Teen hacking seen as casual activity

Anthem to 'pwned' youth.

Casual hacking is almost as established a part of teen life as downloading music to an iPod, a new survey of the age group has claimed.

According to Panda Security, we should take seriously the statistic it gathered from a survey of over 4,000 15 to 18 year-olds that nearly one in five of them have the knowledge to use 'advanced' Internet-distributed hacking tools. Of that group, nearly a third claimed to have used them on at least one occasion.

Two thirds of the group said they had actually succeeded in hacking instant messaging or social network accounts of people known to them, with 20 percent admitting to having published embarrassing photographs or videos of acquaintances on the Internet.

Apart from mischief-making and competition with their peer group, the main motivation for trying out hacking appears to be curiosity, with 86 percent citing that as the point from which their involvement started.

"We should encourage young people to use the Internet as a channel for personal development, teaching them to use it in a healthy and responsible fashion," said technical director of PandaLabs (the research wing of Panda Security), Luis Corrons. "It is important to help them avoid participating in dubious activities which are made all the easier thanks to the anonymity afforded by the web."

Despite the decent sample size, the survey does not show that teens are any more likely to engage in the more serious or illegal side of online activity than any other age group. It is also hard to assess the degree to which the individuals were being honest about their involvement in the more hardcore side of online hacking.

"Those who are drawn into hacking out of curiosity may very likely end-up discovering the financial potential of this activity, and become the next generation of cybercriminals," suggested Corrons.

What would be interesting would be to relate the statistics to location, something the company was not able to provide more details on at press time. It could be that a youngster in the Ukraine is more likely to see experimental hacking as the start of a career than his or her contemporary in the US, say.

The survey was carried out between January and April of this year online after prior email invitation.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags panda securityhacking

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?