At the Defcon conference in Las Vegas last week, kids aged 8 to 16 were exposed to the world of hacking. Some may fear indoctrinating a new generation of Anonymous and LulzSec members, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these. At the Defcon conference in Las Vegas last week, kids aged 8 to 16 were exposed to the world of hacking. Some may fear indoctrinating a new generation of Anonymous and LulzSec members, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these.The kids track spanned two days, and attendees witnessed presentations and listened to lectures from a range of security experts, including officials from the Department of Homeland Security and the NSA (National Security Agency). Kids were encouraged to think outside the box to be able to identify security flaws in the computer and gaming platforms they use every day.Roughly 60 kids took part in the first ever kids track at the annual Defcon conference. The children weren’t just sent off to learn about the dark side in Las Vegas on their own, though–they had to be accompanied by a parent.Truth be told, kids are sort of natural ‘hackers’. Kids have an innate sense of wonder and curiosity that–for most–dies a slow death as they get older. If you have ever played the “why?” game with a four year old, you know that curiosity is boundless. In many cases being more “mature” is just code for being more jaded and simply accepting things at face value rather than tenaciously searching for deeper answers. Hackers–and hacking–are not inherently insidious. In fact, hacking purists get their feathers ruffled because hacking is a benign, perfectly acceptable practice, and the term has been co-opted by the dark side.While most people just use technology in its prescribed manner, hackers consider what it can do, rather than what it is supposed to do. Hackers push the envelope and find the weak spots. They don’t stop at what a device or program does–they dig beneath the surface to understand how and why it does what it does. They use unorthodox methods and think outside the box. Malicious hackers use these skills to circumvent the design of a device or program and expose security holes. They break into corporate and government networks and compromise sensitive data. They intercept usernames and passwords, steal identities, and rip-off bank accounts. They give hacking a bad name.There is another side to the hacking coin, though. In an “it takes a thief to catch a thief” sort of way, we need people with those same skills, and that same sense of wonder and curiosity–but with better ethics and a truer moral compass. We need hackers who can find the same holes as the malicious hackers, but work to plug them and protect systems and data rather than exploiting and compromising.Cameron Camp, Researcher for ESET, says “Young hackers need to be convinced that hacker life is rewarding without going to the “dark side”–that interesting careers are to be had working for the good guys,” adding, “To that end, we see recent efforts from Google and Facebook at providing bounties to incentivize hackers for finding and reporting bugs, not exploiting them.”The Defcon kids track is an awesome idea. It’s a wonder it took this long to introduce such a concept. I expect the kids track at future Defcon conferences to have greater attendance, and hopefully we will all benefit one day from raising a new generation of hackers. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe