White hat (computer security): Difference between revisions
imported>Tea2min Undid revision 1292286511 by Indycr (talk) |
imported>Ykhwong mNo edit summary |
||
| Line 5: | Line 5: | ||
White-hat hackers may also work in teams called "[[hacker (computer security)|sneakers and/or hacker clubs]]",<ref name= Secpoint>{{cite web |url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |access-date=2012-06-06 |archive-date=2019-05-02 |archive-url=https://web.archive.org/web/20190502061110/https://www.secpoint.com/what-is-a-white-hat.html |url-status=live }}</ref> [[red team]]s, or [[tiger team]]s.<ref name="Palmer">{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769|access-date=2014-07-19|archive-date=2019-05-02|archive-url=https://web.archive.org/web/20190502061107/http://pdf.textfiles.com/security/palmer.pdf|url-status=live}}</ref> | White-hat hackers may also work in teams called "[[hacker (computer security)|sneakers and/or hacker clubs]]",<ref name= Secpoint>{{cite web |url=http://www.secpoint.com/What-is-a-White-Hat.html |title=What is a White Hat? |publisher=Secpoint.com |date=2012-03-20 |access-date=2012-06-06 |archive-date=2019-05-02 |archive-url=https://web.archive.org/web/20190502061110/https://www.secpoint.com/what-is-a-white-hat.html |url-status=live }}</ref> [[red team]]s, or [[tiger team]]s.<ref name="Palmer">{{cite journal|last=Palmer|first=C.C.|title=Ethical Hacking|journal=IBM Systems Journal|year=2001|volume=40|issue=3|page=769|url=http://pdf.textfiles.com/security/palmer.pdf|doi=10.1147/sj.403.0769|access-date=2014-07-19|archive-date=2019-05-02|archive-url=https://web.archive.org/web/20190502061107/http://pdf.textfiles.com/security/palmer.pdf|url-status=live}}</ref> | ||
==History== | == History == | ||
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the [[United States Air Force]], in which the [[Multics]] operating systems were tested for "potential use as a two-level (secret/top secret) system." The evaluation determined that while Multics was "significantly better than other conventional systems," it also had "... [[vulnerabilities]] in hardware security, [[software security]] and procedural security" that could be uncovered with "a relatively low level of effort."<ref>{{cite report |author=Paul A. Karger |author2=Roger R. Scherr |date=June 1974 |title=MULTICS SECURITY EVALUATION: VULNERABILITY ANALYSIS |url=https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf |access-date=12 Nov 2017 |archive-date=13 November 2017 |archive-url=https://web.archive.org/web/20171113060242/https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf |url-status=live }}</ref> The authors performed their tests under a guideline of realism, so their results would accurately represent the kinds of access an intruder could potentially achieve. They performed tests involving simple information-gathering exercises, as well as outright attacks upon the system that might damage its integrity; both results were of interest to the target audience. There are several other now unclassified reports describing ethical hacking activities within the [[United States Armed Forces|US military]]. | One of the first instances of an ethical hack being used was a "security evaluation" conducted by the [[United States Air Force]], in which the [[Multics]] operating systems were tested for "potential use as a two-level (secret/top secret) system." The evaluation determined that while Multics was "significantly better than other conventional systems," it also had "... [[vulnerabilities]] in hardware security, [[software security]] and procedural security" that could be uncovered with "a relatively low level of effort."<ref>{{cite report |author=Paul A. Karger |author2=Roger R. Scherr |date=June 1974 |title=MULTICS SECURITY EVALUATION: VULNERABILITY ANALYSIS |url=https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf |access-date=12 Nov 2017 |archive-date=13 November 2017 |archive-url=https://web.archive.org/web/20171113060242/https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf |url-status=live }}</ref> The authors performed their tests under a guideline of realism, so their results would accurately represent the kinds of access an intruder could potentially achieve. They performed tests involving simple information-gathering exercises, as well as outright attacks upon the system that might damage its integrity; both results were of interest to the target audience. There are several other now unclassified reports describing ethical hacking activities within the [[United States Armed Forces|US military]]. | ||
