The reality of our daily life

The fact of being connect through different devices is exposing our personal and confidential data to any hacker that wants to enter in that information. The hackers have their own methods to access to any kind of system wherever and whenever they want to. That is the reason why any individual or organization is a potential target of being attack.

What is a hacker?

There are a few definitions of what a hacker is.

For example, on the one hand we find the definition of the RAE (Real Academia de la lengua Española) in which hacker is define as this “ A hacker is a person with big abilities and a deep knowledge  of the computer management .It use this knowledge in order to access illegally in system and networks of others” . On the other hand, the “A person who uses computers to gain unauthorized access to data”.

Eric Raymond’s definition from his book* “The New Hacker’s Dictionary” is “A hacker is a really cleaver developer”. A few main characteristics from this profile are a person that learns super quickly how to develop, a person that is an expert in something specific.

To sum up we can say that a hacker is a person with a high knowledge of a specific technology field, who intervenes premeditatedly in different systems.

The objective can change depending on goal that they are looking for.

What is clear is that most of the time the meaning that we give to this word, is negative. However as we will see in this post, hacker doesn’t always have a bad meaning. There are different kind of hackers depending of the intentions that they have.

When this Word was born?

The word hacker was created back in the second half of the S.XX, , more precise in the MIT laboratories in the 60’s.

 Types of hackers

In general we can say that there are two main groups of hackers White hats or etic hackers and the Black hats. However as we will see this terminology has been growing up and taking place to new hacker categories.

White hats or Etic hackers: These hackers work in different organizations where it is own function is find the vulnerabilities that can exist in the different systems with the objective of correct it and improve potential weaknesses.

Black hats: This hackers work in different illegal activities, with the main objective of stole, destroy and spread personal information. The problem is really serious because in almost all the cases, the hacker demand money to the victim. It is this type of hacker the one that also creates the different kind of malware. The objective still the same. Obtain money of the action. Even so, in this last group is important to differentiate two groups:

  • Crackers: They are focus on introduce virus or stole passwords. They also modify software.
  •  Phreakers: They hack but focus only and exclusively in the telecommunication field.

Grey hackers:  It is a mix between Black and White. They are hackers with work focus on be able to cross the security levels of different companies with the main idea that, once they are inside, go to the hacked company in order to offer its service to fix the “problem”.

Script-kiddie or Lamer: Are amateurs hackers who doesn’t have enough technical abilities. However, they know which is the objective to obtain the benefit from the action.

Newbie o neofitos: As in the example before, this kind of hacker is new in the hacking Word. They are starting and they almost don’t have enough knowledge and experience.

Hackivists: This kind of hacker are motivated for religious or political reason, for mention a few of the possibilities. They work like this in order to use the action of hacking as a complaint or refusal against something or someone. If they believe that is necessary they will involve other hackers to defend the case.

How they work?

The hackers work alone or in groups. It depends on what are the objective that they are looking for.

Follow us on Twitter and LinkedIn to stay up on the latest updates and remember that you can also subscribe to our blog!

*Eric Raymond is an American computer science writer and one of the leading theorists of the highly influential open source movement in the hacking industry.