SlideShare a Scribd company logo
1 of 7
Download to read offline
Extent of Online Hacker Tutorial Revealed




CPP’s investigation found people can learn how to hack into
someone’s account in less than 15 minutes. Find out more..
Extent of Online Hacker Tutorial Revealed


CPPGroup Plc recently carried out a controlled
‘classroom’ experiment in which five volunteers,
with limited technological knowledge, followed a
14-minute classroom-style tutorial which is freely
available online.

The technique taught in the live session, known as
‘man in the middle’ technique, was used to hack
into a computer network and each obtain other’s
login details*.

Following the tutorial CPP’s volunteers - including
a TV producer, a self-employed baker and a retiree
– were able to download hacking software which
allowed them to access login details and
passwords for e-mail accounts, social networking
sites and online shopping accounts within a matter
of minutes.
*Please note our panel signed a disclaimer saying they would not use the information
for illegal or malicious attacks
Extent of Online Hacker Tutorial Revealed


Our supporting research* revealed:
• Over seven million people have had their online password-protected
information accessed without their permission
• Of these nearly a quarter (24%) claim to have had their personal e-mails
accessed
• 65 per cent of people are concerned about their password protected
information being accessed
• Online hacking tutorials are widely known about, with almost a fifth (17%) of
people aware of their existence
• 63% of people think ‘hacking’ tutorials should be removed from the internet


* ICM interviewed a random sample of 2005 adults aged 18+ online between 19 – 20 April
2011. Surveys were conducted across the country and the results have been weighted to the
profile of all adults. ICM is a member of the British Polling Council and abides by its rules.
Extent of Online Hacker Tutorial Revealed


CPP’s top tips on protecting your information from hackers:
1. Change your passwords regularly - the longer and more obscure, the
   better
2. Leave a website if you notice strange behaviour (unknown
   certificates, pop-ups etc.)
3. Avoid transmitting sensitive data over public (free or otherwise) Wi-Fi
4. When seeking Wi-Fi connections: know who you are connecting to,
   be wary of free Wi-Fi access
5. If using a smartphone: disable Wi-Fi ‘auto-connect’
6. If you are concerned about identity fraud, consider purchasing an
   identity fraud protection product to help you detect, prevent and
   resolve any incidence of the fraud
Extent of Online Hacker Tutorial Revealed




The Golden Rule is that unless you know your connection is secure, do
not communicate any information or data that you wouldn’t feel
comfortable shouting across a crowded room.
Extent of Online Hacker Tutorial Revealed


Robert Chapman, CEO of Firebrandtraining.co.uk, who CPP
commissioned to carry out the tutorial said:

“The wide availability of free hacking tools is a real concern, and
everyone is a target. These resources are only going to grow and
become more advanced, meaning that organisations and individuals
must take steps to protect themselves.

It’s imperative to keep anti-virus and firewall software up to date and
change passwords to online accounts regularly. Also use common sense
– if security warning messages appear in your browser, don’t ignore
them as this could be an indicator that your network has been hacked.

We demonstrated how a very basic way of hacking could be used to
steal millions of pounds from the unprepared.”
Extent of Online Hacker Tutorial Revealed




Visit our website for more information on
             identity fraud,
               or our blog
             blog.cpp.co.uk

More Related Content

More from CPPGroup Plc

Facebook white paper2011
Facebook white paper2011Facebook white paper2011
Facebook white paper2011CPPGroup Plc
 
Anti social neighbours survey
Anti social neighbours surveyAnti social neighbours survey
Anti social neighbours surveyCPPGroup Plc
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011CPPGroup Plc
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPPGroup Plc
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010CPPGroup Plc
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010CPPGroup Plc
 
UK online fraud 2010
UK online fraud 2010UK online fraud 2010
UK online fraud 2010CPPGroup Plc
 
Corporate id fraud 2010
Corporate id fraud 2010Corporate id fraud 2010
Corporate id fraud 2010CPPGroup Plc
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010CPPGroup Plc
 
