SlideShare a Scribd company logo
Top 10 Most Famous
 Hackers of All Time




 Uroš Tasić
Black Hat Hackers vs. White Hat
            Hackers

• “black hats” exploit computer systems. They
  are the ones you've seen on the news being
  hauled away for cybercrimes. Some of them do
  it for fun and curiosity, while others are looking
  for personal gain.

• “white hats” often work as certified "Ethical
  Hackers" hired by companies to test the
  integrity of their systems. Others, operate
  without company permission by bending but
  not breaking laws and in the process have
  created some really cool stuff.
Black Hat Hackers



             Jonathan James
 • First juvenile to be sent to prison for hacking,
   served six months in prison

 • Crimes:
     – Installed a backdoor into a Defense Threat
       Reduction Agency server


     – Cracked into NASA computers, stealing software
       worth approximately $1.7 million
Black Hat Hackers



                Adrian Lamo
 • Sentence: six months of home confinement
   and two years of probation, 65.000$ in
   restitution

 • Crimes:
     – Penetration testing, in which he found flaws in
       security, exploited them and then informed
       companies of their shortcomings (Yahoo!, Bank
       of America)

     – Brake into The New York Times' intranet
Black Hat Hackers



                 Kevin Mitnick

 • Crimes:

     – Breaking into the Digital Equipment Corporation's
       computer network and stealing software

     – Half year "coast-to-coast hacking spree"




 • Sentence: five years in prison
Black Hat Hackers



              Kevin Poulsen
 • Sentence: five years in prison

 • Crimes:

    – KIIS-FM hack was accomplished by taking over
      all of the station's phone lines


    – Hack of federal investigation database and
      federal computers for wiretap information
Black Hat Hackers




           Robert Tappan Morris


 • Sentence: years' probation, 400 hours of community
    service and a fine of $10,500


 • Crime:
     – Creator of the Morris Worm - the first computer
       worm to be unleashed on the Internet
White Hat Hackers



            Stephen Wozniak


 • Achievements:

    – Blue boxes - devices that bypass telephone-
      switching mechanisms to make free long-
      distance calls.

    – The computer as a fully assembled PC board


    Awards: the National Medal of Technology, the
       National Inventors Hall of Fame
White Hat Hackers




               Linus Torvalds



  • The Linux operating system

    Torvalds: "I just want to have fun
    making the best damn operating system
    I can."
White Hat Hackers


              Richard Stallman
  • The GNU Project, which was founded to
    develop a free operating system


     Stallman: "Non-free software keeps users
     divided and helpless, forbidden to share it and
     unable to change it. A free operating system is
     essential for people to be able to use
     computers in freedom."

       Richard Stallman - Free Software Song
       http://www.youtube.com/watch?v=1BH7poMtPVU
White Hat Hackers



          Tsutomu Shimomura



  • Was hacked by Kevin Mitnick and
    made it his cause to help the FBI
    capture him.
Thank you for your attention!!!

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
Hareendran MG
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Kevin mitnick
Kevin mitnickKevin mitnick
Kevin mitnick
rahulkumardevgan
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
Aung Thu Rha Hein
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
SunnyRajak12
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
DallasHaselhorst
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
Dibyendu Paul
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
Cyber security
Cyber securityCyber security
Cyber security
 
Kevin mitnick
Kevin mitnickKevin mitnick
Kevin mitnick
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
HACKING
HACKINGHACKING
HACKING
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Hacking
HackingHacking
Hacking
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
Deep web
Deep webDeep web
Deep web
 
Malware
MalwareMalware
Malware
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 

Viewers also liked

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
glairerabida
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
Maricel Baldomero De Lara
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Manila Central University
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 

Viewers also liked (6)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Similar to Top 10 most famous hackers of all time

Hacking
HackingHacking
Hacking
Purohit Rock
 
hacking
hackinghacking
hacking
mayank1293
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Powerpoint
PowerpointPowerpoint
Powerpoint
Marcelomazzocato
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
Udieh Moody
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
Deepu Näñí
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
Elipeta Sotabento
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Hacking
HackingHacking
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
Tricon Infotech
 
Hacking
HackingHacking
Hacking
Virus
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 
Sit presentation
Sit presentationSit presentation
Sit presentation
cchoi02
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 

Similar to Top 10 most famous hackers of all time (20)

Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Hacking
HackingHacking
Hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

More from PRESENTATIONSFORESL

Filoloska edward de bono 6 hats
Filoloska   edward de bono 6 hatsFiloloska   edward de bono 6 hats
Filoloska edward de bono 6 hats
PRESENTATIONSFORESL
 
Shoes
ShoesShoes
Beyonce
BeyonceBeyonce
Academy awards 2013
Academy awards 2013Academy awards 2013
Academy awards 2013
PRESENTATIONSFORESL
 
Japanese mythology
Japanese mythologyJapanese mythology
Japanese mythology
PRESENTATIONSFORESL
 
Cloud
CloudCloud
Korean culture
Korean cultureKorean culture
Korean culture
PRESENTATIONSFORESL
 
