Defeating a faceless enemy
You never see it coming. Hackers hide behind their code: faceless and dangerous.
21 July 2017
When a large and secretive research organisation starts wreaking havoc by unleashing malicious malware along with a targeted attack simulation and a Linux boot-to-root challenge, what do you do? First, select a motley crew of students, developers, sysadmins and IT consultants, and gather them in a nondescript warehouse on the outskirts of Pretoria.
Drawn to tackle cybercrime, the team answered the call to be the last line of defence against hackers. Being chosen is an honour. Members first have to prove themselves worthy by tackling ten online challenges. Many fell by the wayside, until the final group was assembled. Armed with laptops, they set up camp.
ITWeb Premium
Get 3 months of unlimited access
No credit card. No obligation.