Chuck Leaver – Did You Know That The Human Hack Is The Oldest Trick In The Book?

Written By Patrick Kilgore And Presented By Charles Leaver CEO Ziften



When you are at the Black Hat annual conference there are conversations going on all over about hacking and cyber security and it can make you paranoid. For a lot of people this is just an appetiser for the DEF CON hacking show.

A long time ago a story was released by the Daily Dot which was named “The art of hacking humans” which talked about the Social Engineering “Capture the Flag” contest that has been running from 2010. In it, participants utilize the best tool a hacker has at their disposal – their wits – and take advantage of tall tales and social subterfuge to persuade unsuspecting victims to provide delicate information in exchange for points. A few mistakes here, a comment about applications there, and a bang! You’re hacked and on the front page of the New York Times.

For the businesses being “Targeted” (such as huge box retailers who will remain nameless …), the contest was originally deemed an annoyance. In the years since its beginning nevertheless, the Capture the Flag contest has gotten the thumbs up from lots of a business security specialists. Its participants engage annually to evaluate their nerve and help possible hacking victims comprehend their vulnerabilities. It’s a white hat education in what not to do and has made strides for business awareness.

Human Hacking Begins With … Humans (duh).

As we know, most malicious attacks start at the endpoint, because that is where the humans in your company live. All it takes is access from an ambiguous place to do severe damage. But rather than consider hacks as something to react to or a mere procedure to be killed, we have to remind ourselves that behind every attack there is an individual. And eventually, that’s who we have to equip ourselves against. But how?

Considering that companies exist in the real world, we must all accept that there are those who would do us damage. Rather than aiming to prevent hacks from taking place, we have to re-wire our brains on the matter. The secret is recognizing harmful user habits as it is occurring so that you can respond appropriately. The new period of endpoint security is concentrated on this ability to visualize user behavior, examine and examine it rapidly, and then react rapidly. At Black Hat we are revealing folks how they can continually monitor the fringes of their network so that when (not if) breaches take place, they can be promptly tackled.

As a wise man once stated, “You cannot protect what you cannot manage and you cannot manage what you cannot see.” The outcome significantly decreases time to detect and time to respond (TTR). And that’s no lie.


No Responses Yet to “Chuck Leaver – Did You Know That The Human Hack Is The Oldest Trick In The Book?”

Leave a Reply