vlog

Skip to content
NOWCAST vlog News on METV at 9pm Sundays
Watch on Demand
Advertisement

How long does it take to steal your data? Just 12 hours, hackers say

88 percent of cyber thieves can infiltrate a target in less than 12 hours

How long does it take to steal your data? Just 12 hours, hackers say

88 percent of cyber thieves can infiltrate a target in less than 12 hours

WEBVTT STEWART: MOST OF US DOEVERYTHING ONLINE.AND NOW, WITH NEW TECHNOLOGY, ITINCLUDES YOUR BABY'S MONITOR,YOUR ALARM SYSTEM, EVEN SECURITYCAMERAS.ANGELA: BUT ALL THAT PROTECTIONMAY NOT BE ENOUGH TO KEEP YOUFROM FALLING VICTIM TO A HACKEJUSTIN FARMER IS A CYBERSECURITY EXPERT, BETTER KNOWN ASAN ETHICAL HACKER.THEY ARE ALWAYS LOOKING FOR WAYSTO SAVE TIME LIKE PAYING BILLSONLINE.>> I PAY EVERY BILL ONLINE.ALL OF MY CREDIT CARD BILLS.IT'S ONLY SECURED BY A ROUTERWITH A PASSWORD-PROTECTED WI-FI.>> HE ALSO HAPPENS TO BE MY>> WE FOUND DOZENS OF HOMESWITHOUT A SECURE WI-FI.JUSTIN COULD'VE EXPOSE THEIRPRIVATE INFORMATION IN A MATTEROF MINUTES.>> WE HAVE ACCESS TO EVERYTHINGTHEY DO.COMPUTERS, IPHONES.>> WITH PERMISSION WE WANTED TOSEE IF HE COULD HACK INTO THEIRWI-FI WHICH ISPASSWORD-PROTECTED.>> I SEE THAT I'M ABLE TO LOGINWITHOUT ANY USER CREDENTIALSWHATSOEVER.>> IN LESS THAN AN HOUR, HE WASABLE TO GET INSIDE THEIR PRIVATELIVES FROM OUTSIDE THEIR HOME.>> I EFFECTIVELY CONTROL THEIRCOMPLETE SYSTEM AT THIS POINT.AT THIS POINT I'M A USER ONTHEIR NETWORK AND THEY DON'TEVEN KNOW I'M ON THEIR NETWORK.>> JUSTIN ACCESSED THEIR LOGINSFOR BANKING AND SOCIAL MEDIAACCOUNTS>> I SAW WHAT YOU SEARCHED FOR.I MIGHT HAVE SEEN YOUR EMAILADDRESS YOU PUT IN, POTENTIALLYA PASSWORD.IT SEEMS SIMPLE AND TO A HACKER,IT IS.>> A LOT OF TIMES THEY HAVE AWEB INTERFACE AS WELL SO YOU CANCONTROL WHAT THE BABY MONITORDOES.IF IT'S A PAN TILT ZOOM CAMERAYOU CAN MAKE IT MOVE, YOU CANSET OFF AN ALARM, YOU CAN DO ALLSORTS OF THINGS.REPORTER: WITH A LITTLE MORETIME, JUSTIN WAS ABLE TOEVENTUALLY ACCESS EVERYTHING ONTHEIR HOME COMPUTER WHICH HADFAMILY PHOTOS AND TAX DOCUMENTS.>> THAT'S SHOCKING.YOU KNOW TO BE SO VULNERABLE ANDNOT EVEN KNOW IT OR REALIZE IT.REPORTER: AMBER THOUGHT HERFAMILY WAS SECURE BY USING ASIMPLE PASSWORD.TURNS OUT, IT TAKES MUCH MORETHAN THAT TO KEEP YOUR PRIVATEINFORMATION PRIVATE.ANGELA: OK, SO WHAT CAN YOU DORIGHT NOW TO SECURE YOURPERSONAL INFORMATION?FIRST, CHECK YOUR WIFI'SSECURITY.IF IT'S A WEP, GET RID OF ITNOW.IT'S THE EASIEST TO HACK.JUSTIN SUGGESTS USING A WPA ORWPA 2, BETTER KNOWN AS WI-FIPROTECTED ACCESS.ALSO, CHANGE YOUR PASSWORD RIGHTNOW.USE NUMBERS, SPECIAL CHARACTERS
Advertisement
How long does it take to steal your data? Just 12 hours, hackers say

88 percent of cyber thieves can infiltrate a target in less than 12 hours

Eighty-eight percent of hackers believe they can infiltrate a targeted online network in less than 12 hours, a poll from Australian cybersecurity firm Nuix revealed Friday. Eighty-one percent of hackers claim they can identify and extract a victim's personal information during the same time frame. The Sydney-based company interviewed a number of "penetration testers" during two cybersecurity conferences (Black Hat USA and DEFCON 24) last year, questioning their "attack methodologies, favorite exploits, and what defensive countermeasures they found to be the most and least effective..." Penetration testers are also known as white-hat hackers, the "good guys" of the hacking world. They're often hired by businesses to identify potential security flaws in online networks. Sixty-nine percent of polled hackers say they were never detected by a company's security team, while 50 percent change their methods with each attack. One hundred percent of hackers and cyber security experts believe that once your data is compromised, there's little you can do to get it back. “The only difference between me and a terrorist is a piece of paper (a statement of work), making what I do legal. The attacks, the tools, the methodology; it’s all the same," one surveyed hacker told Nuix Chief Information Security Officer Chris Pogue. Why do hackers hack? Top reasons included monetary gain, entertainment, ego or intellectual challenge, status, an ethical cause, or security testing. Fifty-two percent of hackers say that educating oneself about online security is the best method of defense.

Eighty-eight percent of hackers believe they can infiltrate a targeted online network in less than 12 hours, from Australian cybersecurity revealed Friday. Eighty-one percent of hackers claim they can identify and extract a victim's personal information during the same time frame.

The Sydney-based company interviewed a number of "penetration testers" during two cybersecurity conferences (Black Hat USA and DEFCON 24) last year, questioning their "attack methodologies, favorite exploits, and what defensive countermeasures they found to be the most and least effective..."

Advertisement

Related Content

Penetration testers are also known as white-hat hackers, the "good guys" of the hacking world. They're often hired by businesses to identify potential security flaws in online networks.

Sixty-nine percent of polled hackers say they were never detected by a company's security team, while 50 percent change their methods with each attack. One hundred percent of hackers and cyber security experts believe that once your data is compromised, there's little you can do to get it back.

“The only difference between me and a terrorist is a piece of paper (a statement of work), making what I do legal. The attacks, the tools, the methodology; it’s all the same," one surveyed hacker told Nuix Chief Information Security Officer Chris Pogue.

Why do hackers hack? Top reasons included monetary gain, entertainment, ego or intellectual challenge, status, an ethical cause, or security testing.

Fifty-two percent of hackers say that educating oneself about online security is the best method of defense.