SBN

Hacking communities in the Deep Web

Introduction

The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they are highly sought from private companies, intelligence agencies and by criminal gangs.

“An increasingly large number of modern business operations rely on an understanding of the risks associated with software that can easily be made vulnerable to hacking.” Reported in a post I published on the Fox News site on the role of hackers.

Ethical Hacking Training – Resources (InfoSec)

Hacking services are among the most attractive commodities in the underground market, it is possible to hire a hacker to request a “realistic” penetration test, or to pay to take over a Gmail or Facebook account for cyber espionage purpose.

How much does it cost to hire a hacker? How to do it and what is the price for their services?

Recently, journalists at Business Insider have published a post that described the prices for principal hacking services that it is possible to acquire online. According the Business Insider an individual that wants to hack someone’s Gmail account will have to pay about $90.

“Hacking a Gmail address can come in handy if you lose your account password, manage other people’s business accounts or simply want to improve your computer skills.” states the post. “‘If you want to crack Gmail passwords, you can hack Gmail with browser settings, phishing and keylogging software and special scripts”‘

Hackers, for example, could be hired to hack into a social media account, the cost to hack into someone’s Facebook account is $350, or simply to increase the rank of a company on a social network.

The investigation conducted by the journalists revealed that a hacker can steal someone’s Hilton HHonor points for (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Pierluigi Paganini. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/IU96dyuhZYc/