Hack Back energetic security or Aeolus pouch?

Hack Back: Tired of the attacks of ; Some companies are willing to hack the hackers, but the risks of hacking back are likely to far outweigh the benefits.

With hack back they will be able to locate the systems they use and delete the stolen information. They can destroy their computers, which is currently illegal. Hack Back

The above refers to a company survey Fidelis cybersecurity. Research indicates that many businesses believe they have the ability to react aggressively to hacking attacks if they so wish.

More than half of respondents said that businesses should be able to attack hackers, and that they have the technical ability to identify an attacker, penetrate their systems and destroy any stolen data after a breach. .

More than half of company executives said that if it were legal, they would prefer to attack to get the keys froms after a ransomware attack rather than paying criminals to regain access to their data.

The risks of hacking back
Image: Fidelis

But despite their belief that they could deal with hackers, in reality most businesses lack these skills, said Andrew Bushby, director of Fidelis. in the UK.

The main concerns about such a strategy are whether they can identify the real offender. There is, of course, the risk of collateral damage, according to the survey.

In fact, to the question of whether companies are financially responsible for any damage caused to innocent computers in a hack back, 63% said the company would be less likely to attempt it, although a 15% said it would He made.

The above is not a totally academic debate: in the US, the law that is being discussed about active cyber security would make cyber hacking legitimate.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).