everyone: older news
by Brent Kirkpatrick
(Date Published: 3/12/2018.)
For hackers, it is like a video game. They search the Internet for computers they can compromise. Hoarding the computers they hacked like resources in a role-playing game, hackers want to remain undetected. The longer they are undetected, the more computers they can hoard and the more money they can make stealing information.
Once hackers are detected, it becomes a race between the IT people and the hackers. The IT people want to contain the hacking and clean-up the network. The hackers want to hide some back-door that remains undetected, and they want to inflict maximum damage. Maximum damage means they may destroy computers and fry data.
Aside from a maximum damage goal, hackers are very quiet. As a matter of strategy, they want to remain undetected. They want to retain access, and detection means their access will be cut. So, hackers do everything they can to evade detection.
defendIT (TM). AI-driven security measures derived from security incident data.