Skip to main content

Debunking the Hollywood hacker myth: Inside a real cyber-security command centre

Debunking the Hollywood hacker myth: Inside a real cyber-security command centre

Eset Cyber Security Centre - Debunking Hollywood Hackers
The command centre - dubbed Heuston - at cyber-security firm Eset's headquarters overlooking the River Danube and Bratislava in Slovakia.(IBTimes UK)
The depiction of hackers and cyber-attack in Hollywood films is typically so far removed from what really happens as to border on the farcical.
Everything from Jurassic Park to Swordfish, Die Hard 4.0, and the eponymous Hackers, allsuggest that cyber-attacks take place in real time, can be tracked, visualised and more importantly stopped as fast as they've happened.
Even the most gullible film fan surely knows that this is not what happens in real life, but the question is, what does really happen in real life.
To find out I visited the command centre of Eset, one of the world's largest cyber-security companies, located on the River Danube overlooking the old town of Bratislava in Slovakia.
"Houston, we have a problem"
Watch any Hollywood film from the last couple of decades that has some cyber-attack element, and at some point we are likely to find ourselves in a big room with lots of computer screens showing lines and lines of code (written in green on a black backgroundobviously), with everyone sitting under a couple of big TVs showing maps of the world.
As the cyber-attack begins, these screens would jump into life showing a computer virus as it spreads around the world in real-time - the imminent threat clear for all to see.
Eset Cyber Security Centre - Debunking Hollywood Hackers
Eset headquarters in Bratislava, Slovakia(IBTimes UK)
Stepping into Heuston, the name given to Eset's command centre (in an apparent play on Nasa's Houston and heuristic computing), the set-up is almost identical. There are banks of computers and three large TV screens showing world maps and blinking lights.
That, however, is where the comparisons end.
The room is deathly quiet, with the few researchers barley lifting their heads from their screens during my time visiting. No one is looking at the big TV screens.
Why are they there I ask? There is no clear answer. It seems the big screens are there for show more than anything else, as Eset says the researchers could get much more detailed information on specific attacks on their own PCs.
The room is not dark and moody. It is bright and airy, with a stunning view over the old town of Bratislava and the powerful Danube River. It also overlooks the Bridge of the Slovak National Uprising, better known to locals as the UFO bridge.
From the beginning
Cyber-attacks are not monitored in real time. There is no one shouting at his or her colleagues to try and stop an attack. This is just not how it works.
Cyber-attacks, from DDoS attacks to sophisticated, targeted campaigns by nation states, are typically complex and involved operations. Monitoring them in real-time is just not possible.
What Eset can do, and has been doing since the founders created the company in 1987, is track and analyse these attacks, protecting their customers against future attacks and trying to play catch up with the criminals who are typically one step ahead of the competition.
Humans are weakest cyber-security link
(IBTimes UK)
As Eset's chief technology officer Palo Luka said, the attacks we are seeing today are just the same as those that have been around for hundreds of years:
"400 hundreds years ago there were groups of people who were playing tricks, cons artists, and they were trying to scam other people somehow, and they managed to do it. If you fast-forward to today, this is exactly what is happening. There is a group of smart people who are willing and able to scam other people. What changed is the technology, and this technological change has made it easier for the bad guys," said Luka.
"Humans are the weakest link"
Eset has been around from the beginning of the emergence of computer viruses in the late 1980s, when programs like Brain attacked MS-DOS, and in the last 25 years has seen the industry change irrevocably - yet the weakest link Luka says remains the same:
"Humans are the biggest threat to security. Technology has changed and is getting better [at making things safer], but ultimately it's humans who get tricked and this will continue to be the problem."
2014 represented a new high watermark in terms of sophistication and volume of cyberattacks, with Eset helping to identify some high profile attacks including theBlackEnergy targeted attack, and Android ransomware Simplocker, which reflects the new front for cybercriminals on mobile devices.
While the Hollywood image of a cyber-security bunker may not be as exciting or cutting edge as we would like to think, the Eset headquarters overlooking Bratislava does contain one mysterious aspect - the 20th floor.
Officially, Eset occupies floors 16, 17, 18 and 19 of the Aupark Tower but we were told it also occupies a 20th floor that appears to be so secret it's not even listed on the building's lifts.
Whether this was a joke to fool a group of gullible journalists, or a real top secret layer, is unclear, but at least it provides some link to the clandestine representations of hackers andcyber-attacks which proliferate the silver screen.
Eset Cyber Security Centre - Debunking Hollywood Hackers
The view from Eset's global headquarters in Bratislava, overlooking the Danube(IBTimes UK)


Popular posts from this blog

sxhkd volume andbrightness config for dwm on void

xbps-install  sxhkd ------------ mkdir .config/sxhkd cd .config/sxhkd nano/vim sxhkdrc -------------------------------- XF86AudioRaiseVolume         amixer -c 1 -- sset Master 2db+ XF86AudioLowerVolume         amixer -c 1 -- sset Master 2db- XF86AudioMute         amixer -c 1 -- sset Master toggle alt + shift + Escape         pkill -USR1 -x sxhkd XF86MonBrightnessUp          xbacklight -inc 20 XF86MonBrightnessDown          xbacklight -dec 20 ------------------------------------------------------------- amixer -c card_no -- sset Interface volume run alsamixer to find card no and interface names xbps-install -S git git clone xbps-install -S base-devel libX11-devel libXft-devel libXinerama-devel  vim # FREETYPEINC = ${X11INC}/freetype2 #comment for non-bsd make clean install   cp config.def.h config.h vim config.h xbps-install -S font-symbola #for emoji on statusbar support     void audio config xbps-i

Hidden Wiki

Welcome to The Hidden Wiki New hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!! Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it. The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with. Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction Points - Clearnet search engine for Tor Hidden Services (allows you

download office 2021 and activate

get office from here open powershell as admin (win+x and a ) type cmd  goto insall dir 1.         cd /d %ProgramFiles(x86)%\Microsoft Office\Office16 2.           cd /d %ProgramFiles%\Microsoft Office\Office16 try 1 or 2 depending on installation  install volume license  for /f %x in ('dir /b ..\root\Licenses16\ProPlus2021VL_KMS*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%x" activate using kms cscript ospp.vbs /setprt:1688 cscript ospp.vbs /unpkey:6F7TH >nul cscript ospp.vbs /inpkey:FXYTK-NJJ8C-GB6DW-3DYQT-6F7TH cscript ospp.vbs / cscript ospp.vbs /act Automatic script (windefender may block it) ------------------------------------------------------------------------------------------------------------------- @echo off title Activate Microsoft Office 2021 (ALL versions) for FREE - =====================================================================================&