Microsoft Excel: Hackers exploit a feature and attack!

Microsoft Excel: Hackers exploit a feature and attack!

Microsoft Excel is one of the most used programs. This makes it an attractive target for hackers. In fact, he found ...
Read More

Telegram: Phone numbers have been overwhelmed through the messaging app

Recently, hackers have acquired 15 mobile phone numbers from millions of users from Iran. The tapping was done through app ...
Read More

McAfee: Mounted former employees for leaking data to an opponent

McAfee has sued three of her former employees, who, as they say, have stolen commercial secrets from the company to transport them ...
Read More

Six people were arrested by Europol for Bitcoin theft

According to a press release released on June 25, Europol in partnership with South West Regional Cyber ​​...
Read More

Why can not I remove Windows 7? But why should it?

As we have mentioned several times in the past, Microsoft is particularly concerned about the world's love for Windows ...
Read More
Latest Posts

5 most famous hackers around the world!


How Mindful Is The Madness From The Genius? The following online crime stars have managed to combine both of them and "open up" roads to the hackers of the future.

The FBI hated them, but he loved them as well. Depending on whether they were willing to cooperate. The following five internet criminals are the ones who acted when the water of the internet was still uncharted and the way to be captured, more than difficult.

The article closes with the different story of prematurely delinquent Aaron Swartz.

Ultimately, prison bars are also for internet leavers, even though they have been able to remain digital "phantoms" for years.
Robert Tappan Morris: The Proponent

He is with his sword at Top 5 of Digital Illegal. This hacker was great in the 80, when the internet was still in its infancy. He was a son of a former NSA employee and became famous because he created the notorious Morris worm. The first worm that has been distributed over the internet. He is also the first digital fraudster to prosecute 1986 in the US.


When arrested he said he created his malicious software when he was studying at Cornell University because he wanted to check how safe the internet was then. Not at all. Nevertheless, he was accountable without the hotelier. That is, the worm itself. He was able to reproduce himself uncontrollably infecting thousands of computers.

The US authorities have been reporting over time that 6.000 systems have been infected. Morris was finally sentenced to suspended 3 for years, attended 400 hours of voluntary work and paid a fine of $ 10.500. He then became a professor at the MIT Computer Science and Artificial Intelligence Laboratory with a specialty in Network Architecture. Not bad at all.

* Worm = "Computer worm": It is a self-replicating and malicious computer program that uses a computer network to send copies of itself to other nodes (network computers) and can do so without user intervention. This is due to security vulnerabilities on the destination computer.

Many times the worm is confused with the virus because they have many similarities in their operation. Nevertheless, there are some important differences in how they are transmitted and in the area of ​​the system they are going to attack, which makes them stand out.

Unlike a computer virus, a worm does not need to be connected to an existing program. Worms almost always cause at least some damage to the network, even with bandwidth consumption, while viruses almost always corrupt or modify files on a destination computer, leaving the network harmless.

Kevin Mitnick: The "Star"

His youth was Los Angeles nightmare and companies such as Motorola, Nokia, Sun Microsystems Fujitsu Siemens, and the FBI itself.

1963 was born and is the first to break the computing system into history. He was arrested for the first time in his 17 and spent 6 months in jail in the highest security wing.

Growing up managed to invade many telecommunication networks and steal data from them. It began with Amateur Radio, which later led him to phreaking the telephone network, hacking and intercepting telephone devices.

His phreaking abilities helped him to be able to apply them to the computers that at the end of the 70 era were vulnerable from everywhere. 1987 came and the first capture of Mickick for a computer invasion. He was released and a year later he was accused of invading a Digital Equipment Corporation stealing source code system.

His sentence was a year of imprisonment. He was released and continued to be a hacker by constantly changing his place of residence in the US. 1995, with the assistance of Tsutomu Shimomura, computer security technician, and Times John Markoff reporter, Kevin Mickik was arrested and sentenced to 5 years in prison. When released 2000 forbade him to use keypad devices for years.

He has written 2 books on his career and has founded his own network of security networks (Mitnick Security Consulting).

Mitnick is considered to be the most beloved hacker in history as he found many supporters and in favor of the "Free Kevin" campaign.

It is worth noting that he remained imprisoned for five years without trial. This is the case with the longest pre-trial period in US history.

Released on 21 January of 2000. The Lombok federal press spokesman announced that at 7.30 this morning Mitnick crossed the gate and left immediately with his family without talking to the reporter. The media have already begun speculation and conspiracy theories. Others want him to be involved in secret services, others to remain unrepentant hackers and others to become a new digital hero.

Mitnick's proven criminal offenses include the invasion of the DEC systems, Motorola, NEC, Nokia, Sun, and Fujitsu Siemens, a year-long imprisonment for 1989. He also acquired administrator rights at the IBM Computer Minicomputer of the Los Angeles Academy of Computer Sciences, exclusively to win a bet. It is worth noting that Mitnik was not the classic hacker, as the master of social engineering, as he basically managed to extract useful information directly from the right people.

He has - admittedly - admitted that:

-Use Los Angeles Ticket Systems for not paying a ticket

-Looked DEC systems to see the source code of the VMS, which cost DEC 160000 dollars

-We received full management rights on an IBM minicomputer to win a bet.

