Categories: News

Expert: working as a “white hacker” can lead to criminal liability

MOSCOW, 18 Oct – PRIME. Any users who check computer systems in Russia for security, including white hat hackers, may be held criminally liable for their activities, Yevgeny Tsarev, an expert in the field of cybersecurity and law, who manages the RTM Group, told RIA Novosti.

Kaspersky told about new viruses under the guise of additions to WhatsApp

“Any use of programs that in one way or another affect the computer information protection system may result in criminal penalties. Persons with education and experience in the field of computer technology are at particular risk, since it is assumed that they are aware of the risks of using such software. In general, a criminal can become both an IT specialist who creates programs for checking Internet platforms and services for vulnerabilities, and any Internet user using network scanners or password guessing applications,” Tsarev said.

He noted that all pentesters (specialists in system security analysis) use programs to check for vulnerabilities, and half of them – without the use of a contract or remotely (from home, for example). “And this is several hundred people across the country. But the main risk group is more than 10 thousand students of the specialty of information security and IT, who use such tools thoughtlessly. Almost every one of them scans on their own initiative at least once a year,” the expert specified.

Thus, according to the expert, programs that, according to the criteria, fall under “neutralizing security tools” (scanners, applications for decryption and testing security tools) are in a gray zone of legal regulation. It is important to use only certified software.

“The independent use of scanners and other programs from the Internet can be regarded as a crime, so it is better to delegate such a task to professionals involved in information security. Companies licensed to carry out technical protection of confidential information have experience in this area and understand the risks of using certain programs,” Tsarev said.

According to him, a suitable option for identifying vulnerabilities is a pentest, which requires a competent drafting of a contract. In the documents, it is important to define in detail the subject and boundaries of such testing, to regulate the risks and responsibilities of the parties. This will allow legitimate security research and prevent future hacking threats.

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420