1. Guest
  2. Login | Subscribe
 
     
Forgot Login?  

FREE Newsletter Subscription, Click The 'Subscribe' Button Below To Subscribe!

Weekday News Bulletin

PortMac.News FREE Weekday Email News Bulletin

Be better informed, subscribe to our FREE weekday news Update service here:

PortMac Menu

This Page Code

Page-QR-Code

They are what is known as white hat hackers (or ethical hackers) — a type of hacker that is increasingly being hired by Australian companies as more and more organisations experience data breaches.

Source : PortMac.News | Street :

Source : PortMac.News | Street | News Story:

main-block-ear
 
'White hat' ethical hackers hit targets 'From the inside'
They are what is known as white hat hackers (or ethical hackers) — a type of hacker that is increasingly being hired by Australian companies as more and more organisations experience data breaches.

News Story Summary:

Jessica Cruz and Ed Hopkins (Above) are hackers, but not in the way you might expect.

They are what is known as white hat hackers (or ethical hackers) — a type of hacker that is increasingly being hired by Australian companies as more and more organisations experience data breaches.

Ethical hackers legally target companies in order to find vulnerabilities in their systems. They then tell their clients how to fix these issues before other less ethical hackers exploit them in illegal or immoral ways, including accessing private customer data.

"We break things before someone else does," says Ms Cruz. "With permission of course."

Fellow hacker Mr Hopkins says ethical hacking is "a rush" and "the best job in the world".

"You're doing it without the risk of police rolling up at your door, and also without the moral burden of doing something terrible," he says.

"So it's the best type of hacking."

Georg Thomas is a cyber security consultant and senior manager of the cyber team at consulting firm Deloitte.

Telecommunications giant Optus has hired Deloitte to run an independent external review of its recent data breach.

Dr Thomas says a white hat hacker is "a cyber security professional that has the same skills and uses the same tools and techniques as a malicious hacker, but the intent is good".

"Hackers look like everyday people. You could walk past one in the street, and you wouldn't know," he says.

The different types of hackers:

There are three main types of hackers:

Black hat hackers — who usually act in a malicious or illegal way, in order to achieve some personal or financial gain, or just to cause chaos

Grey hat hackers — who also try to illegally find holes in security systems, but might use information they find to alert the offending organisation (and request money in return), publish details of vulnerabilities online, or sell them to a government or to law-enforcement

White hat hackers — who use similar tools to find holes in security systems, but are paid to do so by organisations which want to discover possible vulnerabilities. They are also known as ethical hackers

Dr Thomas says most ethical hackers work for consulting firms, who are then "engaged by basically every other organisation" to attack their systems.

Ms Cruz — who studied software engineering but found she preferred "Breaking things" — says white hat hackers "Come in all shapes and sizes".

"I don't go to work wearing a hoodie every day, and I don't work in the dark," she says.

Ms Cruz and her colleague Mr Hopkins — who has an IT and management consulting background — work in the offensive security team at consulting firm PricewaterhouseCoopers (PwC).

"We're trying to use technology in a way that it wasn't intended," Mr Hopkins says.

"Something that people wouldn't necessarily think about or understand is that hacking can be done legally."

Ethical hacks are on the rise, amid more high-profile data breaches:

Dr Thomas says Australian companies are increasingly turning to white hat hackers in order to improve their cyber security systems.

It comes as more and more organisations are being hit by cyber attacks — the largest of which have led to the personal details of millions of customers being exposed.

Dr Thomas says organisations which may have normally paid for ethical hackers to test their systems once a year are now doing so more often, given "The evolving threat landscape".

"When you think about organisations getting hacked, often it's not just one attack — it's multiple attacks and one just happened to get lucky," he says. "That's why frequent testing is required."

PwC Australia's Cybersecurity and Digital Trust Leader, Robert Di Pietro, says the firm he works for is also seeing an increase in demand.

"And it's a really specialised skill set," he says. "This has to be done in a safe and controlled manner."

How do you carry out an 'ethical' hack?

Dr Thomas says white hat hackers use similar strategies to black hat hackers, including things such as phishing campaigns — which try to trick people into opening links in emails and sharing their credentials — or even following people into buildings, if necessary.

They also create their own hacking tools, and may even examine social media profiles in order to build up an image of an organisation, its structure and its possible vulnerabilities.

"Those same attack vectors are what ethical hackers are going to try, because that's what the bad guys are doing. So it makes sense to try and do the same things," Dr Thomas says.

Ethical hackers can work with clients from a variety of industries, and can be found trying to hack into everything from internal systems to websites, mobile applications, cloud services, critical infrastructure and even ATM machines.

Ms Cruz says she is currently working with a financial institution, "Testing a few of their internal and external-facing applications".

"You get to test things that people use every day," she says.

The public 'Would be surprised' at what ethical hackers find".

White hat hackers who spoke to the ABC said the public would be surprised by the vulnerabilities they find within popular websites and platforms.

"Sometimes all you are given is a website, and nothing else. And they just say, 'Here you go. We want you to test this,'" says Ms Cruz.

"Sometimes you do that and you go, 'Okay cool, I got access to your customers' data.'

"Or it could be, 'Hey, this single website gave me access to your entire corporate environment.'"

PwC's Mr Di Pietro says the company isn't surprised when it finds vulnerabilities in popular websites and platforms, because hackers are "always going to find something".

"There's no such thing as a perfectly secure system," he says. "But I do think the public would probably be surprised at the amount of stuff that we find."

What's stopping ethical hackers from going rogue?

Dr Thomas says ethical hackers abide by a standard of ethics and morals, but are also vetted before being hired.

Background checks are carried out and documents such as non-disclosure and confidentiality agreements may be signed.

"In addition to that there are things like the Rules of Engagement," he says.

"It's a document that expressly outlines what the limits are for the hacker. What that helps to do is provide strict boundaries about what the ethical hacker is allowed to do, and what systems they're allowed to target."

Ethical hacker Mr Hopkins says white hat hacking can be "very dangerous if it's done in the wrong way", because additional problems can be created if things aren't done correctly.

"The access that we have and the things that we find could obviously be very beneficial to black hat hackers should they get their hands on it, either through targeting us or through us not operating as safely as we could," he says.

Original Story By | Tom Williams


Same | News Story' Author : Staff-Editor-02

Users | Click above to view Staff-Editor-02's 'Member Profile'

Share This Information :

Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TechnoratiSubmit to TwitterSubmit to LinkedIn

Add A Comment :


Security code

Please enter security code from above or Click 'Refresh' for another code.

Refresh


All Comments are checked by Admin before publication

Guest Menu

All Content & Images Copyright Portmac.news & Xitranet© 2013-2024 | Site Code : 03601