-Looked on the systems of Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens

Adrian Lamo: The "traitor"

He was born on February 20 of 1981 and belongs to the "new generation".

Victims of Microsoft and the New York Times. He became known as the "homeless hacker" since they could not find him with anything. Why; He used to use public internet connections in cafes and an internet cafe.

As he once said, "I have a laptop in Pittsburgh and a change of clothes in DC. This re-defines in some way the phrase" multijurisdictional ".

His "burglary" in the New York Times, however, was revealed and, in addition to restrictive measures, he was penalized with the 65.000 dollar penalty payment as compensation. He was delivered by himself in early 2003 in September following a Times complaint. He was involved in Wikileaks * revelations.

The black element in his story, which is being condemned by internet users, is that he has become a "whistleblower" by providing information to the court for WikiLeaks informer Bradley Manning.

Today Lamo works as a renowned journalist and public speaker.

Gary McKinnon: The Intelligent Autistic Hacker

Scotsman hacker, born 1966. He made his name under the code name "Solo". He was accused of the biggest violation of all time in US military computing systems for 13 consecutive months from 2001 and 2002.

McKinnon entered the US server and deleted important records, "disposing" 2.000 computers to military bases and NASA, the US Army, the Navy, the Air Force, the Pentagon, and some educational institutions. Each time he clicked, they left the message "Your security is sh @ t".

The extraordinary element, beyond his tremendous potential and talent, is that the hacker has been diagnosed with the "Asperger" syndrome. What was his motivation to enter computers? He was trying to find evidence of an unknown activity of flying objects and extraterrestrial technologies. He flashed photographs, films and other evidence of alien spacecraft, secretly held by various US agencies, space fleets, secret programs, and encoded names lists.

NASA sucks McKinnon but Britain refuses to issue it to the United States.

In statements he has said he was looking for evidence of the existence of anti-gravity technology and "zero point energy" that the American services have believed and hide it from the public. He also believed that this technology could lead to free energy, thus solving all the energy problems of the world.

McKinnon has been one of 15's years as a member of the UFO Research UFO research organization BUFORA (British UFO Research Association). The most prominent discovery was made at the beginning of 2002 when he had invaded the computers of the Johnson Space Center 8 building. Then he found a NASA photo showing a cigar-shaped UFO with formations that resembled geodesic domes on all sides.

As he took the picture with his slow connection, he was perceived by NASA system administrators. The connection was interrupted before the photo was completed, and so there is no proof at all. In addition to hidden advanced technology, McKinnon was also looking for evidence of a possible US involvement in 11's terrorist acts in September. He admitted, however, that he found no evidence to support such a proposal.

In Britain, he was arrested in March of 2002. After he was arrested, he had to appear daily at the police station and was banned from using a computer with an Internet connection. In the accusations against him, he was sentenced to 6 months imprisonment in the worst case or forced social work under British law. However, in November of 2002, the US Department of Justice intervened in the case, demanding its extradition to America, due to the damage it caused to government service computers. The strange and suspicious is that the procedures for its release in the US did not begin until three years later, 2005. So far, it has not been clear why the American authorities have been so slow. The case of his extradition is pending, with pressures from the US side for its extradition to continue. Under US law, if issued, he is in danger of being tried as a terrorist by facing a prison sentence that can reach 70 years, a fine over 1.000.000 dollars, and even imprisonment in Guantánamo.

To support it, has also been created

Raphael Gray: The "Saint"

And he is a member of the new hacker generation since 1982 was born. He began his action at the age of 19 years, and since then he called himself "Holy."

According to him he broke databases trying as he has said to help ecommerce sites. With his action he broke the online store databases by stealing credit card numbers and personal data from about 26.000 Americans, British and Canadians, 2000.

As he said, he wanted to draw attention to gaps in security systems, but nobody understood why he made public the credit card numbers.

2001 was arrested and sentenced to three years of psychiatric treatment. Using one of the credit cards he had stolen, he bought and sent violently pills to .... Bill Gates. Abyssus the soul of man. Among other things, a legendary fan of legend, Kevin Mitnick (see above), has also said.

And for the end, Aaron Swartz

The case of Aaron Swartz is different and completely unique. He was a charismatic hacker and digital rights activist while he committed suicide in his New York apartment, just 26 years old, in January of 2013.

At 14, he was one of the Rich Site Summary creators.


He later committed himself to the belief that information should be freely distributed on the Internet, while saying that "information is power. But as in every power, there are those who want to keep them for themselves. "

In a manifesto published by 2008, he wrote that "the entire scientific and cultural heritage that has been published over the centuries in books and magazines is transformed into digitized material and held in the hands of some private companies. Sharing information is not unethical, but it is an imperative. Only those who are blinded by greed will deny a friend a copy. "

In July, 2011 was arrested by the federal authorities in the United States with charges that he stole millions of academic texts and books from the MIT digital record. During the trial, he had declared innocent, and was facing 35 years of imprisonment and a fine of 1 of a million dollars if convicted.

Swartz had stated several times that he was suffering from depression, and had reported that many moments in his life had thought about the possibility of suicide.


Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *