Types of Hackers : Explained - GoTechTalk


Monday, July 23, 2018

Types of Hackers : Explained

You've heard it all over the news major company hacked user data exposed, the hospital held to ransom, celebrity tweet something offensive claims hackers did it.

Will it never end?? well no after all for as long as there have been locked there have been locked picks to break into them and unfortunately to the chagrin of major corporations and individual users alike computers are no different, so who are these digital lock pickers and what makes them tick you might think of 90s retro teens with glasses staring at screens flooded with code but the reality is actually far less dramatic.

At the beginning of the digital age hackers were enthusiasts probing to see what was possible with emerging technologies, phone breakers are an early example from the late 1950s through the early 70s among whom was the legendary Steve Wozniak who would go on to co-found Apple Computer, anyway the idea behind breaking was to generate tones that early automated phone systems used in order to gain control for themselves Wozniak and Steve Jobs even impersonated Henry Kissinger to prank call the Vatican.

Sadly that era of playful innocence ended soon after computers and networks became more commonplace and today we classify individual hackers by the hats that they wear which we assign based on their intentions the colors are white, gray or black no relation to Red Hat which is an Enterprise Linux distribution.

White hats are mainly security researchers and penetration testers people whose job it is to counter the other guys their actions are often sanctioned by the companies who pay them for their services some white hats have discovered a massive security holes that could have affected a lot of people if they weren't found such as Dan Kaminski who discovered a flaw in the DNS that could have crippled huge parts of the Internet as well as rootkits that Sony was intentionally putting on to its music CDs.

Gray hats as the name suggests muddy the waters since they generally don't have malicious intentions but they act without permission from their targets and the way in which they use any data they access comes down to their personal moral code, gray hat incidents can take many forms from the hacker who sold an iPhone cracked to the FBI to help them access the San Bernardino shooters data to the Russian software company that developed ebook software that bypass DRM restrictions, although that was legal in Russia it wasn't in the U.S. leading to a run with the law when one of their employees visited the state's.

Black cats meanwhile are usually the ones making splashy headlines as they have no problem floating the law to profit at someone else's expense or even to just cause damage to a website service business or even an individual, when passwords or credit cards are stolen and put up for sale online that's a black hat handiwork and although it's easy to label hackers that steal money from target customers as black hats there's debate as to whether other kinds of hackers fall into this category, think so-called activists whose actions inspire impassioned arguments or government spy agencies like the NSA and some black hats have even had their talents recognized by major IT and cybersecurity firms who have ended up offering them jobs as long as the hacker trades in his or her black hat for a white one but these days it should be noted there are much better ways to break into the world of security consulting than by committing crimes.

Alright, guys, that's the end of the blog, thanks for reading the whole way through if you enjoyed this blog please share it with someone who would be interested and leave a comment, Thanks for reading guys.

No comments:

Post a Comment