| Line 14: | Line 14: | ||
The idea to bring this tactic of ethical hacking to assess the security of systems and point out vulnerabilities was formulated by [[Dan Farmer]] and [[Wietse Venema]]. To raise the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.<ref name= Palmer /> | The idea to bring this tactic of ethical hacking to assess the security of systems and point out vulnerabilities was formulated by [[Dan Farmer]] and [[Wietse Venema]]. To raise the overall level of security on the [[Internet]] and [[intranets]], they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program called [[Security Administrator Tool for Analyzing Networks]], or SATAN, was met with a great amount of media attention around the world in 1992.<ref name= Palmer /> | ||
==Tactics== | == Tactics == | ||
While [[penetration testing]] concentrates on attacking software and computer systems from the start – scanning ports, examining known defects in protocols and applications running on the system, and patch installations, for example – ethical hacking may include other things. A full-scale ethical hack might include emailing staff to ask for password details, rummaging through executive dustbins, usually without the knowledge and consent of the targets. Only the owners, CEOs, and Board Members (stakeholders) who asked for such a security review of this magnitude are aware. To try and replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.<ref>{{cite book|title=Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters|author=Justin Seitz, Tim Arnold|url=https://python.engineering/black-hat-python/|date=April 14, 2021|publisher=No Starch Press|isbn=978-1-7185-0112-6|access-date=August 30, 2021|archive-date=August 26, 2021|archive-url=https://web.archive.org/web/20210826111249/https://python.engineering/black-hat-python/|url-status=live}}</ref> In most recent cases these hacks perpetuate for the long-term con (days, if not weeks, of long-term human infiltration into an organization). Some examples include leaving [[USB]]/flash key drives with hidden auto-start software in a public area as if someone lost the small drive and an unsuspecting employee found it and took it. | While [[penetration testing]] concentrates on attacking software and computer systems from the start – scanning ports, examining known defects in protocols and applications running on the system, and patch installations, for example – ethical hacking may include other things. A full-scale ethical hack might include emailing staff to ask for password details, rummaging through executive dustbins, usually without the knowledge and consent of the targets. Only the owners, CEOs, and Board Members (stakeholders) who asked for such a security review of this magnitude are aware. To try and replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.<ref>{{cite book|title=Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters|author=Justin Seitz, Tim Arnold|url=https://python.engineering/black-hat-python/|date=April 14, 2021|publisher=No Starch Press|isbn=978-1-7185-0112-6|access-date=August 30, 2021|archive-date=August 26, 2021|archive-url=https://web.archive.org/web/20210826111249/https://python.engineering/black-hat-python/|url-status=live}}</ref> In most recent cases these hacks perpetuate for the long-term con (days, if not weeks, of long-term human infiltration into an organization). Some examples include leaving [[USB]]/flash key drives with hidden auto-start software in a public area as if someone lost the small drive and an unsuspecting employee found it and took it. | ||
| Line 37: | Line 37: | ||
The methods identified [[Exploit (computer security)|exploit]] known security [[Vulnerability (computing)|vulnerabilities]] and attempt to evade security to gain entry into secured areas. They can do this by hiding software and system 'back-doors' that can be used as a link to information or access that a non-ethical hacker, also known as 'black hat' or 'grey hat', may want to reach. | The methods identified [[Exploit (computer security)|exploit]] known security [[Vulnerability (computing)|vulnerabilities]] and attempt to evade security to gain entry into secured areas. They can do this by hiding software and system 'back-doors' that can be used as a link to information or access that a non-ethical hacker, also known as 'black hat' or 'grey hat', may want to reach. | ||
==Legality== | == Legality == | ||
===Belgium=== | === Belgium === | ||
