Age of Hackers Drops to 17

The average age of suspected cyber-attackers has dropped dramatically to just 17, the UK  National Crime Agency has said.

Experts believe the “kudos” of committing crime lures teenagers on to the wrong side of the law, and pranks used in online gaming can spiral out of control. In the past year investigators from the agency, which is Britain’s equivalent of the FBI, have seen those accused of online crime getting markedly younger. The average age of 17 compares with 24 in the previous 12 months.

In one case a 12-year-old had bought the Blackshades virus – software that lets hackers secretly take control of another computer.

Robert Nowill, who works for the Cyber Security Challenge, an industry scheme, said: “Young people are becoming increasingly savvy and switched on to the world of cyber, something that is critical to the future defence of our country.

“The issue is keeping them on the right side of the law; many become attracted to the environment and the kudos they earn from getting involved in criminal activities.”

Anti-cybercrime teams say teenagers might use distributed denial of service (DDoS) to knock an opponent offline while playing a game. But this could then escalate into targeting a website and causing an outage costing businesses tens of thousands of pounds.

Organised criminal gangs scour forums to find talented young hackers, and the youngsters themselves boast about their abilities if they carry out a hack or find a security flaw that can be exploited.

Recently the NCA launched a campaign called CyberChoices, aimed at helping the parents of boys aged 12 to 15 to steer them away from crime.

Richard Jones, from the NCA’s national cybercrime unit said: “Over the past few years the NCA has seen the people engaging in cybercrime becoming younger and younger. We know that simply criminalising young people cannot be the solution to this and so the campaign seeks to help motivate children to use their skills more positively.

“We have aimed the campaign initially at parents, because we know from research that they often are unaware of what their children are doing online. These individuals are really bright and have real potential to go on to exciting and fulfilling jobs. But by choosing the criminal path they can move from low-level ‘pranking’ to higher-level cybercrime quite quickly, sometimes without even considering that what they’re doing is against the law.”

Guardian:

 

« French Government Proposals To Block Tor and Forbid Free Wi-Fi
The Future Of Healthcare Systems Is ‘Unsexy Plumbing’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.