• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

#SecTorCa: Jeff Moss Defines the Role of Hacking

You are here: Home / General Cyber Security News / #SecTorCa: Jeff Moss Defines the Role of Hacking
November 3, 2021

Jeff Moss, also identified as The Dark Tangent, is a nicely-acknowledged determine in the security local community, as the founder of Defcon and Black Hat security conferences. Moss is also a hacker, a moniker that all people does not have an understanding of properly.

In a keynote session at the SecTor security conference on November 3, Moss in depth the evolution of the hacking motion from the 1970s through to the present day era. He started his discuss by declaring that individuals panic what they do not understand and historically folks do not have an understanding of hacking.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“They really do not comprehend complex laptop or computer techniques and facts security and for the reason that of that, it is type of a voodoo, and if they simply cannot easily have an understanding of, it is like magic,” Moss reported: “So a whole lot of the challenges we’ve experienced is communicating with men and women what it is we do and how we do it.”

Defining Hacking

Element of the dread of the expression ‘hacker’ is also because the term is not perfectly described possibly.

Moss described hacking as a mixture of curiosity and capabilities. It is about possessing an innate curiosity, trying to get information and acquiring pleasure out of novel benefits. He added that individuals could use hacking techniques for both excellent and evil.

There is also a variance in between data security, usually referred to as infosec and hacking. In Moss’ view, 1 of the large challenges is that people take care of all infosec as hacking and all hacking as infosec.

“Hacking can deliver a ton of joy and unquestionably no earnings,” Moss mentioned: “With InfoSec, the goal is to create income. It’s a work you have to do the thing, address the difficulty, create the report.”

There are many groups at play in the security globe in the present day era, every with different IT security objectives. The initially team shown by Moss are country-states that typically are on the lookout to come across secrets and techniques and are included in espionage-style things to do. Nation-condition menace actors generally are not hunting for revenue.

On the other hand, structured cybercriminals are enthusiastic by cash and are an additional lively risk actor in the contemporary internet. Last but not least, hacktivists represent yet another team that is occasionally recognized as hackers. Moss spelled out that hacktivism is about protesters that want some form of transform and use hacking expertise to check out and progress their plans.

The other key team is 1 that Moss referred to simply as hackers and scientists. This group is largely concerned about the pursuit of understanding, and it’s the group wherever Moss destinations himself.

“This is my sweet place,” Moss stated: ”I believe that hackers and scientists really direct the way in a number of parts as we find out new courses of vulnerabilities, we expose weak solution security, and we spur public debate.”

The Good Part of Hackers in Modern society

The innate curiosity and techniques that hackers bring to the table fill a critical purpose in society.

As an case in point, Moss famous that if there is a new superior-security lock out there, the producer will not inform you how to bypass it, and neither is the govt. If criminals figure out how to bypass the lock, they are unlikely to say to the community how to do it either. Moss mentioned that scientists and hackers are performing as the type of public disclosure of the hazards of technology.

“The better you understand the challenges, the better educated your decisions will be,” Moss said. “If you’re receiving that risk info from hackers and scientists and not from the companies, it tells you that there is a definitely crucial civil society role for us for hackers to talk reality to power into reveal what’s genuinely likely on.”


Some sections of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «top 3 apis vulnerabilities: why apps are owned by cyberattackers Predicting the Next OWASP API Security Top 10
Next Post: ‘Tortilla’ Wraps Exchange Servers in ProxyShell Attacks ‘tortilla’ wraps exchange servers in proxyshell attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.