Archive for April 2019

Greater Issues with Piracy and Hacking Problems

Almost every day, new stories or tweets reveal yet another cyber-attack on a famous brand, bank or government; these cyber-attacks are now commonplace. They are almost always characterized by sophisticated hacking schemes. However, the fact is that a cyber-attack does not necessarily involve hacking and a large number of hacks have nothing to do with attacks.

What is hacking?

The term “piracy” was intended primarily to describe ingeniously developed or “coded” software. Often, these types of software quickly and efficiently resolved a thorny and immediate problem. For example, in the early days of computing, memory was a valuable resource, so it was said that the developer of software that had skillfully made use of the memory that he had hacked sacred software, and he could be recognized as a talented pirate. In case of the software piracy this happens to be the problematic part now.

What is hacktivism?

Hacktivism is the use of a cyber-attack as a protest. Common cyber-attacks used by hacktivists are denial of service attacks or disruptions. These terms are very widely used to refer to attacks on government websites, law enforcement agencies, online gambling sites and even terrorist sites. Multinationals such as Google, Apple and Microsoft is often the target of disruptions: these types of attacks exploit the Domain Name System (DNS) or domain registration services. The term hacktivism comes from activism but many criticize this analogy because unlike activists, hacktivists can often launch their attacks relatively securely thanks to the anonymity of the Internet.

Are all cyber-attacks perpetrated by pirates?

No. Almost all news channels and social media present the attackers in a positive light and see them as talented individuals who develop very sophisticated software. These qualifications are generally wrong in many respects; Although they may be talented individuals crafting criminal or hacker software, many of the media used as pirated software are often not sophisticated but smart enough to exploit a loophole . Very often, the components of a pirate software “package” do not even constitute the pirate’s original work. In fact, it is becoming more common for attackers to simply buy packages of attacks on the black market or download them from public archives.

Do all cyber-attacks involve hacking?

No. Take the example of attacks on passwords. A hacker who uses social engineering to convince a help desk operator to disclose the username and password associated with an account does not use hacker software. Such attacks, including hijacking Twitter accounts and high-level DNS, do not involve hacking. In this case, piracy, namely the use of software specifically designed for this purpose, is a critical component of the attack.


Anitian describes the iso 27001 certification and some important considerations surrounding the ISO compliance process.