• Post category:Blog

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and gray hat hackers.

 

Hackers and cyber criminals actually stem back all the way to the 1950’s. When telephone aficionado, commonly known as “phreaks”, started hijacking world’s phone networks and making long-distance calls. By the 1980s, hackers became associated with teenagers who were being caught breaking into government computer systems — partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it.

 

What similarities do they share?

According to Maximus Blackbourne, Chief Hacking Officer at BlackbourneWorldwide

https://www.linkedin.com/pulse/hacker-vs-cybercriminal-real-scoop-maximus-blackbourne-chfi-csm/  Both of these types of people are everywhere, much like the talked about Anonymous group. Hackers are: enthusiasts, security professionals, moms, dads, kids, grandparents, tech savvy individuals, clueless computer users, angry spouses, police, Private Investigators, etc. Hackers make up the majority of how companies find bugs in their software and ways to improve functionality.

 

“White hat”

Sometimes referred to as ethical hackers, or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck. Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system.

 

“Black hat”

Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns solely for causing damage. This may be anything from stealing information using malware to forcefully shutting down networks using denial-of-service attacks. Kevin Mitnick was the most infamous black hat hacker in the world. During the 1990s, Mitnick went on a two and half year hacking spree where he committed wire fraud and stole millions of dollars of data from telecom companies and the National Defense warning system.

 

“Gray hat”

Think of Elliot Anderson, or better known as Mr.Robot. Whether someone is a security specialist or a cybercriminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking.

 

For example, Marcus Hutchins is a known gray hat hacker. He’s most famous for testing the WannaCry ransomware until he found a way to stop it. During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has been arrested and branded a “gray hat” hacker.

We now enter to the new era where we have the “Hacktivist”

Vic Hargrave, a trend micro writer, tells us, during the last several years a new class of hacker has emerged, the so-called hacktivist, who engages in hacking of computer networks and systems as a form of protest.  You’ve probably heard about the group known as Anonymous, a collective of clandestine – and yes, anonymous – hackers who have taken down and infiltrated computer systems belonging to companies and governments with whom they have political disagreements.

Hacktivism does not fit neatly into either white hat or black hat categories.  Unlike either their white hat or black hat counterparts, hacktivists are motivated by politics not profit.  They find themselves at ideological odds with many organizations and feel justified in their computer attacks against them.

 

The world of cybersecurity is far more complicated than the stylized hacking in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t give small businesses a pass. If you need a team of experienced professionals to help you tackle the complexities of modern cybersecurity, call us today.

This Post Has 138 Comments

  1. Tom Michalowsky

    Hello 🙂 Your method of describing the whole thing in this paragraph is genuinely fastidious, every one be able to simply be aware of it, Thanks a lot.

  2. Jeffreyspupe

    Account With 4500 Active Followers Cheap 100 Real BUY NOW

    Related Home Page
    https://sellaccs.net

    Contact
    Skype & Telegram : congmmo
    ICQ : @652720497
    Email : accsmarket.net@gmail .com

    Thanks

  3. Pianino.xmc.pl

    i like this blog too bad you have so many unrelated comments

  4. Pianino Opis

    How-do-you-do, i study your blog often and i own an analogous one and i used to be just wondering if you get much of spam comments? If thus how do you stop it, any plugin or anything youll be able to advise? I get thus often lately its driving me mad so any help is very abundant appreciated. for older folks, retirement or a huge promotion at work is a time when celebration events are going to be a great idea.

  5. Aluminium Metale

    Bardzo ciekawy blog, rzeczowy i wywazony. Od dzisiaj zagladam regularnie. Pozdrowienia 🙂

  6. Socjologia XMC

    Normal reasons that computers get slower is because of low diskspace,low memory, and low memory. However there are apps that can solve such dilemas. Using these programs can really help. Might you tell me know if that is the case

  7. WilliamKab

    2015 LEGIT SELLER 10 AGED TWITTER ACCOUNT COMBO PACK 5 YEARS AND ABOVE ORIGINAL EMAIL INCLUDED

    this content
    https://sellaccs.net

    Contact
    Skype & Telegram : congmmo
    ICQ : @652720497
    Email : accsmarket.net@gmail .com

    Thanks U

  8. Japan Guide

    Enjoyed examining this, very good stuff, thankyou . “What the United States does best is to understand itself. What it does worst is understand others.” by Carlos Fuentes.

  9. Norwegia Bergen

    Nie jest wazne, co przydarza ci sie w zyciu… Wazne jest, jakie przypisujesz temu znaczenie. – Robert Kiyosaki

  10. Filozofia Blog

    continue with the the nice work on the site. Do like it! :p Could use some more frequent updates, but i am sure you got some better things to do like we all do. http://www.piano.m106.com

  11. This in fact is my very first time i go to here. I found so numerous entertaining stuff in your site, in particular its argument. In the lots of testimonials in your writing, I guess I’m not the only one going through all the leisure here! Keep up the very good work.

  12. Andrecak

    How to Double Your Bitcoin in 24 Hours or Less? ANY QUESTIONS? Click : https://bitdouble.net Profitable Bitcoin investments.

  13. Japonia Portal

    Not easy to say thank you, me english not so well but these really good. Good read to practice English.

Leave a Reply