SlideShare a Scribd company logo
1 of 5
Top 5 Hackers of all the time-
Have you ever noticed your computer/laptopresponding weirdlylike
opening the web camera, applications on its own and getting Restart if
you click shut down. Then it’s time for you to take care of your
Pc/Laptop seriously becausemaybe someone breached intoyour
computer and got control of it. Well, this is what we say “Hacking”-
breakingintosomeone else’s computer without permission and stealing
the data thereby causing serious damage tothem.
Hackers have been around since the dawn of computers, and they have
their own ways and reasons for hacking. Here is about the 5 most
dangerous hackers and the havoc they caused..
Kevin Mitnick:
Kevin Mitnick alias “The Condor” is known as The King of all the hackers.
In early Adulthood, he began taking advantage of the system by tricking
the Los Angeles bus transportsystem to get free rides and made free
calls on his hacked cell phones. As he aged Mitnick found his gift for
code and began hacking intobig name companies like Nokia, IBM,
Motorola and eventually The Pentagon. Before he was finally arrested in
1995, millions of dollars of information passed through his hands. After
5 years of incarceration thatincluded 8 months of solitary confinement
in prison, he became a consultant and now runs his own security
company.
Mathew Bevan and Richard Price:
The dangerous British hackingduoof Mathew Bevan and Richard Price
hacked the Pentagon’s network for several weeks and progressed
further by stealing battle field simulations.They started intercepting
messages from US agents stationed in North Korea and access sensitive
materialfrom a Korean nuclear facility. This was quite alarming tothe
US because at that time they were using US systems to infiltrate
information from Korean systems which nearly sparked an international
issue.
Gary McKinnon:
He is a Scottish hacker and gained access to 97 US militarynetworks and
NASA servers in between 2001 and 2002 and even left the military a
message on its website: “yoursecurity system is crap”. He deleted
sensitive data, software and files but cost the US government $700,000in
recovery charges due to the severity of damage.McKinnon wasn’tin for
any kind of monetary game but he was just looking for files containing
evidence of extraterrestrial life which according to him be found.
Jonathan James:
Known as the “Comrade” on the internet, Jonathan James was the first
juvenile convicted and jailed in the United States for hacking. Atjust 15
years of age he managedto hack into number of networks, including
those belonging toBell South, Miami Dade,The US Departmentof
Defence, and even NASA. During his NASA hack he stole source code
responsible for operating the International Space Station. Once NASA
detected the breach, it had to shut down their computer networks for
three weeks, causing $41,000in damages. Arrestedon January26, 2000,
James plea-bargainedand was sentenced to house arrestand probation.
James was found dead from a self-inflicted gunshot wound on May 18,
2008. In his suicide note he wrote he was troubled by the justice system
and believed he would be prosecuted for newer crimes with which he
had nothing to do.
Astra:
Astra was the penname of Greek hacker whobreached into the systems
of France’s DassaultGroup, stole high profile weapon technology data,
software and sold it to people and organisations across Brazil, South
Africa, the Middle Eastand rest of the world for five long years. The
damages he caused are estimated between 250 and 361 million dollars.
Strangely even after all the destruction caused, Astra was never publicly
identified. Speculations and rumours say that he is a 58 year old Greek
Mathematician and is serving sixty years in jail somewhere
Top 5 notorous Hackers

More Related Content

What's hot

Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The CinemaAdrian Mikeliunas
 
Baton rouge std testing
Baton rouge std testingBaton rouge std testing
Baton rouge std testinglavernfox12
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko HypponenMikko Hypponen
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizationsMarioEliseo3
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Digital Security
Digital SecurityDigital Security
Digital SecurityCASTAC01
 

What's hot (19)

Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The Cinema
 
Baton rouge std testing
Baton rouge std testingBaton rouge std testing
Baton rouge std testing
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hacking
HackingHacking
Hacking
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizations
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Digital Security
Digital SecurityDigital Security
Digital Security
 

Viewers also liked

Increasing Customer Retention through Automation
Increasing Customer Retention through AutomationIncreasing Customer Retention through Automation
Increasing Customer Retention through AutomationSAP Ariba
 
Blame 015
Blame 015Blame 015
Blame 015comicgo
 
Analyzing Spend – You Can’t Fight What You Can’t See
Analyzing Spend – You Can’t Fight What You Can’t SeeAnalyzing Spend – You Can’t Fight What You Can’t See
Analyzing Spend – You Can’t Fight What You Can’t SeeSAP Ariba
 
Blame 028
Blame 028Blame 028
Blame 028comicgo
 
Blame 026
Blame 026Blame 026
Blame 026comicgo
 
E-Commerce – The Must-Have Sales and Marketing Tool
E-Commerce – The Must-Have Sales and Marketing ToolE-Commerce – The Must-Have Sales and Marketing Tool
E-Commerce – The Must-Have Sales and Marketing ToolSAP Ariba
 
ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6nhumcool
 
Rzeczpospolita
RzeczpospolitaRzeczpospolita
RzeczpospolitaKat4444
 
Manasi Raut-Resume.
Manasi Raut-Resume.Manasi Raut-Resume.
Manasi Raut-Resume.Manasi Raut
 
Beyond Cost Savings and Discounts - How to Get Real Value from Your Suppliers
Beyond Cost Savings and Discounts - How to Get Real Value from Your SuppliersBeyond Cost Savings and Discounts - How to Get Real Value from Your Suppliers
Beyond Cost Savings and Discounts - How to Get Real Value from Your SuppliersSAP Ariba
 
