Hackers: those strangers working in the shadows, the subject of many stereotypes, who have managed to organize themselves and convert their malicious activities into a real business. A business that is increasingly profitable and a rising threat to industries. But exactly who are these mysterious people in the shadows? How do they work? Sentryo has sought out answers and compiled its findings on hacker profiles in an infographic that you can check out right here.
Infographic: Hacker profiles according to activity
As you can see from this infographic, there are currently three major types of hackers: white hat, grey hat and black hat. Yes, you got it. Black and white are the Manichaean symbols for good and evil. White hats go in search of errors and vulnerabilities in programs to better secure them by creating anti-viruses, firewalls or other protections, for example. Black hats, on the other hand, will also go in search of errors but with intentions of attacking an organization, company or industry in order to achieve a range of nefarious goals including obtaining data that can be converted into cash on the black market or demanding a ransom in exchange for stopping the attack.
Grey hats have a much less Manichaean profile. They test limits and seek to penetrate the system but all in the name of money. They won’t necessarily attack an entity to bring them down but rather to gain compensation. Companies such as Facebook offer generous compensation to hackers who alert them about bugs in their own application.
Of course, among these three major categories, each cyber attacker will have their own personal way of working. Some will attack SIM cards or create illegal copies of programs while others will focus on hacking into a network. Each one has their own set of skills!
These areas of specialty can really pay off for those who decide to become black hats, like we’ve explained in our article on the business of cybercrime.
Did you like this infographic? Why not share it on social networks?