Radar Cyber Security’s Ethical Hackers are hired by customers to analyze computer systems or networks to find security vulnerabilities and inadequate security measures that could be exploited. This is done to reduce or eliminate potential threats to businesses. Ethical hackers help identify potential threats before they are exploited by potential attackers. We talked to one of our experts, David Schwaiger, BSc., about Ethical Hacking, IoT, EU-GDPR and cyber security.
What does an Ethical Hacker do?
As white hats or ethical hackers, we are the good guys and help companies improve their security by thinking and working like real attackers. During working hours, I analyze company applications and systems for vulnerabilities, misconfigurations or logical errors. For this purpose, various tools are used, which vary depending on the target. As soon as you have a foot in the door, you try to get as far as possible (and agreed) into the respective system to find internal documents, databases, personal information etc. After completion, the client will receive a complete report on the assessment. In my spare time, I search for and find serious security gaps in various applications, which I immediately draw the attention of the respective operator and developer to by means of “Responsible Disclosure”.
Why and how did you learn how to hack?
Hacking has inspired me since my early youth. Based on the book “The Hacker’s Black Book” I tried to copy the hacks described in it and to infect the family computer with various programs. During and beside my education, first at the University of Salzburg and then at the FH St. Pölten, I expanded my knowledge with a lot of Ethical Hacking. Since then I have learned a lot about computers, programs and hardware in my private and professional life. The right mindset plays an important role. I have developed this over the years. I have always been interested in hacking because it is something that not many people can do and it is not “normal” work. Being a good hacker is very demanding and it takes a long time to get there. It’s the challenge to find bugs and adapt quickly to new environments. These and more requirements, as well as the excellent demand for professional hackers like me, make this job special.