Government Technology

Hacker Habits: When to be On Guard

September 2, 2009 By

At the 17th annual DEFCON conference in Las Vegas, Nev., people from all over the world came together over one shared interest: hacking. The three-day conference is the largest IT security conference in the nation and this year over 10,000 people were in attendance. A small percentage of attendees were chosen at random to participate in a survey by Tufin Technologies about the habits of hackers. White hats, black hats, good guys, bad guys, bad guys working for good guys: you name it, they were there. The identities of the survey participants were kept completely anonymous to help preserve the validity of the responses. Here are some interesting finds from the survey:

During the Year

  • 81 percent of hackers surveyed said they are the most active during the winter holiday season
  • 56 percent said Christmas was the best time to engage in corporate hacking 
  • 25 percent said New Years Eve was the most ideal time for corporate hacking

During the Week

  • 52 percent stated that they spent the most time hacking during the weekday evenings
  • 32 percent stated that they spent the most time hacking during the work hours of a regular work week
  • Only 15 percent said they were hacking on the weekends


  • 86 percent of respondents felt they could successfully hack into a network via the firewall
  • 25 percent of these people said they could do this in a matter of minutes
  • 14 percent said they could do it in a few hours
  • 16 percent said they wouldn't hack into a firewall even if they could

Michael Hamelin, Tufin's chief security architect, said in an interview, "this may be obvious, but poorly configured firewalls remain a significant risk for many organizations. It's not the technology that's at fault, but rather the configuration and change control processes that are neglected or missing altogether."

Another alarming fact is that seventy percent of hackers interviewed don't feel that regulations made by governments worldwide to implement privacy, security and process controls have made any difference to their chances of hacking into a corporate network. Of the remaining thirty percent, only half said compliance initiatives have made their hacking more difficult and while the other half said they believe they've made it easier.

Hamelin said that these statistics further validate the frustrating gap between compliance and security. "It's like they can't see the forest for the trees," he said.

"Organizations become so wrapped up in meeting compliance regulations that security takes a back seat, instead of going hand in hand, as they should."

Another interesting find of the survey was that hackers usually release viruses on Fridays. They know that changes to applications and firewalls are generally made on Fridays and Saturdays which makes them more vulnerable to new virus attacks.

Finding patterns in the days and times hackers take advantage of will help organizations and agencies know when to be more vigilant.

| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers