UK Could be Going TOO Far With Digital Laws

Outsmart Malicious Hackers


Types of activities that will become illegal under the proposed laws include making or supplying “hacking tools”- computer programmes or code that can help crack passwords or bypass security systems – and will be punishable by up to two years in prison.

Isn’t this legitimate action for any security enthusiast, hobbiest or professional involved in penetration testing or vulnerability assessment?

The law will also be clarified to make it illegal to hamper the operation of a computer, closing a loophole that has made it difficult to prosecute hackers for so-called “denial of service” attacks in which hackers bombard a computer system with hundreds of thousands of requests for information over the internet, so the servers are overloaded and cannot function.

I mean laws are all well and good, but the politicians have to wary and make sure they aren’t hurting people in the wrong places.

A major problem with the UK law at present (which called for this revamp) is under UK law DoS attacks (Denial of Service) are not illegal.

It can cost online companies millions of pounds in lost business when their websites are unavailable, but laws are not clear on whether simply stopping a computer from working is illegal.

Jeremy Beale, head of e-business at the CBI employers’ group, said: “There have been very few prosecutions under the Computer Misuse Act to date, but the new laws could give security a wider currency with businesses.”

I agree we need to protect legitimate business, but please, be reasonable with the laws and don’t punish us who are trying to educate and secure the world.

Source: Financial Times

Posted in: Hacking News

, ,


Latest Posts:


snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.
QualysGuard - Vulnerability Management Tool QualysGuard – Vulnerability Management Tool
QualysGuard is a web-based vulnerability management tool provided by Qualys, Inc, which was the first company to deliver vulnerability management services as a SaaS-based web-service.


Comments are closed.