SlideShare a Scribd company logo
10 Best Hackers The World Has Ever Known
16-year-old black hat hacker Jonathan James, became the first juvenile imprisoned for cybercrime. James gained his
notoriety by implementing a series of successful intrusions into various systems.
In an anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a
challenge to see what I could pull off.”
In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am
Solo. I will continue to disrupt at the highest levels.”
It was later identified as the work of Scottish systems administrator, Gary McKinnon, who was accused of perpetrating the
“biggest military computer hack of all time”.
He is accused of hacking into 97 United States military and NASA computers over a 13-month period between, using the name
‘Solo’.
Adrian Lamo is a Colombian-American threat analyst and hacker. He used coffee shops, libraries and internet cafés as his
locations for hacking.
Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer
networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom.
In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis
account to conduct research on high-profile subjects.
George Francis Hotz, alias geohot, or simply mil, is an American hacker known for unlocking the iPhone, allowing the
phone to be used with other wireless carriers, contrary to AT&T and Apple’s intent.
Additionally, he developed the limera1n jailbreak tool, which used his limera1n bootrom exploit.
In June, 2007, Hotz became the first person to carrier unlock an iPhone. According to Hotz’s blog, he traded his 2nd
unlocked 8 GB iPhone to Terry Daidone, the founder of Certicell, for a Nissan 350Z and three 8 GB iPhones.
Hotz said he wanted to give the iPhones to the other members of the team who created the hack with him. His name
will forever be associated with the April 2011 PlayStation breach
A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief
was hyped by the media but his actual offenses may be less notable than his notoriety suggests.
The Department of Justice describes him as “the most wanted computer criminal in United States history.” His
exploits were detailed in two movies: Freedom Downtime and Takedown.
According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks
while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied
valuable proprietary software from some of the country’s largest cellular telephone and computer companies.
Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private
e-mail.
A high school student from West Island, Michael Demon Calce best known as “MafiaBoy”. He launched a series of
widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell,
eBay, and CNN.
He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour.
Robert Tappan Morris is an American computer scientist, best known for creating the Morris Worm in 1988. That
was considered the first computer worm on the Internet.
Also he was the first person convicted under the Computer Fraud and Abuse Act.
Morris created the worm while he was a graduate student at Cornell University. He released the worm from MIT
to conceal the fact that it actually originated from Cornell. The worm took down one-tenth of the Internet,
crippling 6,000 plus computer systems. It didn’t take long for the police to track him down.
The notorious ’80s black hat hacker, Kevin Poulsen, also known as Dark Dante, gained recognition for his hack of
LA radio’s KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement
dubbed him “the Hannibal Lecter of computer crime.”
Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he
further drew the ire of the FBI by hacking into federal computers for wiretap information.
His hacking specialty, however, revolved around telephonesHowever, since serving time, Poulsen has worked as a
journalist and is now a senior editor for Wired News.
Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.
Albert Gonzalez is a computer hacker and computer criminal who is accused of masterminding the combined credit
card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the
biggest such fraud in history.
Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order
to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal
corporate networks.
When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a
three-foot drum which had been buried in his parents’ backyard. On March 25, 2010, Gonzalez was sentenced to
20 years in federal prison.
Vladimir Levin is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently
transfer US$10.7 million via Citibank’s computers.
However, his career as a hacker was only short lived, with a capture, imprisonment and recovery of all but
$400,000 of the original $10 million.
During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid.
The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen
account numbers and PINs.
Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.
Famous hackers

More Related Content

What's hot

Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Information security
Information security Information security
Information security
AishaIshaq4
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Hardware, Software & Firmware
Hardware, Software & FirmwareHardware, Software & Firmware
Hardware, Software & Firmware
Shamima Akther
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
Kriscila Yumul
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Mac OS(Operating System)
Mac OS(Operating System)Mac OS(Operating System)
Mac OS(Operating System)
Faizan Shaikh
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Chapter 06 Computing Components.pptxabdi
Chapter 06 Computing Components.pptxabdiChapter 06 Computing Components.pptxabdi
Chapter 06 Computing Components.pptxabdi
abdikarimf348
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
Jesthine Nesshal
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
History of the internet
History of the internetHistory of the internet
History of the internet
Kallie Sulanke
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
EarlvonDeiparine1
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vasiliki Zioga
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 