History of cosmetics and makeup
History of cosmetics and makeupHistory of cosmetics and makeup
History of cosmetics and makeup
PRESENTATIONSFORESL
 
Witches
WitchesWitches
Women in musilm society
Women in musilm societyWomen in musilm society
Women in musilm society
PRESENTATIONSFORESL
 
Pablo picasso
Pablo picassoPablo picasso
Pablo picasso
PRESENTATIONSFORESL
 
Shoes03
Shoes03Shoes03
Beowulf
BeowulfBeowulf
Sport in serbia
Sport in serbiaSport in serbia
Sport in serbia
PRESENTATIONSFORESL
 
The mistery of bermuda triangle
The mistery of bermuda triangleThe mistery of bermuda triangle
The mistery of bermuda triangle
PRESENTATIONSFORESL
 
Beethoven
BeethovenBeethoven
Computer assisted neurosurgery
Computer assisted neurosurgeryComputer assisted neurosurgery
Computer assisted neurosurgery
PRESENTATIONSFORESL
 
The immune system
The immune systemThe immune system
The immune system
PRESENTATIONSFORESL
 
Facebook security
Facebook securityFacebook security
Facebook security
PRESENTATIONSFORESL
 
Google earth
Google earthGoogle earth
Google earth
PRESENTATIONSFORESL
 

More from PRESENTATIONSFORESL (20)

Filoloska edward de bono 6 hats
Filoloska   edward de bono 6 hatsFiloloska   edward de bono 6 hats
Filoloska edward de bono 6 hats
 
Shoes
ShoesShoes
Shoes
 
Beyonce
BeyonceBeyonce
Beyonce
 
Academy awards 2013
Academy awards 2013Academy awards 2013
Academy awards 2013
 
Japanese mythology
Japanese mythologyJapanese mythology
Japanese mythology
 
Cloud
CloudCloud
Cloud
 
Korean culture
Korean cultureKorean culture
Korean culture
 
History of cosmetics and makeup
History of cosmetics and makeupHistory of cosmetics and makeup
History of cosmetics and makeup
 
Witches
WitchesWitches
Witches
 
Women in musilm society
Women in musilm societyWomen in musilm society
Women in musilm society
 
Pablo picasso
Pablo picassoPablo picasso
Pablo picasso
 
Shoes03
Shoes03Shoes03
Shoes03
 
Beowulf
BeowulfBeowulf
Beowulf
 
Sport in serbia
Sport in serbiaSport in serbia
Sport in serbia
 
The mistery of bermuda triangle
The mistery of bermuda triangleThe mistery of bermuda triangle
The mistery of bermuda triangle
 
Beethoven
BeethovenBeethoven
Beethoven
 
Computer assisted neurosurgery
Computer assisted neurosurgeryComputer assisted neurosurgery
Computer assisted neurosurgery
 
The immune system
The immune systemThe immune system
The immune system
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Google earth
Google earthGoogle earth
Google earth
 

Top 10 most famous hackers of all time

  • 1. Top 10 Most Famous Hackers of All Time Uroš Tasić
  • 2. Black Hat Hackers vs. White Hat Hackers • “black hats” exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. • “white hats” often work as certified "Ethical Hackers" hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff.
  • 3. Black Hat Hackers Jonathan James • First juvenile to be sent to prison for hacking, served six months in prison • Crimes: – Installed a backdoor into a Defense Threat Reduction Agency server – Cracked into NASA computers, stealing software worth approximately $1.7 million
  • 4. Black Hat Hackers Adrian Lamo • Sentence: six months of home confinement and two years of probation, 65.000$ in restitution • Crimes: – Penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings (Yahoo!, Bank of America) – Brake into The New York Times' intranet
  • 5. Black Hat Hackers Kevin Mitnick • Crimes: – Breaking into the Digital Equipment Corporation's computer network and stealing software – Half year "coast-to-coast hacking spree" • Sentence: five years in prison
  • 6. Black Hat Hackers Kevin Poulsen • Sentence: five years in prison • Crimes: – KIIS-FM hack was accomplished by taking over all of the station's phone lines – Hack of federal investigation database and federal computers for wiretap information
  • 7. Black Hat Hackers Robert Tappan Morris • Sentence: years' probation, 400 hours of community service and a fine of $10,500 • Crime: – Creator of the Morris Worm - the first computer worm to be unleashed on the Internet
  • 8. White Hat Hackers Stephen Wozniak • Achievements: – Blue boxes - devices that bypass telephone- switching mechanisms to make free long- distance calls. – The computer as a fully assembled PC board Awards: the National Medal of Technology, the National Inventors Hall of Fame
  • 9. White Hat Hackers Linus Torvalds • The Linux operating system Torvalds: "I just want to have fun making the best damn operating system I can."
  • 10. White Hat Hackers Richard Stallman • The GNU Project, which was founded to develop a free operating system Stallman: "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom." Richard Stallman - Free Software Song http://www.youtube.com/watch?v=1BH7poMtPVU
  • 11. White Hat Hackers Tsutomu Shimomura • Was hacked by Kevin Mitnick and made it his cause to help the FBI capture him.
  • 12. Thank you for your attention!!!