Hack Back energetic security or Aeolus pouch?

Hack Back: Tired of hackers? Some companies are willing to hack hackers, but the hack back risks are likely to be much greater than the benefits.

With hack back they will be able to locate the systems they use and delete the stolen information. They can destroy their computers, which is currently illegal. Hack Back

The above refers to a of ς Fidelis cybersecurity. Research indicates that many businesses believe they have the ability to react aggressively to hacking attacks if they so wish.

More than half of respondents said that businesses should be able to attack hackers, and that they have the technical ability to identify an attacker, penetrate their systems and destroy any που έχουν κλαπεί μετά από ένα .

More than half of company executives said that if it were legal, they would prefer to attack to get the decryption keys after an attack παρά να πληρώσουν τους εγκληματίες για να ανακτήσουν in their data.

The risks of hacking back
Image: Fidelis

But despite their belief that they could deal with hackers, in reality most businesses lack these skills, said Andrew Bushby, director of on .

The main concerns about such a strategy are whether they can identify the real offender. There is, of course, the risk of collateral damage, according to the survey.

In fact, to the question of whether companies are financially responsible for any damage caused to innocent computers in a hack back, 63% said the company would be less likely to attempt it, although a 15% said it would He made.

The above is not a purely academic discussion: in the US, the law being discussed is about the active in cyberspace would make hacking back in cyberspace legal.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).