When it takes a genius to hack something called foolproof, why is the name applied so condescending. Or, does that mean that fools can't get it but no one thought of the genius that is out there that can, though it has been the only game not hacked in the three years it has been out. The hacker is the teen who hacked the iPhone. The Play Station 3 only took five weeks to do. The hacker says that the hack will be up on the Internet soon so that gamers can play pirated software or games they have written themselves. For this complete article, click here.
There must be something innate about humans that raises a challenge when others make too many things that are proprietary. The Black Hat Hackers - Criminals
1. Kevin Mitnick. posted by 'marvin': The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
2. Adrian Lamo: "Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law. Lamo became a notable public speaker and award winning journalist.
3. Jonathan James "At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails. High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million."
4. Robert Tappan Morris: "Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act. Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.
5. Kevin Poulsen: "Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other item. Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles."
Most hackers start young before they are too tied done with schedules and jobs and sense of the wrong and the damage they are capable of doing with their hacking. It can be incredibly costly when entire corporate networks are shut down or the credit cards of millions are compromised. The damage to people's lives when their identity is stolen is vast.
A yearly, world hacker's conference is held. Unless my memory is defeating me, the last great hack into many companies' data and credit cards was done by someone who had been hired by the government to prevent just what he accomplished while on government salary!
No comments:
Post a Comment