To Identify a Hacker, Treat Them Like a Burglar

More from: | Wired |
0

Imagine someone robs your house. The savvy culprit didn’t leave behind fingerprints, shoe prints, or any other discrete, identifying details. Still, police manage to link the crime to a series of burglaries that happened the next town over, because of the criminal’s behavior. Each robbery occurred in the same way, and in each case, the perpetrator stole many of the same items. Now, new research indicates that the techniques law enforcement use to tie crimes together through behavioral patterns might help in the digital world too.

That’s a big deal: One of the most difficult tasks for cybersecurity researchers is determining who was behind a breach or coordinated attack. Hackers deploy a trove of tools to cover up their

(...)

Read full article » https://www.wired.com/story/case-linkage-hacker-attribution-cybersecurity


About | Wired |

WIRED IS WHERE tomorrow is realized. It is the essential source of information and ideas that make sense of a world in constant transformation. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. WIRED reaches more than 30 million people each month through WIRED.com, our digital edition, the magazine, social media, and live events.

»Twitter: @wired »Facebook: @wired »YouTube: WIRED