Lost stolen cards 2009
Lost  stolen cards 2009Lost  stolen cards 2009
Lost stolen cards 2009CPPGroup Plc
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009CPPGroup Plc
 

More from CPPGroup Plc (12)

Facebook white paper2011
Facebook white paper2011Facebook white paper2011
Facebook white paper2011
 
Anti social neighbours survey
Anti social neighbours surveyAnti social neighbours survey
Anti social neighbours survey
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010
 
UK online fraud 2010
UK online fraud 2010UK online fraud 2010
UK online fraud 2010
 
Corporate id fraud 2010
Corporate id fraud 2010Corporate id fraud 2010
Corporate id fraud 2010
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010
 
Lost stolen cards 2009
Lost  stolen cards 2009Lost  stolen cards 2009
Lost stolen cards 2009
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Extent of online hacker tutorials revealed

  • 1. Extent of Online Hacker Tutorial Revealed CPP’s investigation found people can learn how to hack into someone’s account in less than 15 minutes. Find out more..
  • 2. Extent of Online Hacker Tutorial Revealed CPPGroup Plc recently carried out a controlled ‘classroom’ experiment in which five volunteers, with limited technological knowledge, followed a 14-minute classroom-style tutorial which is freely available online. The technique taught in the live session, known as ‘man in the middle’ technique, was used to hack into a computer network and each obtain other’s login details*. Following the tutorial CPP’s volunteers - including a TV producer, a self-employed baker and a retiree – were able to download hacking software which allowed them to access login details and passwords for e-mail accounts, social networking sites and online shopping accounts within a matter of minutes. *Please note our panel signed a disclaimer saying they would not use the information for illegal or malicious attacks
  • 3. Extent of Online Hacker Tutorial Revealed Our supporting research* revealed: • Over seven million people have had their online password-protected information accessed without their permission • Of these nearly a quarter (24%) claim to have had their personal e-mails accessed • 65 per cent of people are concerned about their password protected information being accessed • Online hacking tutorials are widely known about, with almost a fifth (17%) of people aware of their existence • 63% of people think ‘hacking’ tutorials should be removed from the internet * ICM interviewed a random sample of 2005 adults aged 18+ online between 19 – 20 April 2011. Surveys were conducted across the country and the results have been weighted to the profile of all adults. ICM is a member of the British Polling Council and abides by its rules.
  • 4. Extent of Online Hacker Tutorial Revealed CPP’s top tips on protecting your information from hackers: 1. Change your passwords regularly - the longer and more obscure, the better 2. Leave a website if you notice strange behaviour (unknown certificates, pop-ups etc.) 3. Avoid transmitting sensitive data over public (free or otherwise) Wi-Fi 4. When seeking Wi-Fi connections: know who you are connecting to, be wary of free Wi-Fi access 5. If using a smartphone: disable Wi-Fi ‘auto-connect’ 6. If you are concerned about identity fraud, consider purchasing an identity fraud protection product to help you detect, prevent and resolve any incidence of the fraud
  • 5. Extent of Online Hacker Tutorial Revealed The Golden Rule is that unless you know your connection is secure, do not communicate any information or data that you wouldn’t feel comfortable shouting across a crowded room.
  • 6. Extent of Online Hacker Tutorial Revealed Robert Chapman, CEO of Firebrandtraining.co.uk, who CPP commissioned to carry out the tutorial said: “The wide availability of free hacking tools is a real concern, and everyone is a target. These resources are only going to grow and become more advanced, meaning that organisations and individuals must take steps to protect themselves. It’s imperative to keep anti-virus and firewall software up to date and change passwords to online accounts regularly. Also use common sense – if security warning messages appear in your browser, don’t ignore them as this could be an indicator that your network has been hacked. We demonstrated how a very basic way of hacking could be used to steal millions of pounds from the unprepared.”
  • 7. Extent of Online Hacker Tutorial Revealed Visit our website for more information on identity fraud, or our blog blog.cpp.co.uk