What's hot (20)

Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Information security
Information security Information security
Information security
 
Data Security
Data SecurityData Security
Data Security
 
Hardware, Software & Firmware
Hardware, Software & FirmwareHardware, Software & Firmware
Hardware, Software & Firmware
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Computer virus
Computer virusComputer virus
Computer virus
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Mac OS(Operating System)
Mac OS(Operating System)Mac OS(Operating System)
Mac OS(Operating System)
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Chapter 06 Computing Components.pptxabdi
Chapter 06 Computing Components.pptxabdiChapter 06 Computing Components.pptxabdi
Chapter 06 Computing Components.pptxabdi
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 

Similar to Famous hackers

Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
MohsinHusenManasiya
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
Abdullah Khosa
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
JeffJedras
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
Roman Antonov
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
Tricon Infotech
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
Vinuammu
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital underground
rmvvr143
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
aesalem06
 
Hackers
HackersHackers
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
Felipe Prado
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
Felipe Prado
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Hacking Incidents that made Headlines
Hacking Incidents that made HeadlinesHacking Incidents that made Headlines
Hacking Incidents that made Headlines
kanika sharma
 

Similar to Famous hackers (20)

Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital underground
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Hackers
HackersHackers
Hackers
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking Incidents that made Headlines
Hacking Incidents that made HeadlinesHacking Incidents that made Headlines
Hacking Incidents that made Headlines
 

More from Ashokkumar Gnanasekar

Practical demo recon os footprinting
Practical demo recon  os footprintingPractical demo recon  os footprinting
Practical demo recon os footprinting
Ashokkumar Gnanasekar
 
Open floor
Open floorOpen floor
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
Ashokkumar Gnanasekar
 
Ethics and cyber bullying
Ethics and cyber bullyingEthics and cyber bullying
Ethics and cyber bullying
Ashokkumar Gnanasekar
 
Ethics and compliances
Ethics and compliancesEthics and compliances
Ethics and compliances
Ashokkumar Gnanasekar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber Security Worlshop Agenda
Cyber Security Worlshop AgendaCyber Security Worlshop Agenda
Cyber Security Worlshop Agenda
Ashokkumar Gnanasekar
 

More from Ashokkumar Gnanasekar (8)

Practical demo recon os footprinting
Practical demo recon  os footprintingPractical demo recon  os footprinting
Practical demo recon os footprinting
 
Open floor
Open floorOpen floor
Open floor
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Ethics and cyber bullying
Ethics and cyber bullyingEthics and cyber bullying
Ethics and cyber bullying
 
Ethics and compliances
Ethics and compliancesEthics and compliances
Ethics and compliances
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Security Worlshop Agenda
Cyber Security Worlshop AgendaCyber Security Worlshop Agenda
Cyber Security Worlshop Agenda
 
ECC-Certificate
ECC-CertificateECC-Certificate
ECC-Certificate
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Famous hackers

