For most people, the term “hacker” or “hacking“ has negative implications. They see images of young individuals in hoodies bent over computer keyboards doing evil deeds.
Get up to $105 off McAfee Total Protection – Includes premium antivirus, identity protection, and Secure VPN!
Yes, hacking and hackers have generally been associated with compromising computer systems, networks, and digital devices. But those activities are not always done with malicious intent. Hacking is really just challenging technology to see if it can be bypassed, broken, infiltrated, or compromised.
So what is a hacker? Based on the previous description, a hacker is one who leverages technical skills and knowledge to solve a problem or challenge, sometimes using unorthodox approaches. By that definition, there is really nothing inherently evil about hacking.
The Three Types of Hackers
Hackers come in multiple colors and are motivated by a number of reasons.
Criminal hackers create malware to commit crimes, such as stealing information and money. Good hackers use their skills to test systems to expose vulnerabilities so that they can be fixed so criminal hackers can’t exploit them.
Criminal hackers work for themselves, criminal organizations or nation states. Good hackers typically work for big companies or governments to protect those entities from the bad actors.
The industry groups hackers into three primary categories: black hat, white hat, and gray hat. There are other variants of hackers but these are the most common definitions.
Black hats
These hackers gain unauthorized access into computer systems or networks with malicious intent. They may use technology to attack systems for fun, for profit, or for political motivations. They could also use it to destabilize countries or as part of a social cause. Black hat system penetration often involves modification and/or destruction of data and distribution of computer viruses, Internet worms, and spam.
White hats
Generally known as “ethical hackers,” they are computer
Grey hats
As with the color, these skilled hackers operate in the grey zone, sometimes with good intentions and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
A hacker is generally used to refer to any individual who deliberately tries to compromise a computer system—regardless of objective. Or it can also refer to someone who likes to tinker around with the innards of computer systems, and it may also mean a smart person who can solve any computer problem.
So, while many in the mainstream may think of hackers as criminals, the term describes a range of people with different technical skills and motives. It’s important to use qualifying descriptors, such as “white hat hacker” or “criminal hacker,” so we have a better idea to whom we are referring.
Hackers are usually very talented people We just need more of the good variety, the white hats.
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
Recommended Reading
What is Shoulder Surfing?
Shoulder surfing is a form of social engineering that enables cybercriminals to gather information just by looking over their victims’ shoulders. The aim of shoulder surfing is to obtain personal data, such as usernames, passwords or personal identification numbers (PINs), bank account numbers or credit card numbers.
Is Cyber Security Awareness Training Critical for SMBs?
You might think that cyber security awareness training is not for small businesses. You might also think that the bad guys are more interested in bigger companies. You probably should read this because you would be wrong on both counts.
What is a Password Manager?
A password manager is an encrypted storage system for keeping and managing passwords usually protected by a master password. Some password managers use biometric data to protect the vaults instead of master passwords. Still others support the use of two factor authentication for higher security.
What is Hacking?
Hacking is an old game in the cyberworld with ever changing players and techniques. It may be done with good intentions or malicious motives. It is growing rapidly because of the proliferation of devices.
What is Bloatware?
Preinstalled and unwelcome. Bloatware is unwanted software installed on your digital device; slowing it down, reducing battery life, consuming space and just destabilizing it.
What is a Drive By Download?
A "drive by download" is a cyber attack where visiting a website or hovering over an Ad causes malware to infect your computer or device.