Hackers have earned themselves a bad reputation. They are infamously known to gain unauthorized access to systems and networks to commit crimes. But there are those hackers who have helped shape our cybersecurity landscapes forever. They are brilliant minds who have donned both black hats and white hats and explored methods to improve defensive capabilities. Here’s a look at four of the best and most famous hackers.
1. Kevin Mitnick
The US Department of Justice referred to him as the “most wanted computer criminal in US history.” He went on a hacking spree that involved breaching over 40 major corporations.
Today, Mitnick is a high-profile security consultant considered the world’s authority on social engineering, security awareness training, and hacking. He is a best-selling author, and his books are a mandatory read for all security professionals.
2. George Francis Hotz
Hotz, a.k.a. GeoHot, is an American software engineer and security hacker. He is known as the first person ever to unlock the SIM lock on an iPhone. He has successfully breached and reverse engineered PlayStation 3, so players could run their code on locked hardware.
Since his fraudulent activities, he has made a meaningful comeback working for Facebook and then Google, and then with a startup called Vicarious. Today he is the President of Comma.ai.
3. Barnaby Michael Douglas Jack
Barnaby Jack was a New Zealand programmer and hacker. He is best known for his presentation at a 2010 Black Hat computer security conference where he exploited how ATMs could be forced to dispense currency. He was also infamously known to have been able to hack into medical devices like pacemakers.
Barnaby Jack was considered one of the best computer security professionals and a leader in the financial and medical security fields. A 2012 testimony led to the US Food and Drug Administration (FDA) changing wireless medical device regulations. According to Trey Ford, General Manager of Black Hat, the life and work of Jack were both “legendary and irreplaceable.”
4. Peiter C. Zatko
Peiter was better known as Mudge. He was the most well-known member of L0pht – a collective hacker group. In 1998, Mudge and other members of the L0pht warned a Senate committee that computer hardware, software, and networks that linked computers were not safe. They said the Internet was not the place to be for computer security. Sadly, nobody heeded their warnings. After the first significant internet attacks, he was invited to meet with President Bill Clinton at a security summit. He is one of the first hackers to reach out to the government and industry to help create safer and better cybersecurity. Today, he works as the Head of Security at Twitter.
Subscribe to our Newsletters

Stay up to date with our latest news
more news

ESET HOME Security : une protection consommateurs renforcée contre les escroqueries avancées
by ESET I 4:10 pm, 21st October
ESET, un leader mondial en solutions de cybersécurité, annonce la mise à niveau d’ESET HOME Security (ESET HOME Security), son offre grand public, et d’ESET Small Business Security (ESET Small Business Security), son offre pour les petites entreprises et les bureaux à domicile (SOHO). Cette mise à niveau introduit de nouvelles fonctionnalités, dont la Suppression des ransomwares, ainsi que des améliorations à des fonctionnalités existantes, comme la surveillance microphone et l'Inspecteur de sécurité de sites web. Ce lancement souligne aussi le rôle essentiel du VPN dans la cybersécurité. Pour cela, ESET a mis ESET VPN à la disposition des utilisateurs d'ESET HOME Security Ultimate et d'ESET HOME Security Premium.
GhostRedirector, nouveau groupe de menaces chinois, manipule Google et empoisonne les serveurs Windows – une découverte d’ESET
by ESET I 2:00 pm, 9th September
• ESET Research a découvert au moins 65 serveurs Windows compromis, d'après une analyse Internet réalisée en juin dernier.• ESET estime qu'un acteur malveillant et jusqu'alors inconnu, lié à la Chine, est probablement à l'origine de ces attaques. Il a été baptisé GhostRedirector par les chercheurs.• Les victimes se trouvent principalement aux États-Unis, au Brésil, en Thaïlande et au Vietnam.• Les victimes ne sont pas liées à un secteur spécifique, mais à divers secteurs, dont l'assurance, la santé, la vente au détail, les transports, la technologie et l'éducation.• GhostRedirector a développé Rungan, une nouvelle porte dérobée C++, capable d'exécuter des commandes sur le serveur de la victime.• GhostRedirector a aussi développé Gamshen, un module malveillant natif IIS, capable de perturber le référencement naturel (SEO - Search Engine Optimization).
load more