Call us:    +44 (0) 207 0439 349        Company      Contact us

The Rise of Hacker-For-Hire Websites

Posted by on Jan 31, 2015 in Security MonitoringNo comments

The most hip and happening spot for shady characters online has got to be the new hacker for hire websites that have mushroomed all over the internet. Finally, hacking is no longer something which is reserved just for hacktivists, governments or intelligence agencies. Now even you can hire a freelance hacker to get into your company’s servers or you ex’s email account with a degree of deniability. But how do such websites work and what can they possibly be good for. You will find out all you need to know in the lines which follow.

It is interesting to note that at a time when big name companies such as Sony Pictures and Home Depot are not safe from cyber criminals, there is a growing cottage industry of white hat hackers online. According to the New York Times, at any given time, there can be as many as 500 cyber espionage jobs up for grabs on such hacker for hire websites like Hacker’s List. Which range anywhere from checking your website’s security to scrubbing any indecent photos from your Facebook page. And guess what? It’s all perfectly legal, unless you want to gain access to a governmental institution, in which case you will most definitely be breaking the law somehow.

If you’re contemplating visiting Hacker’s List you might want to read the 10-page terms and conditions section out loud though.

 

Tags:

Registered Memberships and Partners:

OWASP - Open Web Applications Security Project
ISSA UK - Information Systems Security Association UK
NIST - Computer Security Division of NIST
UKITA - UK Information Technology Association
ISF - Information Security Forum
ISACA - Information Security Audit & Control Association

  • Latest Tweets

    • Britain's security has been threatened by 188 high-level cyber attacks in the last three months, according to a government security chief.

    • Libraries across the city of St Louis are gradually regaining control of their computer systems, following a malware attack on 17 Libraries.

This website uses cookies to improve user experience. By using our website you consent to all cookies issued by this website.
I agree Disagree