Is your child a hacker?

Usually when we think about "child and cybersecurity", it brings to mind images of how can we protect children from cybercriminals. Hmm. But what happens when it turns out that the "bad guy" is the child himself? It seems unlikely, however, that this phenomenon is much more common than you think. hacker baby

This is usually because at a young age, many children do not realize that there is a difference between hackers (black hats) and moral hackers (white hats), explains Phil Muncaster of the global cybersecurity team. ESET.

And because anyone who keeps their clothes has half, even if you are not sure that your child can use their technology skills for malicious purposes, you can help them channel their knowledge of technology in a timely manner through legitimate means and finally - why not? - help them start one career in cybersecurity.

When hacking becomes a game

While all of this sounds like a Hollywood movie script, the reality is more petty. Young hackers are commonplace as cybercrime tools and techniques become cheaper and more easily accessible. Some kids have shown up Amazing understanding of the technology and techniques behind the attacks, while others may just be weird and want to see how far things can go.

Η The UK's National Crime Prosecution Service (NCA) said that, according to data from the National Cybercrime Unit (Nccu), there was a 107% increase in police reports from 2019 to 2020 for students launching attacks DDoS (distributed denial of service attack). The average age for referrals to the team "Prevent"Her Nccu is said to be 15 years old while recent her report NCA revealed that children as young as nine years old have been arrested for attacks DDoS

  How to delete any YouTube videos

However, the cases of children involved in cybercrime are not limited to attacks DDoS.

For example:

  • The student Betsy Davies from London was just seven years old when he managed to hack the laptop of a stranger through an insecure public network Wi-Fi in just 10 minutes. How did he do it? Searching the internet for a guide. Only to YouTube then found about 14.000 videos with instructions.

  • Ο Elliott Gunton it was just 16 years old when he hacked the British internet service provider TalkTalk in a now infamous case that resulted in the breach of more than 150.000 customer accounts. He was later jailed for cybercrime accusations were made for serious crimes in the US.

  • An anonymous 16 year old Australian student violated its systems many times Apple, detaching 90 GB "Secure files" and gaining access to client accounts. The young man's lawyer stated that the teenager did it because he admired her Apple and dreamed of getting a job at the company.

What are the warning signs?

Parents are worried about many things. But when it comes to possible illegal activity hacking, have every reason to be vigilant of any change in their child's behavior says ο Phil Muncaster by ESET. A important study 2019 by the University of Michigan (MSU) showed some of the key features related to juvenile delinquency in cyberspace. These include:

  • Low self-control

  • Contacts with other children who also hack (mostly girls)

  • Watching TV or games on the computer (mostly boys)

  • Favorable conditions - ie to have a their own computer in a private room, with minimal parental supervision

  • Mobile phone access from an early age

  • Participation in digital piracy, low self-control

How do you know something is wrong?

There are also some signs that your child's online activity may be out of control. For example, it may leave hints that show that may have read the email or your messages, or makes extreme efforts to protect his / her privacy and denies to share his login codes.

  Anonymous: the end of hacking

Of course, this may not mean anything more than that children are just children. In fact, an early interest in certain types of software, such as penetration control tools, could actually be more than welcome.

As he explains Thomas Holt, lead author of his report MSU, without supervision, innocent "toys" can escalate. Where can this lead? According to NCA, from one simple warning, until fine, arrest, and even imprisonment for the most serious offenses.

Let us think more positively

One way to help you spot warning signs of youth piracy, such as trying to access specific cybercrime websites, piracy forums, and other obscure parts of the Internet, is to install a reliable parental control software on your child's devices.

If they have already acquired an increased level of technological knowledge, they will probably be able to hide such activity.

Another way is to find a positive outlet for their skills. Fortunately, there are several paths to follow. Some governments "Run" educational programs cybersecurity for schoolchildren who want to test, improve and develop their skills. The natural evolution from here would be one Complete career in cybersecurity. An industry that has long faced severe job shortages means that professionals have a high starting salary and can expect a long and satisfying career.

There are also government and private tenders hacking internationally, where all those interested can test their skills against the best in the world and possibly show their talent to aspiring employers.

The most important thing, though, is to keep the lines of communication open. Take an interest in your children's hobbies. And if you are worried that they may be drawn into the illegality, remind them of the dangers that lie ahead and push them towards more positive and legitimate activities.

Follow us on Google News at Google news

hacker, child hacker, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published.

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).

  + 61 = 62