  • 1. 10 Best Hackers The World Has Ever Known
  • 2. 16-year-old black hat hacker Jonathan James, became the first juvenile imprisoned for cybercrime. James gained his notoriety by implementing a series of successful intrusions into various systems. In an anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.”
  • 3. In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon, who was accused of perpetrating the “biggest military computer hack of all time”. He is accused of hacking into 97 United States military and NASA computers over a 13-month period between, using the name ‘Solo’.
  • 4. Adrian Lamo is a Colombian-American threat analyst and hacker. He used coffee shops, libraries and internet cafés as his locations for hacking. Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects.
  • 5. George Francis Hotz, alias geohot, or simply mil, is an American hacker known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T and Apple’s intent. Additionally, he developed the limera1n jailbreak tool, which used his limera1n bootrom exploit. In June, 2007, Hotz became the first person to carrier unlock an iPhone. According to Hotz’s blog, he traded his 2nd unlocked 8 GB iPhone to Terry Daidone, the founder of Certicell, for a Nissan 350Z and three 8 GB iPhones. Hotz said he wanted to give the iPhones to the other members of the team who created the hack with him. His name will forever be associated with the April 2011 PlayStation breach
  • 6. A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.
  • 7. A high school student from West Island, Michael Demon Calce best known as “MafiaBoy”. He launched a series of widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour.
  • 8. Robert Tappan Morris is an American computer scientist, best known for creating the Morris Worm in 1988. That was considered the first computer worm on the Internet. Also he was the first person convicted under the Computer Fraud and Abuse Act. Morris created the worm while he was a graduate student at Cornell University. He released the worm from MIT to conceal the fact that it actually originated from Cornell. The worm took down one-tenth of the Internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down.
  • 9. The notorious ’80s black hat hacker, Kevin Poulsen, also known as Dark Dante, gained recognition for his hack of LA radio’s KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.” Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information. His hacking specialty, however, revolved around telephonesHowever, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.
  • 10. Albert Gonzalez is a computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the biggest such fraud in history. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. On March 25, 2010, Gonzalez was sentenced to 20 years in federal prison.
  • 11. Vladimir Levin is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently transfer US$10.7 million via Citibank’s computers. However, his career as a hacker was only short lived, with a capture, imprisonment and recovery of all but $400,000 of the original $10 million. During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid. The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.

Editor's Notes

  1. Also known as “c0mrade,” James committed suicide using a gun, On May 18, 2008, at the age of 25. His suicide was apparently motivated by the belief that he would be prosecuted for crimes he had not committed. “I honestly, honestly had nothing to do with TJX,” James wrote in his suicide note, “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.” James’ major intrusions targeted high-profile organizations such as NASA and the Department of Defense. He cracked into NASA computers, stealing software worth approximately $1.7 million. He also hacked into the Defense Threat Reduction Agency and intercepted over 3,000 highly secretive messages passing to and from the DTRA employees, while collecting many usernames and passwords.
  2. The US authorities claim he deleted critical files from operating systems, which shut down the United States Army’s Military District of Washington network of 2,000 computers for 24 hours. After the September 11 attacks in 2001, he deleted weapons logs at the Earle Naval Weapons Station, rendering its network of 300 computers inoperable and paralyzing munitions supply deliveries for the US Navy’s Atlantic Fleet. He is also accused of copying data, account files and passwords onto his own computer. In November 2002, McKinnon was indicted by a federal grand jury in the Eastern District of Virginia. The indictment contained seven counts of computer-related crime, each of which carried a potential ten-year jail sentence. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.
  3. For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.
  4. . Being one of the first hackers ever to jailbreak the Sony PlayStation 3, Hotz found himself in the midst of a very relentless, public and messy court battle with Sony – perhaps worsened by Hotz’s public release of his jail breaking methods. In a stated retaliation to Sony’s gap of the unstated rules of jail breaking – never prosecute – the hacker group Anonymous attacked Sony in what would be the dubbed as the most costly security break of all time to date. At the end of April 2011, Hackers broke into the PlayStation Network and stole personal information of some 77 million users. However, Hotz denied any responsibility for the attack, and added “Running homebrew and exploring security on your devices is cool; hacking into someone else’s server and stealing databases of user info. is not cool.”
  5. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988.
  6. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup, TNT. In 2001, the Montreal Youth Court sentenced Calce to eight months of open custody, one year of probation, restricted use of the Internet, and a minimal fine.
  7. Due in part to the need for social acceptance that seems to be common among many young hackers, Morris made the fault of chatting about his worm for months before its release on the Internet. Morris claimed it was just a stunt, and added that he truly regretted causing $15 million worth of damage: the estimated amount of carnage his worm left behind. Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act . In December, 1990, was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.
  8. . Poulsen’s most famous hack, KIIS-FM, was accomplished by taking over all of the station’s phone lines. In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years, which was the longest sentence ever given for hacking at the time.