Belgium legalized white hat hacking in February 2023.<ref>{{cite web |last1=Drechsler |first1=Charlotte Somers, Koen Vranckaert, Laura |title=Belgium legalises ethical hacking: a threat or an opportunity for cybersecurity? |url=https://www.law.kuleuven.be/citip/blog/belgium-legalises-ethical-hacking-a-threat-or-an-opportunity-for-cybersecurity/ |website=CITIP blog |access-date=7 May 2023 |date=3 May 2023 |archive-date=17 May 2023 |archive-url=https://web.archive.org/web/20230517194250/https://www.law.kuleuven.be/citip/blog/belgium-legalises-ethical-hacking-a-threat-or-an-opportunity-for-cybersecurity/ |url-status=live }}</ref> | Belgium legalized white hat hacking in February 2023.<ref>{{cite web |last1=Drechsler |first1=Charlotte Somers, Koen Vranckaert, Laura |title=Belgium legalises ethical hacking: a threat or an opportunity for cybersecurity? |url=https://www.law.kuleuven.be/citip/blog/belgium-legalises-ethical-hacking-a-threat-or-an-opportunity-for-cybersecurity/ |website=CITIP blog |access-date=7 May 2023 |date=3 May 2023 |archive-date=17 May 2023 |archive-url=https://web.archive.org/web/20230517194250/https://www.law.kuleuven.be/citip/blog/belgium-legalises-ethical-hacking-a-threat-or-an-opportunity-for-cybersecurity/ |url-status=live }}</ref> | ||
| Line 44: | Line 44: | ||
In July 2021, the [[Government of China|Chinese government]] moved from a system of voluntary reporting to one of legally mandating that all white hat hackers first report any vulnerabilities to the government before taking any further steps to address the vulnerability or make it known to the public.<ref name=":0">{{Cite news |last=Brar |first=Aadil |date=18 January 2024 |title=China Raises Private Hacker Army To Probe Foreign Governments |url=https://www.newsweek.com/china-hackers-probe-foreign-governments-computers-online-cybersecurity-1861721 |access-date=20 January 2024 |work=[[Newsweek]] |archive-date=20 January 2024 |archive-url=https://web.archive.org/web/20240120053025/https://www.newsweek.com/china-hackers-probe-foreign-governments-computers-online-cybersecurity-1861721 |url-status=live }}</ref> Commentators described the change as creating a "dual purpose" in which white hat activity also serves the country's intelligence agencies.<ref name=":0" /> | In July 2021, the [[Government of China|Chinese government]] moved from a system of voluntary reporting to one of legally mandating that all white hat hackers first report any vulnerabilities to the government before taking any further steps to address the vulnerability or make it known to the public.<ref name=":0">{{Cite news |last=Brar |first=Aadil |date=18 January 2024 |title=China Raises Private Hacker Army To Probe Foreign Governments |url=https://www.newsweek.com/china-hackers-probe-foreign-governments-computers-online-cybersecurity-1861721 |access-date=20 January 2024 |work=[[Newsweek]] |archive-date=20 January 2024 |archive-url=https://web.archive.org/web/20240120053025/https://www.newsweek.com/china-hackers-probe-foreign-governments-computers-online-cybersecurity-1861721 |url-status=live }}</ref> Commentators described the change as creating a "dual purpose" in which white hat activity also serves the country's intelligence agencies.<ref name=":0" /> | ||
===United Kingdom=== | === United Kingdom === | ||
Struan Robertson, legal director at Pinsent Masons LLP, and editor of [[OUT-LAW|OUT-LAW.com]] says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offense under the [[Computer Misuse Act]]. The unauthorized access offense covers everything from guessing the password to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe."<ref name=Knight /> | Struan Robertson, legal director at Pinsent Masons LLP, and editor of [[OUT-LAW|OUT-LAW.com]] says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offense under the [[Computer Misuse Act]]. The unauthorized access offense covers everything from guessing the password to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe."<ref name=Knight /> | ||
==Employment== | == Employment == | ||
{{Globalize|article|USA|2name=the United States|date=June 2011}} | {{Globalize|article|USA|2name=the United States|date=June 2011}} | ||
