from research that they often are unaware of what their children are doing online. These individuals are really bright and have real potential to go on to exciting and fulfilling jobs. But by choosing the criminal path they can move from low-level ‘pranking’ to higher-level cybercrime quite quickly, sometimes without even considering that what they’re doing is against the law.”

Guardian:

 

« French Government Proposals To Block Tor and Forbid Free Wi-Fi
The Future Of Healthcare Systems Is ‘Unsexy Plumbing’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.