The IT Pro Podcast: Why is it so hard to convict hackers?

Catching cyber criminals is hard enough - but putting them behind bars is even more challenging

The IT Pro Podcast: Why is it so hard to convict hackers?

Hacking, ransomware attacks and other forms of cybercrime have become a fact of life in the modern age, but while the rates of these attacks have drastically increased, the ability of law enforcement to bring the perpetrators to justice seems to be lagging behind somewhat. Even when suspects are caught, it's rare for cases to result in convictions.

There are a number of factors that contribute to this, including the sophistication of modern anonymisation tools, police resource constraints and jurisdictional difficulties. In this week's episode, we're joined by Jake Moore, ESET cyber security specialist and former digital forensic investigator, to discuss why this is such a problem, and how police can work with the security industry to help solve it. 

Footnotes

Subscribe

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Best paying tech jobs of 2021
Careers & training

Best paying tech jobs of 2021

7 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Mythic launches power-sipping AI chip
Hardware

Mythic launches power-sipping AI chip

8 Jun 2021