The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.<ref name=Secpoint /> When the agency recruited at [[DEF CON]] in 2020, it promised applicants that "If you have a few, shall we say, ''indiscretions'' in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".<ref>{{Cite web |url=http://www.nsa.gov/careers/dc20 |title=Attention DEF CON® 20 attendees |year=2012 |publisher=National Security Agency |archive-url=https://web.archive.org/web/20120730224626/http://www.nsa.gov/careers/dc20 |archive-date=2012-07-30}}</ref> | The United States [[National Security Agency]] offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.<ref name=Secpoint /> When the agency recruited at [[DEF CON]] in 2020, it promised applicants that "If you have a few, shall we say, ''indiscretions'' in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".<ref>{{Cite web |url=http://www.nsa.gov/careers/dc20 |title=Attention DEF CON® 20 attendees |year=2012 |publisher=National Security Agency |archive-url=https://web.archive.org/web/20120730224626/http://www.nsa.gov/careers/dc20 |archive-date=2012-07-30}}</ref> | ||
| Line 55: | Line 55: | ||
Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve [[Social engineering (security)|social engineering]], mobile tech, and [[social networking]].<ref>{{Cite journal |last=Caldwell |first=Tracey |date=2011-07-01 |title=Ethical hackers: putting on the white hat |url=https://www.sciencedirect.com/science/article/pii/S1353485811700757 |journal=Network Security |volume=2011 |issue=7 |pages=10–13 |doi=10.1016/S1353-4858(11)70075-7 |issn=1353-4858|url-access=subscription }}</ref> | Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve [[Social engineering (security)|social engineering]], mobile tech, and [[social networking]].<ref>{{Cite journal |last=Caldwell |first=Tracey |date=2011-07-01 |title=Ethical hackers: putting on the white hat |url=https://www.sciencedirect.com/science/article/pii/S1353485811700757 |journal=Network Security |volume=2011 |issue=7 |pages=10–13 |doi=10.1016/S1353-4858(11)70075-7 |issn=1353-4858|url-access=subscription }}</ref> | ||
==Notable people== | == Notable people == | ||
<!---♦♦♦ Only add a person to this list if they already have their own article on the English Wikipedia ♦♦♦---> | <!---♦♦♦ Only add a person to this list if they already have their own article on the English Wikipedia ♦♦♦---> | ||
<!---♦♦♦ Please keep the list in alphabetical order by LAST NAME ♦♦♦---> | <!---♦♦♦ Please keep the list in alphabetical order by LAST NAME ♦♦♦---> | ||
| Line 62: | Line 62: | ||
*[[Jennifer Arcuri]], an American technology entrepreneur founded the white hat consultancy Hacker House in 2016. | *[[Jennifer Arcuri]], an American technology entrepreneur founded the white hat consultancy Hacker House in 2016. | ||
==See also== | == See also == | ||
* [[Bug bounty program]] | * [[Bug bounty program]] | ||
* [[IT risk]] | * [[IT risk]] | ||
| Line 69: | Line 69: | ||
* [[Wireless identity theft]] | * [[Wireless identity theft]] | ||
==References== | == References == | ||
{{reflist}} | {{reflist}} | ||
{{Authority control}} | |||
{{DEFAULTSORT:White Hat (Computer Security)}} | {{DEFAULTSORT:White Hat (Computer Security)}} | ||
[[Category:White hat (computer security)| ]] | [[Category:White hat (computer security)| ]] | ||
[[Category:Hacking (computer security)]] | [[Category:Hacking (computer security)]] | ||
[[Category:Computer ethics]] | [[Category:Computer ethics]] | ||
Latest revision as of 03:36, 6 June 2025
Template:Short description Template:Computer hacking A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker.[1][2] Ethical hacking is a term meant to imply a broader category than just penetration testing.[3][4] Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has.[5] The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively.[6] There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.[7]
White-hat hackers may also work in teams called "sneakers and/or hacker clubs",[8] red teams, or tiger teams.[9]
History
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential use as a two-level (secret/top secret) system." The evaluation determined that while Multics was "significantly better than other conventional systems," it also had "... vulnerabilities in hardware security, software security and procedural security" that could be uncovered with "a relatively low level of effort."[10] The authors performed their tests under a guideline of realism, so their results would accurately represent the kinds of access an intruder could potentially achieve. They performed tests involving simple information-gathering exercises, as well as outright attacks upon the system that might damage its integrity; both results were of interest to the target audience. There are several other now unclassified reports describing ethical hacking activities within the US military.
