Not all hackers are bad. Yes ! There are good hackers called "white-hat hackers" which use them skills to improve system security for big firms or either computer antivirus software companies. The king of hackers that doing this just for fun are called "gray-hat hackers". And the ones that we never want to disturb, the ones malicious that mostly target your online activities or credit card are called "black-hat hackers".
In this article we present the ten most famous hackers.
1. KEVIN MITNICK
Kevin David Mitnick is an American computer security consultant, author, and convicted hacker, best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. At 12 years old, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system.
Mitnick first gained unauthorized access to a computer network in 1979, at 16 years old, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive.
He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Finally, the FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina, on federal offenses related to a two and half year period of computer hacking which included computer and wire fraud.
2. ALBERT GONZALEZ
Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007 which it's the biggest such fraud in history.
Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, ARP Spoofing) attacks which allowed him to steal computer data from internal corporate networks. During his spree, he was said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 by hand after his currency-counting machine broke. Gonzalez stayed at lavish hotels but his formal homes were modest.
Gonzalez had three federal indictments. The first was in May 2008 in New York for the Dave & Busters case (trial schedule September 2009). The second was in May 2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010). The third was in August 2009 in New Jersey in connection with the Heartland Payment case. On March 25, 2010, Gonzalez was sentenced to 20 years in federal prison.
3. MARK T. ABENE
Mark T. Abene is an American infosec expert and entrepreneur, originally from New York City. Better known by his pseudonym Phiber Optik, he was once a member of the hacker groups Legion of Doom and Masters of Deception. He was a high-profile hacker in the 1980s and early 1990s. He was one of the first hackers to openly debate and defend the positive merits of ethical hacking as a beneficial tool to industry. His expertise spreads across penetration studies, on-site security assessments, secure code reviews, security policy review and generation, systems and network architecture, systems administration and network management, among many others. His clientele includes American Express, UBS, First USA, Ernst & Young, KPMG and others.
On January 24, 1990, Abene and other MOD members had their homes searched and property seized by the U.S. Secret Service largely based on government suspicions of having caused AT&T Corporation's network crash just over a week earlier on January 15 (Abene was personally accused by the Secret Service of having done as much, during the search and seizure). In 1991, Abene was arrested and charged with computer tampering and computer trespass in the first degree, New York state offenses. Laws at the time were considered a “gray area” concerning information security. Abene, who was a minor at the time, pleaded "not guilty" to the first two offenses and ultimately accepted a plea agreement to a lesser misdemeanor charge, and was sentenced to 35 hours of community service.
4. JOHAN HELSINGIUS
Better known as Julf, came into the limelight in the 1980s when he started operating the world's most popular anonymous remailer, called penet.fi. Johan was also responsible for product development for the first Pan-European internet service provider, Eunet International. He is at present, a member of the board of Technologia Incognita, a hackerspace association in Amsterdam, and supports the communication companies worldwide with his cyber knowledge.
In 1996, he announced his remailer would shut down due to legal pressure from the Church of Scientology. Scientology officials, upset that some users of Helsingius' service were sending information about the church, obtained a court order to force him to reveal the identity of many of the site's users. When announcing the service's closure, he wrote, "I will close the remailer for the time being because the legal issues concerning the Internet in Finland are yet undefined." The American Electronic Frontier Foundation (EFF), an Internet civil rights initiative, reported continuously on the incidents concerning anon.penet.fi and collected donations to cover legal costs should Helsingius be involved in a court case to settle whether Finnish law could force him to reveal the identity of anon.penet.fi users.
5. LINUS TORVALDS
Linus Torvalds is known as one of the best hackers of all time. He rose to fame by creating Linux, the very popular Unix-based operating system. Linux is open source and thousands of developers have contributed to its Kernel. However, Torvalds remains the ultimate authority on what new code is incorporated into the standard Linux kernel. As of 2006, approximately two percent of the Linux kernel was written by Torvalds himself. He just aspires to be simple and have fun by making the world’s best operating system. Torvalds has received honorary doctorates from Stockholm University and University of Helsinki.
The first prototypes of Linux were publicly released in 1991. Torvalds first encountered the GNU Project in 1991, after another Swedish-speaking computer science student, Lars Wirzenius, took him to the University of Technology to listen to free software guru Richard Stallman's speech. Torvalds used Stallman's GNU General Public License version 2 (GPLv2) for his Linux kernel.
6. ROBERT MORRIS
Robert Tappan Morris is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet. Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act. He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinator—both with Paul Graham. He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006. He was elected to the National Academy of Engineering in 2019.
The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988, from the computer systems of the Massachusetts Institute of Technology.
7. GARY MCKINNON
Gary McKinnon is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the "biggest military computer hack of all time," although McKinnon himself states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public. On 16 October 2012, after a series of legal proceedings in Britain, Home Secretary Theresa May withdrew her extradition order to the United States.
McKinnon was accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, at his girlfriend's aunt's house in London, using the name 'Solo'.
8. KEVIN POULSEN
Kevin Poulsen, also known as Dark Dante, became famous for his notoriety when he took over all the telephone lines of Los Angeles radio station KIIS-FM. Kevin Lee Poulsen is also a former black-hat hacker and a contributing editor at The Daily Beast. When the Federal Bureau of Investigation started pursuing Poulsen, he went underground as a fugitive. A storage company cleared out a storage shed in Poulsen's name due to nonpayment of rent, where computer equipment was discovered which was furnished to the FBI for evidence. When he was featured on NBC's Unsolved Mysteries, the show's 1-800 telephone lines mysteriously crashed.] Poulsen was arrested in April 1991 following an investigation led in part by John McClurg.
In June 1994, Poulsen pleaded guilty to seven counts of conspiracy, fraud, and wiretapping. He was sentenced to five years in a federal penitentiary, as well as banned from using computers or the internet for 3 years after his release. He was the first American to be released from prison with a court sentence that banned him from using computers and the internet after his prison sentence. Although Chris Lamprecht was sentenced first with an internet ban on May 5, 1995, Poulsen was released from prison before Lamprecht and began serving his ban sentence earlier.
9.\ JULIAN ASSANGE
Julian Paul Assange is an Australian editor, publisher and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by Chelsea Manning. These leaks included the Collateral Murder video (April 2010), the Afghanistan war logs (July 2010), the Iraq war logs (October 2010), and CableGate (November 2010). After the 2010 leaks, the United States government launched a criminal investigation into WikiLeaks.
In 1987, aged 16, Assange began hacking under the name Mendax. He and two others—known as "Trax" and "Prime Suspect" formed a hacking group they called "the International Subversives" He is thought to have been involved in the WANK (Worms Against Nuclear Killers) hack at NASA in 1989, but he does not acknowledge this. In September 1991, Assange was discovered hacking into the Melbourne master terminal of Nortel, a Canadian multinational telecommunications corporation.
The Australian Federal Police tapped Assange's phone line (he was using a modem), raided his home at the end of October and eventually charged him in 1994 with 31 counts of hacking and related crimes. In December 1996, he pleaded guilty to 24 charges (the others were dropped) and was ordered to pay reparations of A$2,100 and released on a good behaviour bond.
10. ADRIAN LAMO
Adrián Alfonso Lamo was an American threat analyst and hacker. Lamo first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo!, and Microsoft, culminating in his 2003 arrest. Lamo was best known for reporting U.S. soldier Chelsea Manning to Army criminal investigators in 2010 for leaking hundreds of thousands of sensitive U.S. government documents to WikiLeaks.
Lamo was a white hat hacker who viewed the rise of the world wide web with a mixture of excitement and alarm. He felt that others failed to see the importance of internet security in the early days of the world wide web. Lamo would break into corporate computer systems, but he never caused damage to the systems involved. Instead, he would offer to fix the security flaws free of charge, and if the flaw wasn't fixed, he would alert the media. Lamo hoped to be hired by a corporation to attempt to break in systems and test their security, a practice known as red teaming. However, by the time this practice was common, his felony conviction prevented him from being hired.