TOP 5 most famous hackers in history
TOP 5 most famous hackers in history.
Hackers are the frequency of cyber attacks is increasing exponentially, as the development of Internet access allows hackers to find all the tools they need at almost zero cost. This problem has been exacerbated by the work of a few people, who are now the most famous hackers and have broken through and discovered serious vulnerabilities.
If we open the newspaper archive, names of hackers will appear and monopolize the newspaper headlines. Some of them keep a dark side, but others decide to use their talents in the field of cyber security.
The term hacker is often associated with cybercriminals, but not always, to distinguish between good and evil the terms "white hat" and "black hat" are used, but recently they have all started to be accepted as hackers. No matter where they are located. Because they all contribute to the development of network security in some way.
What are the safe measures to take when using public WIFI?(Opens in a new browser tab)
Michael Calce:
One of the hackers known as the "mafia" became famous when he was 15 years old. On Valentine's Day 2000, he gained control of the university's computer network and used his comprehensive resources to cause one of the search engine numbering problems: Yahoo! In the same week, he attacked the networks of Dell, eBay, CNN and Amazon with a denial of service (DDoS), saturating the company's servers and crashing the website.
His ego let him down, he bragged about his exploits among colleagues and had some chats. Sentenced to probation for a year, Internet access was restricted and he had to pay a fine. As for him, if he manages to reform, today he is a computer security consultant for a large company.
This made investors and Internet advocates very nervous because it managed to influence the world's largest website at the time, which was worth more than $ 1 billion. It raises Internet security issues and the Internet isegislation begins in this area.
Albert González:
Nicknamed "soupnazi," he led a group of troublesome computer geeks in high school. He later became an active member of the crime-trading website Shadowcrew.com.
At age 22, Tonitz was arrested in New York on suspicion of debit card fraud, which was linked to the theft of data from millions of accounts. He became a Secret Service whistleblower to avoid incarceration and recruited Shadowcrew members.
However, during this period, he resumed his criminal activities with a group of accomplices and stole more than 180 million payment card accounts from companies such as Office Max, Dave and Buster's, Boston Market in 2005. The New York Times magazine reported that this attack was the first serial data breach of credit card information. Albert and his associates used SQL injection to create backdoors into several corporate networks. TJX alone carried out a theft worth $ 256 million.
González was sentenced to 20 years in prison in 2010 and is still serving his sentence.
Kevin Poulsen:
In 1983, Poulsen, who was only 17 years old, called himself Dark Dante and invaded the ARPANET, which was the Pentagon's computer network, but was soon discovered. He was a minor at the time and was released after a warning.
But Kevin did not heed the warning, but continued to do his own thing. In 1988, he managed to access the federal computer and gain access to the files of deposed Philippine President Ferdinand Marcos (Ferdinand Marcos). When the authorities found him, he decided to go into hiding. He is still active, stealing government documents from underground and leaking secrets.
One of the anecdotes that made him famous is that in 1990, he hacked into a radio station's phone line to make sure he was the 102nd listener and won a Porsche, a vacation and a $20,000 prize.
Poulsen was eventually arrested and banned from computers for three years. And since then, he has reformed into a serious journalist who writes about cybersecurity, is currently a senior editor at Wired, and in 2006 helped identify 744 child molesters via MySpace.
Biohacker fined for travel card implantation(Opens in a new browser tab)
Adrian Lamo:
At the age of 20, the hacker used an unprotected content management tool on Yahoo, modified an article on Reuters and added a fake quote, which he attributed to former Judge. Minister John Ashcroft.He is known as a "vagabond hacker" because he roams various Internet accesses (such as Internet cafes) to attack in different jurisdictions and expose himself as little as possible.
Lamo once hacked the system and then warned the press and his victims. Sometimes, he can help them resolve vulnerabilities and improve security. However, when he attacked the internal network of The New York Times (expert sources including himself), he had exceeded the limit to be able to investigate high-level public figures.
He also reported on Chelsea Manning (Chelsea Manning), the latter is the cause of the video leaked to WikiLeaks, the video shows that U.S. soldiers killed Reuters photographers and other civilians in Afghanistan, as well as classified U.S. military documents.
Lamo was sentenced to six months of house arrest for stealing data from the New York Times and is currently a reporter.
Kevin Mitnick:
In the early 1980s, he was nicknamed "The Condor" and was accused of invading the North American Aerospace Defense Command (NORAD) system, since then he has become the most desirable in U.S. history. Major cybercriminals. His attack inspired the 1983 movie "Game of War." In 1989, he attacked the network of Digital Equipment Corporation (DEC), the industry leader in computer equipment manufacturers. He was subsequently arrested, convicted and sent to prison.Mitnick did not use the data obtained in the attacks for personal gain, obviously, he just wanted to demonstrate his ability to carry out these attacks.
When the court issued him a warrant for his cyberattack on Pacific Bell, Mitnick fled and went into hiding for two years. When he was arrested, he was sentenced to prison on multiple counts of computer and wire fraud.
"ElCóndor" is another case of a reformed hacker who switched positions and went into cybersecurity consulting.
What are the safe measures to take when using public WIFI?(Opens in a new browser tab)
Leave a Reply
You must be logged in to post a comment.