Ethical hacking-Penetration Testing: Necessary to protect your data
infosec

Ethical hacking-Penetration Testing: Necessary to protect your data

If you want to protect your personal or corporate data from hackers, it would be good to attend some lessons ...
Read More
inet infosec

Stand-alone vehicles: Is it really safe or not?

Most of us growing up, we have admired mainly in the movie these large stand-alone vehicles that were advanced and possessed ...
Read More
infosec

Are Ships Safe from Cyber ​​Attacks?

Nowadays, even ships are at risk of hacking. New systems they use to connect ...
Read More
infosec

Malicious insider attacks on financial services!

It is well known that the sector most affected by cyberattacks is the business sector and in particular financial services ....
Read More
infosec

FaceApp became viral again. Does it endanger our personal life?

FaceApp. The application is reverted to viral after two years of circulation. Its effects have improved and many influencers decided to bring back ...
Read More
Latest Posts

The victim will attack hackers with the help of the FBI. Revenge hurts ...

A new US bill makes it legal for private companies to hunt hackers.

In particular, a draft US bill allows the victims of one cyber attack to hunt the suspects legally.

The law, Known as Cyber Defense Certainty Act (ACDC) gives victims the freedom to identify hackers by invading the systems of organizations that suspect that malicious users they have used to attack.

Often, these organizations may be other companies that do not know that their computers have been tampered with. On the other hand, an existing US law prohibits this kind of pursuit, which is known as "hacking back".

Only a few government agencies such as the FBI, have the power to chase supposed hackers in this way.

hackers

Supporters of the Cyber ​​Security Bill, recently introduced to the US Congress, say that the FBI and other government agencies are already facing a lot of assumptions cyberattack, including the ransomware that has paralyzed computer systems in cities such as Atlanta and Baltimore and huge data thefts in large companies such as the hotel chain Marriott.

In theory, enabling businesses and individuals to get the law in their hands works in an auxiliary way in the efforts of organizations.

Fighting back

Ο Tom Graves and Josh Gottheimer, they claim that businesses and other private sector organizations need more freedom to defend themselves. They also pointed out that some businesses have already dealt with some forms of digital alert and that their bill will clean up the gray area around it.

The proposed legislation will amend a current US law, the Computer Fraud and Abuse Act (CFAA) law, allowing businesses and individuals to "respond" to hackers. They could also watch systems attackers and disrupt their operations.

The bill states that these capabilities should only be used by "Specialists" who are confident about the identity of the attackers. They need to update it FBI and seek guidance from it before the fight back and make every effort to avoid destroying third-party systems.

Of course, taking into account the foregoing, the ACDC has serious shortcomings as:

  1. Most companies are not qualified to "respond" to hackers.
  2. It's really hard to know with certainty who's behind a cyberattack
  3. The law does not provide any protection or guarantee if the situation becomes uncontrollable
  4. Possible hatreds and devastating avenging behaviors.
  5. Companies could be confronted with nation-states
Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *