Should we fear hackers? Intention is at the heart of this discussion.
It’s kind of interesting because hacking is a skill that could be used for criminal purposes or legitimate purposes and so even though in the past I was hacking for the curiosity and the thrill to get a bite of the forbidden fruit of knowledge I’m now working in the security field as a public speaker.
I think it goes back to my high school days. In computer class the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead I wrote a program that would steal passwords of students. My teacher gave me an A.
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100% we’ve always found a hole.
Hackers are breaking the systems for profit. Before it was about intellectual curiosity and pursuit of knowledge and thrill and now hacking is big business.
As a young boy I was taught in high school that hacking was cool.
Are hackers a threat? The degree of threat presented by any conduct whether legal or illegal depends on the actions and intent of the individual and the harm they cause.
I was pretty much the government’s poster boy for what I had done.
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved despite the government’s false claims.
No way no how did I break into NORAD. That’s a complete myth. And I never attempted to access anything considered to be classified government systems.
I get hired to hack into computers now and sometimes it’s actually easier than it was years ago.
It was used for decades to describe talented computer enthusiasts people whose skill at using computers to solve technical problems and puzzles was – and is – respected and admired by others possessing similar technical skills.
Steve Wozniak and Steve Jobs founded Apple Inc which set the computing world on its ear with the Macintosh in 1984.
A company can spend hundreds of thousands of dollars on firewalls intrusion detection systems and encryption and other security technologies but if an attacker can call one trusted person within the company and that person complies and if the attacker gets in then all that money spent on technology is essentially wasted.
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on despite all the trouble I was getting into because I was hooked.
Some people think technology has the answers.