Hack Back energetic security or Aeolus pouch?

Hack Back: Tired of hackers? Some companies are willing to hack hackers, but the hack back risks are likely to be much greater than the benefits.

With the hack back they will be able to identify the systems they are using and delete them that they stole. They will be able to destroy their computers, which is currently illegal. Hack Back

The above refers to a company survey Fidelis cybersecurity. Research shows that many companies believe they have the ability to react aggressively to attacks , if they wish.

More than half of respondents said that businesses should be able to attack hackers, and that they have the technical ability to identify an attacker, penetrate their systems and destroy any that have been stolen after a cyberattack.

More than half of the executives said that if they were legitimate, they would prefer to attack to get decryption keys after a ransomware attack rather than pay criminals to retrieve access to their data.

Τα ρίσκα του back
Image: Fidelis

But despite their loyalty to hackers, in fact most businesses do not have these skills, said Andrew Bushby, director of Fidelis Cybersecurity in the UK.

The main concerns about such a strategy are whether they can identify the real offender. There is, of course, the risk of collateral damage, according to the survey.

In fact, to the question of whether companies are financially responsible for any damage caused to innocent computers in a hack back, 63% said the company would be less likely to attempt it, although a 15% said it would He made.

The above is not a purely academic discussion: at , ο νόμος που συζητιέται για την ενεργητική in cyberspace would make hacking back in cyberspace legal.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).