Fuerza trabajo y potencia mecànica
Fuerza trabajo y potencia mecànicaFuerza trabajo y potencia mecànica
Fuerza trabajo y potencia mecànicaNora Yataco
 

Viewers also liked (13)

About niyati
About niyatiAbout niyati
About niyati
 
Increasing Customer Retention through Automation
Increasing Customer Retention through AutomationIncreasing Customer Retention through Automation
Increasing Customer Retention through Automation
 
Blame 015
Blame 015Blame 015
Blame 015
 
Analyzing Spend – You Can’t Fight What You Can’t See
Analyzing Spend – You Can’t Fight What You Can’t SeeAnalyzing Spend – You Can’t Fight What You Can’t See
Analyzing Spend – You Can’t Fight What You Can’t See
 
Blame 028
Blame 028Blame 028
Blame 028
 
Blame 026
Blame 026Blame 026
Blame 026
 
E-Commerce – The Must-Have Sales and Marketing Tool
E-Commerce – The Must-Have Sales and Marketing ToolE-Commerce – The Must-Have Sales and Marketing Tool
E-Commerce – The Must-Have Sales and Marketing Tool
 
Niyati social media & website
Niyati   social media & websiteNiyati   social media & website
Niyati social media & website
 
ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6
 
Rzeczpospolita
RzeczpospolitaRzeczpospolita
Rzeczpospolita
 
Manasi Raut-Resume.
Manasi Raut-Resume.Manasi Raut-Resume.
Manasi Raut-Resume.
 
Beyond Cost Savings and Discounts - How to Get Real Value from Your Suppliers
Beyond Cost Savings and Discounts - How to Get Real Value from Your SuppliersBeyond Cost Savings and Discounts - How to Get Real Value from Your Suppliers
Beyond Cost Savings and Discounts - How to Get Real Value from Your Suppliers
 
Fuerza trabajo y potencia mecànica
Fuerza trabajo y potencia mecànicaFuerza trabajo y potencia mecànica
Fuerza trabajo y potencia mecànica
 

Similar to Top 5 notorous Hackers

Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackersMohsinHusenManasiya
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Digital security presentation
Digital security presentationDigital security presentation
Digital security presentationMFRILE01
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfdeepakarora871
 
Hacking
HackingHacking
HackingVirus
 

Similar to Top 5 notorous Hackers (20)

Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Digital security presentation
Digital security presentationDigital security presentation
Digital security presentation
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
L Scope
L ScopeL Scope
L Scope
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hackers
HackersHackers
Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Malwares
MalwaresMalwares
Malwares
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdf
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Top 5 notorous Hackers

  • 1. Top 5 Hackers of all the time- Have you ever noticed your computer/laptopresponding weirdlylike opening the web camera, applications on its own and getting Restart if you click shut down. Then it’s time for you to take care of your Pc/Laptop seriously becausemaybe someone breached intoyour computer and got control of it. Well, this is what we say “Hacking”- breakingintosomeone else’s computer without permission and stealing the data thereby causing serious damage tothem. Hackers have been around since the dawn of computers, and they have their own ways and reasons for hacking. Here is about the 5 most dangerous hackers and the havoc they caused.. Kevin Mitnick: Kevin Mitnick alias “The Condor” is known as The King of all the hackers. In early Adulthood, he began taking advantage of the system by tricking the Los Angeles bus transportsystem to get free rides and made free calls on his hacked cell phones. As he aged Mitnick found his gift for code and began hacking intobig name companies like Nokia, IBM, Motorola and eventually The Pentagon. Before he was finally arrested in
  • 2. 1995, millions of dollars of information passed through his hands. After 5 years of incarceration thatincluded 8 months of solitary confinement in prison, he became a consultant and now runs his own security company. Mathew Bevan and Richard Price: The dangerous British hackingduoof Mathew Bevan and Richard Price hacked the Pentagon’s network for several weeks and progressed further by stealing battle field simulations.They started intercepting messages from US agents stationed in North Korea and access sensitive materialfrom a Korean nuclear facility. This was quite alarming tothe US because at that time they were using US systems to infiltrate information from Korean systems which nearly sparked an international issue. Gary McKinnon:
  • 3. He is a Scottish hacker and gained access to 97 US militarynetworks and NASA servers in between 2001 and 2002 and even left the military a message on its website: “yoursecurity system is crap”. He deleted sensitive data, software and files but cost the US government $700,000in recovery charges due to the severity of damage.McKinnon wasn’tin for any kind of monetary game but he was just looking for files containing evidence of extraterrestrial life which according to him be found. Jonathan James: Known as the “Comrade” on the internet, Jonathan James was the first juvenile convicted and jailed in the United States for hacking. Atjust 15
  • 4. years of age he managedto hack into number of networks, including those belonging toBell South, Miami Dade,The US Departmentof Defence, and even NASA. During his NASA hack he stole source code responsible for operating the International Space Station. Once NASA detected the breach, it had to shut down their computer networks for three weeks, causing $41,000in damages. Arrestedon January26, 2000, James plea-bargainedand was sentenced to house arrestand probation. James was found dead from a self-inflicted gunshot wound on May 18, 2008. In his suicide note he wrote he was troubled by the justice system and believed he would be prosecuted for newer crimes with which he had nothing to do. Astra: Astra was the penname of Greek hacker whobreached into the systems of France’s DassaultGroup, stole high profile weapon technology data, software and sold it to people and organisations across Brazil, South Africa, the Middle Eastand rest of the world for five long years. The damages he caused are estimated between 250 and 361 million dollars. Strangely even after all the destruction caused, Astra was never publicly identified. Speculations and rumours say that he is a 58 year old Greek Mathematician and is serving sixty years in jail somewhere