Skip to main content

Debunking the Hollywood hacker myth: Inside a real cyber-security command centre

Debunking the Hollywood hacker myth: Inside a real cyber-security command centre

Eset Cyber Security Centre - Debunking Hollywood Hackers
The command centre - dubbed Heuston - at cyber-security firm Eset's headquarters overlooking the River Danube and Bratislava in Slovakia.(IBTimes UK)
The depiction of hackers and cyber-attack in Hollywood films is typically so far removed from what really happens as to border on the farcical.
Everything from Jurassic Park to Swordfish, Die Hard 4.0, and the eponymous Hackers, allsuggest that cyber-attacks take place in real time, can be tracked, visualised and more importantly stopped as fast as they've happened.
Even the most gullible film fan surely knows that this is not what happens in real life, but the question is, what does really happen in real life.
To find out I visited the command centre of Eset, one of the world's largest cyber-security companies, located on the River Danube overlooking the old town of Bratislava in Slovakia.
"Houston, we have a problem"
Watch any Hollywood film from the last couple of decades that has some cyber-attack element, and at some point we are likely to find ourselves in a big room with lots of computer screens showing lines and lines of code (written in green on a black backgroundobviously), with everyone sitting under a couple of big TVs showing maps of the world.
As the cyber-attack begins, these screens would jump into life showing a computer virus as it spreads around the world in real-time - the imminent threat clear for all to see.
Eset Cyber Security Centre - Debunking Hollywood Hackers
Eset headquarters in Bratislava, Slovakia(IBTimes UK)
Stepping into Heuston, the name given to Eset's command centre (in an apparent play on Nasa's Houston and heuristic computing), the set-up is almost identical. There are banks of computers and three large TV screens showing world maps and blinking lights.
That, however, is where the comparisons end.
The room is deathly quiet, with the few researchers barley lifting their heads from their screens during my time visiting. No one is looking at the big TV screens.
Why are they there I ask? There is no clear answer. It seems the big screens are there for show more than anything else, as Eset says the researchers could get much more detailed information on specific attacks on their own PCs.
The room is not dark and moody. It is bright and airy, with a stunning view over the old town of Bratislava and the powerful Danube River. It also overlooks the Bridge of the Slovak National Uprising, better known to locals as the UFO bridge.
From the beginning
Cyber-attacks are not monitored in real time. There is no one shouting at his or her colleagues to try and stop an attack. This is just not how it works.
Cyber-attacks, from DDoS attacks to sophisticated, targeted campaigns by nation states, are typically complex and involved operations. Monitoring them in real-time is just not possible.
What Eset can do, and has been doing since the founders created the company in 1987, is track and analyse these attacks, protecting their customers against future attacks and trying to play catch up with the criminals who are typically one step ahead of the competition.
Humans are weakest cyber-security link
(IBTimes UK)
As Eset's chief technology officer Palo Luka said, the attacks we are seeing today are just the same as those that have been around for hundreds of years:
"400 hundreds years ago there were groups of people who were playing tricks, cons artists, and they were trying to scam other people somehow, and they managed to do it. If you fast-forward to today, this is exactly what is happening. There is a group of smart people who are willing and able to scam other people. What changed is the technology, and this technological change has made it easier for the bad guys," said Luka.
"Humans are the weakest link"
Eset has been around from the beginning of the emergence of computer viruses in the late 1980s, when programs like Brain attacked MS-DOS, and in the last 25 years has seen the industry change irrevocably - yet the weakest link Luka says remains the same:
"Humans are the biggest threat to security. Technology has changed and is getting better [at making things safer], but ultimately it's humans who get tricked and this will continue to be the problem."
2014 represented a new high watermark in terms of sophistication and volume of cyberattacks, with Eset helping to identify some high profile attacks including theBlackEnergy targeted attack, and Android ransomware Simplocker, which reflects the new front for cybercriminals on mobile devices.
While the Hollywood image of a cyber-security bunker may not be as exciting or cutting edge as we would like to think, the Eset headquarters overlooking Bratislava does contain one mysterious aspect - the 20th floor.
Officially, Eset occupies floors 16, 17, 18 and 19 of the Aupark Tower but we were told it also occupies a 20th floor that appears to be so secret it's not even listed on the building's lifts.
Whether this was a joke to fool a group of gullible journalists, or a real top secret layer, is unclear, but at least it provides some link to the clandestine representations of hackers andcyber-attacks which proliferate the silver screen.
Eset Cyber Security Centre - Debunking Hollywood Hackers
The view from Eset's global headquarters in Bratislava, overlooking the Danube(IBTimes UK)


Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

Explainer: The nico-teen brain

Explainer: The nico-teen brain The adolescent brain is especially vulnerable to the addictive effects of nicotine BY  TERESA SHIPLEY FELDHAUSEN 7:00AM, AUGUST 19, 2015 Nicotine (black triangle towards center left) tricks the nerve cell (neuron) into sending a message to release more dopamine (yellow dots). Those molecules enter the space (synapse) between one nerve cell and the next. When they get picked up by neighboring cells, this gives users a feel-good high. It also creates the risk of addiction and other health problems.  EMail Print Twitter Facebook Reddit Google+ NATIONAL INSTITUTE ON DRUG ABUSE, ADAPTED BY J. HIRSHFELD Nicotine is the addictive chemical in tobacco smoke and e-cigarette vapors. And doctors say the teenage brain is no place for it to end up. Nicotine can reach the brain within seven seconds of puffing on a cigar, hookah, cigarette or electronic cigarette.
The area of the brain responsible for emotions and controlling our wild impulses is known as the prefrontal c…

fix idm integration on chrome

Chrome Browser IntegrationI do not see IDM extension in Chrome extensions list. How can I install it? 
How to configure IDM extension for Chrome?Please note that all IDM extensions that can be found in Google Store are fake and should not be used. You need to install IDM extension manually from IDM installation folder. Read in step 2 how to do it.

1. Please update IDM to the latest version by using "IDM Help->Check for updates..." menu item

2. I don't see "IDM Integration module" extension in the list of extensions in Chrome. How can I install it?

Press on Chrome menu (arrow 1 on the image), select "Settings" menu item (arrow 2 on the image) and then select "Extensions" tab (arrow 3 on the image). After this open IDM installation folder ("C:\Program Files (x86)\Internet Download Manager" by default, arrow 4 on the image) and drag and drop "IDMGCExt.crx" (arrow 5 on the image) file into "Extensions" page opened in…