Age of Hackers Drops to 17

The average age of suspected cyber-attackers has dropped dramatically to just 17, the UK  National Crime Agency has said.

Experts believe the “kudos” of committing crime lures teenagers on to the wrong side of the law, and pranks used in online gaming can spiral out of control. In the past year investigators from the agency, which is Britain’s equivalent of the FBI, have seen those accused of online crime getting markedly younger. The average age of 17 compares with 24 in the previous 12 months.

In one case a 12-year-old had bought the Blackshades virus – software that lets hackers secretly take control of another computer.

Robert Nowill, who works for the Cyber Security Challenge, an industry scheme, said: “Young people are becoming increasingly savvy and switched on to the world of cyber, something that is critical to the future defence of our country.

“The issue is keeping them on the right side of the law; many become attracted to the environment and the kudos they earn from getting involved in criminal activities.”

Anti-cybercrime teams say teenagers might use distributed denial of service (DDoS) to knock an opponent offline while playing a game. But this could then escalate into targeting a website and causing an outage costing businesses tens of thousands of pounds.

Organised criminal gangs scour forums to find talented young hackers, and the youngsters themselves boast about their abilities if they carry out a hack or find a security flaw that can be exploited.

Recently the NCA launched a campaign called CyberChoices, aimed at helping the parents of boys aged 12 to 15 to steer them away from crime.

Richard Jones, from the NCA’s national cybercrime unit said: “Over the past few years the NCA has seen the people engaging in cybercrime becoming younger and younger. We know that simply criminalising young people cannot be the solution to this and so the campaign seeks to help motivate children to use their skills more positively.

“We have aimed the campaign initially at parents, because we know from research that they often are unaware of what their children are doing online. These individuals are really bright and have real potential to go on to exciting and fulfilling jobs. But by choosing the criminal path they can move from low-level ‘pranking’ to higher-level cybercrime quite quickly, sometimes without even considering that what they’re doing is against the law.”

Guardian:

 

« French Government Proposals To Block Tor and Forbid Free Wi-Fi
The Future Of Healthcare Systems Is ‘Unsexy Plumbing’ »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.