Welcome to Briefly!
Quickly sign up or login to read, highlight, and comment on this article.
image credit
Information security
Should Hacking Have a Code of Conduct?
Which raises a question for the wider law-abiding hacking community: Should we have our own ethical code of conduct?This could be an exploitable unauthenticated RCE or SQLi, a malicious code execution, or sensitive data disclosure vulnerability.Now, don't get me wrong; this isn't a pat on the back for cybercriminals, but it does indicate that at least some professional code is being followed.Having a timestamped log of the activities performed, be it exploiting a system or scanning for malware, gives piece of mind to organizations by reminding them that hackers work with them, not against them.
There's nothing here yet.