By 1981 The New York Times described white-hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated "The Company realizes the benefit to NCSS and encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".[11]
On October 20, 2016, the Department of Defense (DOD) announced "Hack The Pentagon."[12][13]
The idea to bring this tactic of ethical hacking to assess the security of systems and point out vulnerabilities was formulated by Dan Farmer and Wietse Venema. To raise the overall level of security on the Internet and intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program called Security Administrator Tool for Analyzing Networks, or SATAN, was met with a great amount of media attention around the world in 1992.[9]
Tactics
While penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects in protocols and applications running on the system, and patch installations, for example – ethical hacking may include other things. A full-scale ethical hack might include emailing staff to ask for password details, rummaging through executive dustbins, usually without the knowledge and consent of the targets. Only the owners, CEOs, and Board Members (stakeholders) who asked for such a security review of this magnitude are aware. To try and replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.[14] In most recent cases these hacks perpetuate for the long-term con (days, if not weeks, of long-term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area as if someone lost the small drive and an unsuspecting employee found it and took it.
Some other methods of carrying out these include:
- Disk and memory forensics
- DoS attacks
- Frameworks such as:
- Network Security
- Reverse engineering
- Security scanners such as:
- Social engineering tactics such as:
- Phishing
- Pretexting
- Training Platforms
- Vulnerability research
The methods identified exploit known security vulnerabilities and attempt to evade security to gain entry into secured areas. They can do this by hiding software and system 'back-doors' that can be used as a link to information or access that a non-ethical hacker, also known as 'black hat' or 'grey hat', may want to reach.
Legality
Belgium
Belgium legalized white hat hacking in February 2023.[15]
China
In July 2021, the Chinese government moved from a system of voluntary reporting to one of legally mandating that all white hat hackers first report any vulnerabilities to the government before taking any further steps to address the vulnerability or make it known to the public.[16] Commentators described the change as creating a "dual purpose" in which white hat activity also serves the country's intelligence agencies.[16]
United Kingdom
Struan Robertson, legal director at Pinsent Masons LLP, and editor of OUT-LAW.com says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offense under the Computer Misuse Act. The unauthorized access offense covers everything from guessing the password to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe."[4]
Employment
Script error: No such module "Unsubst". The United States National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.[8] When the agency recruited at DEF CON in 2020, it promised applicants that "If you have a few, shall we say, indiscretions in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".[17]
A good "white hat" is a competitive skillful employee for an enterprise since they can be a countermeasure to find the bugs to protect the enterprise network environment. Therefore, a good "white hat" could bring unexpected benefits in reducing the risk across systems, applications, and endpoints for an enterprise.[18]
Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve social engineering, mobile tech, and social networking.[19]
Notable people
- Jim Browning, alias of a Northern Ireland white hat hacker, scam baiter, and journalist, with investigations published on YouTube and on BBC programmes such as Panorama and Scam Interceptors
- Charlie Miller, an American white hat hacker previously employed by the National Security Agency and Uber who has, amongst other exploits, published successful hacks into the vulnerabilities of the computer on a 2014 Jeep Cherokee along with Chris Valasek, being able to take control of acceleration, braking, and steering
- Jennifer Arcuri, an American technology entrepreneur founded the white hat consultancy Hacker House in 2016.
See also
References
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "Citation/CS1".
- ↑ Script error: No such module "Citation/CS1".
- ↑ a b Script error: No such module "Citation/CS1".
- ↑ Script error: No such module "Citation/CS1".
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "citation/CS1".
- ↑ a b Script error: No such module "citation/CS1".
- ↑ a b Script error: No such module "Citation/CS1".
- ↑ Template:Cite report
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "citation/CS1".Template:Dead linkTemplate:Cbignore
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "citation/CS1".
- ↑ a b Script error: No such module "citation/CS1".
- ↑ Script error: No such module "citation/CS1".
- ↑ Script error: No such module "Citation/CS1".
- ↑ Script error: No such module "Citation/CS1".