How teens still hack million-dollar security systems

Monday, 22 April 2002, 3:04 PM EST

As awareness of information security and the threat of cyber terrorists increases, U.S. government agencies and businesses have beefed up security in order to thwart system outages and intrusions in mission-critical operations.

But even as bills are introduced that call for more severe penalties for those who break into computer systems, causing monetary damage and potentially putting people at risk, high-profile teen hacker cases persist.

While analysts cannot pinpoint exactly how teens find their way into heavily guarded government and enterprise computer systems, they pointed to several factors that often aid teen vandals more than adult perpetrators. These factors include easy-to-use scripting toolkits, readily available information and abundant time to learn new skills.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //