574:
566:. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or
593:
615:. Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around. They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. As the computer industry matured, individuals with malicious intentions (
863:. He stole from 217 American banks in total stealing $ 400 million and is alleged to have donated all the money to Africa and Palestine, though Trial documents did not mention any donations or charity activities. Despite much false information on the internet Bendelladj did not get sentenced to death, and claims saying he donated any money to charity is almost impossible to verify. The SpyEye software was also sold to other hackers and used as part of a botnet.
3903:
3913:
2068:
Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the
Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three
998:
Accused of causing 63 million dollar in damages. Primarily for his role in trafficking credit cards he obtained by hacking other hackers. Pleaded guilty to conspiracy to commit access device fraud and bank fraud, access device fraud, bank fraud, intentional damage to a protected computer, and
969:
Pleaded guilty to five counts of "unauthorised acts with intent to impair operation of or prevent/hinder access to a computer", two of "unauthorised computer access with intent to commit other offences", one of "unauthorised computer access with intent to commit other offences", and one of
2873:
650:, was sentenced to two years of probation. In May 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of
1445:
Pleaded guilty to theft and hacking offenses which fall under the
Computer Misuse Act and six charges of intentionally accessing sites containing credit card details and using this information for financial gain
1094:
Pleaded guilty to four federal charges of violating United States Code
Section 1030, Fraud and Related Activity in Connection with Computers, specifically subsections (a)(5)(A)(i), 1030 (a)(5)(B)(i) and 1030(b)
854:
Pleaded guilty to one count of conspiring to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiring to commit computer fraud and abuse, and 11 counts of computer fraud and abuse
812:
Convicted of 38 counts involving unauthorized access of business information systems and stealing over two million credit card numbers. Pleaded guilty to conspiracy to commit bank fraud.
2590:"Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $ 50 Million in Online Identity Theft and $ 9 Million Bank Fraud Conspiracy"
1474:
Admitted to cracking US and
Israeli computers, and pleaded guilty to conspiracy, wrongful infiltration of computerized material, disruption of computer use and destroying evidence
4130:
2441:
3084:
1452:
Three years of psychiatric treatment after evidence emerged that he was suffering from a mental condition which needed medical treatment rather than incarceration
3054:
3150:
2890:
2589:
1961:
3116:
537:
2547:
3360:
1851:
Intentional access of federal interest computers without authorization thereby preventing authorized access and causing a loss in excess of US$ 1,000
1336:
1157:
Pleaded guilty on August 11, 2004, to one count of intentionally causing or attempting to cause damage to a protected computer via his version of the
2495:
2837:
34:
2874:"Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft - European Commission (Fortezza mentioned as example)"
2714:
1940:
639:
3656:
1027:
On
November 20, 2012, was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization
367:
3449:
4177:
3614:
3776:
3742:
3715:
3278:
3024:
2625:
2470:
3274:
3020:
1125:
Pleaded guilty to hacking into the cell-phone account of celebrity Paris Hilton and participated in an attack on data-collection firm
61:
4108:
3692:
3195:
2416:
2235:
2141:
2035:
2006:
2449:
3711:
1857:
Three years probation and 400 hours of community service in a manner determined by the
Probation Office and approved by the Court
4172:
2056:
1488:
1423:
Eight months "open custody", by the
Montreal Youth Court, one year of probation, restricted use of the Internet and a small fine
1387:
1372:
818:
Sentenced to 27 years' imprisonment for the 2016 conviction, concurrent with sentence of 14 years for the second set of charges
3834:
3453:
257:
78:
1236:
635:
530:
2520:
30:
3094:
976:
and said to have penetrated the servers of
Department of Defense (DoD), Pentagon, NASA, NSA, other UK government websites.
2688:
2645:
470:
267:
150:
140:
1752:
15 charges including trespassing on the
University of Texas computer network, altering data at NASA and the theft of the
1072:
Three years of formal probation, 90 days of community service, restitution paid to MySpace, restrictions on computer use
38:
1480:
Six months of community service, one year of probation, a two-year suspended prison sentence and fined about US$ 18,000
177:
165:
2971:
2337:"Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information"
2336:
2108:
1534:
which caused service outages at a number of colleges and universities; victims were young males from whom he solicited
4182:
4077:
2085:
832:
Nine counts of
Illegal Computer Trespass to computers and one count of money laundering for an amount of $ 25 million
692:, 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals, and 68 months for
252:
4049:
3062:
2173:
1597:
Four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication
3211:
3164:
1793:
One year and six months suspended sentence, 300 hours of community service and psychiatric assessment and treatment
2390:
1773:
1753:
1332:
944:
890:
604:
489:
227:
3538:
3124:
2771:Суд над арестованными в США по обвинению в кибермошенничестве российскими студентами завершится в ближайшие месяцы
3370:
523:
272:
3334:
2891:"Dutch Citizen Sentenced to 12 Years in Prison for Computer Hacking Scheme that Stole and Sold Credit Card Info"
2081:
857:
739:
678:
448:
407:
377:
327:
2565:
611:
underground, criminal convictions were rare because there was an informal code of ethics that was followed by
3643:
Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
2769:
1657:
Pleaded guilty to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice
972:
Hacking attempt on the websites of Kent Police, Cambridge University and Oxford University. Former member of
4167:
1671:
1300:
1285:
1227:
1158:
1143:
187:
3480:
4078:"Two who raided computers pleading guilty—Late City Final Edition, Section 1, Page 6, Column 1, 383 words"
2853:
2818:
2722:
1898:
655:
442:
3308:
1211:
Six months detention at his parents' home plus two years probation and roughly US$ 65,000 in restitution
3160:
3117:"Blaster-B worm author sentenced to 18 months in jail - but bigger villain remains free, Sophos reports"
1801:
1080:
911:
666:
643:
3423:
2832:
1625:
31 charges of hacking and related charges. Pleaded guilty to 25 charges, the remaining 6 were dropped.
4138:
2943:
2916:
1992:
1837:
1567:
460:
402:
322:
2792:
1033:
Auernheimer was sentenced to 41 months in federal prison and ordered to pay $ 73,000 in restitution
17:
3365:
2694:
2445:
2420:
2309:
2146:
1611:
1239:) computer viruses. Charged and arrested for computer data sabotage against internet security firm
764:
Conspiracy to commit access device fraud, access device fraud, and possession of child pornography
437:
262:
172:
3871:
3457:
1386:
Spreading data into a computer network with the intention of causing damage as the creator of the
4082:
4054:
2548:"Russian Cyber-Criminal Sentenced to 27 Years in Prison for Hacking and Credit Card Fraud Scheme"
2178:
1738:
1219:
1202:
1013:
784:
Conspiring to commit computer fraud, computer fraud, and two counts of aggravated identity theft
3684:
3677:
1823:
and 2 counts of computer fraud and three counts of interstate transportation of stolen property
3393:
2362:
4124:
3908:
3688:
3652:
3648:
3618:
3191:
2231:
2031:
2002:
1998:
1762:
1632:
1257:
900:
634:. In that case, six teenagers broke into a number of high-profile computer systems, including
563:
432:
395:
362:
3785:
3751:
3244:
937:. It is estimated that with nine other people Svechinskaya had skimmed $ 3 million in total.
3810:
3398:
3282:
3028:
3021:""Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code"
2367:
2314:
2286:
2281:
1516:
1309:
20 months in federal prison, US$ 5,000 fine and 100 hours of community service upon release
886:
843:
616:
612:
412:
113:
3805:
3595:
3566:
2521:"Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm | SecurityWeek.Com"
1915:
Two weeks jail sentence, 200 hours community service, two years probation, fined US$ 2,000
3155:
2841:
1816:
1335:
of all time," although McKinnon himself states that he was merely looking for evidence of
1111:
1103:
Restitution of US$ 15,000 to the U.S. federal government for infecting military computers
987:
930:
685:
670:
192:
83:
52:
2151:
3719:
1943:
in New York and a Los Angeles bank and two counts of "making harassing telephone calls"
33:
and may never be able to satisfy particular standards for completeness. You can help by
3505:
2227:
1987:
1552:
1460:
1354:
1189:
926:
798:
727:
567:
555:
501:
332:
285:
215:
96:
73:
4161:
3838:
3641:
3534:
3240:
2496:"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft"
2259:
2255:
2113:
1787:
Trespassing on the University of Texas computer network and theft of the ZARDOZ file
1643:
1583:
1535:
1403:
1317:
875:
693:
627:
586:
582:
337:
232:
129:
3842:
3683:(November 2003 ed.). Checkmark Books, an imprint of Facts on File Inc. p.
2993:
622:
Convictions of computer crimes, or hacking, began as early as 1984 with the case of
573:
3966:
3940:
3089:
2743:
2674:
2668:
1431:
955:
756:
425:
292:
245:
100:
3962:
2749:
2592:(Press release). Washington, D.C.: U.S. Department of Justice. November 30, 2017
1862:
1361:
1357:
1174:
1041:
578:
495:
382:
119:
3778:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3744:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3188:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3249:
1699:
1635:
2,100 to ANU (to be paid in 3 months time) and a A$ 5,000 good-behaviour bond
1531:
1197:
1126:
1056:
689:
596:
551:
352:
347:
124:
2917:"Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data"
2340:
1055:
Pleaded guilty to violating California Penal Code 502(c)(8) for creating the
742:
crimes, breaching a Sexual Harm Prevention Order, conspiracy to commit fraud
3936:
3571:
3275:"Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison"
2793:"US court frees "world's sexiest computer hacker" prosecuted for bank fraud"
2027:
1894:
1193:
677:. He then sold the botnets to the highest bidder, who in turn used them for
651:
631:
559:
372:
222:
202:
107:
68:
2052:
1101:
57 months in prison, forfeit a 1993 BMW and more than US$ 58,000 in profit
1005:
Extradited from Romania and sentenced to 144 months in U.S. federal prison
947:
and was released under $ 25,000 bail. Ordered to pay $ 35,000 in damages.
929:
to attack thousands of bank accounts and opened at least five accounts in
619:) would emerge to exploit computer systems for their own personal profit.
2718:
2394:
1931:
1923:
1902:
1340:
1059:
973:
934:
659:
647:
623:
608:
466:
197:
145:
3529:
3527:
838:
Two months jail sentence before they let him go due to lack of evidence
592:
3876:
1820:
1063:
454:
342:
317:
310:
182:
4031:
Hopkins, Jack (7 May 1986). "Computer intruder gets 2 weeks in jail".
2471:"Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft"
3212:"Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments"
3120:
1906:
1249:
Released within 24 hours on bail due to being a minor (17 years old)
1240:
860:
674:
508:
357:
297:
135:
4109:"Hacker High: 10 Stories of Teenage Hackers Getting into the System"
3978:
Under the plea agreements, ... Rose ... will serve a year in prison.
1724:
One count of computer trespass and one count of computer conspiracy
1353:
On 16 October 2012, after a series of legal proceedings in Britain,
1129:
Group that exposed personal records of more than 300,000 consumers
688:
for 20 years. The next longest sentences are those of 13 years for
2745:Россиянку, подозреваемую в США в мошенничестве, отпустят под залог
1713:
Misdemeanor theft-of-service for a free-call scam to a 900 number
1575:
Six-month prison sentence and probation until the age of eighteen
1544:
Fined $ 5,000 (USD) and sentenced to six months in federal prison
1235:
Wrote the Coconut-A, Sahay-A, and Sharp-A (first virus written in
591:
572:
3994:
1663:
51 months in prison and ordered to pay US$ 56,000 in restitution
1347:
activity and other technologies potentially useful to the public
1508:
Nine months in jail and US$ 5,000 in restitution to each victim
1271:
Admitted the hacking and pleaded guilty to two felonies in 2004
684:
As of 2012, the longest sentence for computer crimes is that of
4016:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2670:
Algerijnse hacker star van amerikanen en schonk aan palestijnen
2610:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2201:
Emery, Julie (7 May 1986). "Light jail term for young hacker".
2069:
roles – computer hackers, phone phreaks, and software pirates."
1331:
Accused in 2002 of perpetrating the "biggest military computer
1277:
Sentenced to time served after spending seven months in prison
665:
In 2006, a prison term of nearly five years was handed down to
3418:
3416:
2646:"Hamza Bendelladj: Is the Algerian hacker a hero? | News"
2442:"TalkTalk hacker Elliott Gunton jailed in cryptocurrency scam"
1344:
3912:. Business; PART-D; Financial Desk. p. 2. Archived from
2417:"Three Norwich schools probed for weakness by teenage hacker"
1631:
A recorded conviction on all counts, a reparation payment of
1299:
Pleaded guilty to knowingly spreading a computer virus, the
3835:"Q&A: Mark Abene, from 'Phiber Optik' to security guru"
2854:"Feds Arrest 'Kurupt' Carding Kingpin? – Krebs on Security"
2819:
Is Department of Defense (DoD), Pentagon, NASA, NSA secure?
550:
Convicted computer criminals are people who are caught and
4142:
3309:"Kournikova virus kiddie gets 150 hours community service"
2566:"Russian Hacker Sentenced to 27 Years in Credit Card Case"
1893:
Four counts of Illegal Computer Trespass to computers at:
1765:
1,000 good-behaviour bond and 500 hours community service
3302:
3300:
3019:
Debra Wong Chang - United States Attorney (May 8, 2006).
1603:
46 months in federal prison and US$ 4,125 in restitution
1135:
11 months in a Massachusetts juvenile detention facility
3712:"Kevin Mitnick sentenced to nearly four years in prison"
3190:. Hershey, PA: Business Science Reference. p. 146.
2391:"Kevin Mitnick Sentenced to Nearly Four Years in Prison"
3235:
3233:
1166:
18 months in prison and 100 hours of community service
3679:
The Encyclopedia of High-Tech Crime and Crime-Fighting
2053:"The electronic discourse of the computer underground"
3904:"Hacker Enters Guilty Plea in Theft of Computer Data"
3245:"Court Okays Counter-Hack of eBay Hacker's Computer"
2216:
2214:
2212:
903:
plus forty years, without the possibility of parole
2339:. cybercrime.gov. December 15, 2004. Archived from
1417:Pleaded guilty to 56 charges of "mischief to data"
3676:
3640:
3144:
3142:
2690:В деле о хакерах таблоиды США нашли вторую Чэпман
4129:: CS1 maint: bot: original URL status unknown (
2833:Man jailed for attempting to compromise websites
2559:
2557:
2393:. cybercrime.gov. August 9, 1999. Archived from
4044:
4042:
3897:
3895:
3567:"Hacker sentenced, must program jail computers"
3186:Holt, Thomas J.; Schell, Bernadette H. (2011).
2972:"MySpace speaks about Samy Kamkar's sentencing"
2715:"Kristina Svechinskaya: Accused Russian Hacker"
2626:"Hacker Hamza Bendelladj sentenced to 15 years"
2310:"Record 13-Year Sentence for Hacker Max Vision"
1538:who had stopped co-operating with his requests
3539:"Solar Sunrise hacker 'Analyzer' escapes jail"
2109:"FBI'S web site socked as hackers target feds"
531:
8:
4111:. Archived from the original on 1 March 2016
2836:, Kent Police, United Kingdom, 16 May 2013.
2249:
2247:
1995:—Law and Disorder on the Electronic Frontier
1962:Timeline of computer security hacker history
1905:Truck Co. and Resources Conservation Co. (a
673:to do his bidding via giant bot networks or
3800:
3798:
3561:
3559:
3335:"Anna Kournikova virus author stands trial"
3048:
3046:
2584:
2582:
2542:
2540:
1982:
1980:
1978:
1976:
970:"unauthorised access to computer material".
3995:"Judgment in U.S. v. Robert Tappan Morris"
3085:"Teen Pleds Guilty in Blaster Worm Attack"
2135:
2133:
2131:
1685:Writing and distributing computer viruses
703:
538:
524:
43:
3866:
3864:
3862:
3860:
3151:"Hacker Lamo Sentenced To Home Detention"
3806:"Phiber Optik Goes to Prison—Issue 2.04"
3706:
3704:
3269:
3267:
1939:Unauthorized access to computers at the
3988:
3986:
3937:"Legion of Doom's "Terminus" sentenced"
3670:
3668:
2966:
2964:
2944:"iPad Hack Statement Of Responsibility"
1972:
748:3½ years of imprisonment (most recent)
721:
715:
599:, who was convicted of computer charges
51:
4122:
3993:Ronald B. Standler (August 14, 2002).
3361:"Kournikova Virus Writer Found Guilty"
1024:United States (at time of sentencing)
893:, and conspiracy to traffic narcotics
745:November 2016; August 2019; July 2024
3594:Scoblionkov, Deborah (5 April 2001).
3394:"February 7, 2000: Mafiaboy's Moment"
3307:Robert Blincoe (September 27, 2001).
2024:Hackers: Crime in the Digital Sublime
1815:Illicit use of proprietary software (
7:
3575:. Associated Press. February 6, 2002
2308:Poulsen, Kevin (February 12, 2010).
2282:"TJX Hacker Gets 20 Years in Prison"
1879:One to two years suspended sentence
18:List of convicted computer criminals
3716:United States Department of Justice
3506:"Teen hacker escapes jail sentence"
3279:United States Department of Justice
3025:United States Department of Justice
2994:"American owns up to hijacking PCs"
2363:"Crazy-Long Hacker Sentence Upheld"
880:altoid/frosty/Dread Pirate Roberts
646:. On May 1, 1984, one of the 414s,
258:forensics-focused operating systems
3902:Henry Weinstein (March 23, 1991).
3615:"Who Was Educating Your Children?"
3481:"'Bill Gates' hacker escapes jail"
3359:Joris Evers (September 28, 2001).
3333:John Leyden (September 14, 2001).
3123:. January 28, 2005. Archived from
2774:(in Russian). Information Security
2564:Perlroth, Nicole (21 April 2017).
2254:Robert Vamosi (January 27, 2006).
1303:, with the intent to cause damage
25:
4139:"CUSSE List of Convicted Hackers"
3961:Rodney Hoffman (March 31, 1991).
3935:Rodney Hoffman (March 27, 1991).
3149:George V. Hulme (July 15, 2004).
3093:. August 12, 2004. Archived from
3053:Brian Krebs (February 27, 2007).
2915:Zetter, Kim (November 20, 2012).
2256:"Cybercrime does pay; here's how"
662:. and Resources Conservation Co.
3784:. pp. 48–49. Archived from
3750:. pp. 48–49. Archived from
3718:. August 9, 1999. Archived from
2942:Zetter, Kim (January 23, 2013).
2107:Brian Blomquist (May 29, 1999).
2057:Florida International University
3617:. Antonnews.com. Archived from
3454:Federal Bureau of Investigation
2677:, édition du 22 septembre 2015.
2140:Andrew Brandt (April 2, 2001).
1502:Misdemeanor charges of hacking
815:August 2016 and September 2017
770:20 years of supervised release
679:denial-of-service (DoS) attacks
79:Hacking of consumer electronics
4033:The Seattle Post Intelligencer
3833:Elinor Mills (June 23, 2009).
3392:Tony Long (February 7, 2007).
2822:, TheHackerNews, May 14, 2011.
2448:. 26 July 2024. Archived from
2280:Zetter, Kim (March 25, 2010).
1719:35 hours of community service
636:Los Alamos National Laboratory
1:
3424:"Mafiaboy given eight months"
3281:. May 1, 2002. Archived from
2026:(November 3, 1999 ed.).
1941:Sloan-Kettering Cancer Center
1761:One-year suspended sentence:
640:Sloan-Kettering Cancer Center
3479:John Leyden (July 6, 2001).
3456:. April 2003. Archived from
2974:. TechSpot. January 31, 2007
2226:(August 23, 2005 ed.).
2082:"Interview with Chris Davis"
1884:Michael Princeton Wilkerson
1866:
1395:150 hours community service
1181:
918:
777:
178:Chaos Communication Congress
4178:Hacking (computer security)
3450:"FBI Facts and Figure 2003"
3055:"They'll Always Have Paris"
2840:September 25, 2013, at the
2086:Public Broadcasting Service
1364:order to the United States
999:aggravated identity theft.
4199:
3775:Dreyfus, Suelette (1997).
3741:Dreyfus, Suelette (1997).
3639:McWilliams, Brian (2004).
3602:. Philadelphia City Paper.
3161:United Business Media, Inc
2030:; 1 edition. p. 200.
1873:Found guilty of espionage
945:personal recognizance bond
669:, who created hundreds of
490:2600: The Hacker Quarterly
228:List of computer criminals
28:
4050:"Computer User Sentenced"
3963:"Correction Re: Terminus"
3880:. Melbourne. May 25, 2003
2174:"Computer User Sentenced"
1997:(January 1994 ed.).
1709:
1706:
1695:
823:Pascal van den Essenburg
790:57 months federal prison
718:
712:
706:
2770:
2744:
2689:
2575:– via NYTimes.com.
753:Conor Brian Fitzpatrick
709:
408:Cloud computing security
4173:Computing-related lists
3675:Michael Newton (2004).
2222:Richard Gissel (2005).
1829:One-year jail sentence
1730:One-year jail sentence
1337:free energy suppression
1066:social networking site
1062:that spread across the
982:Two years imprisonment
889:, conspiracy to commit
870:15 years jail sentence
570:) and electronic fraud.
188:Hackers on Planet Earth
2687:Козловский, Владимир.
2051:Steve Mizrach (2009).
856:He is a co-creator of
603:In the infancy of the
600:
589:
558:such as breaking into
443:Homebrew Computer Club
3722:on September 26, 2009
3596:"Who's Laughing Now?"
1388:Anna Kournikova virus
1159:Blaster computer worm
1081:Jeanson James Ancheta
912:Kristina Svechinskaya
667:Jeanson James Ancheta
644:Security Pacific Bank
595:
576:
3872:"Hack to the future"
3430:. September 13, 2001
2525:www.securityweek.com
2397:on December 19, 2011
2343:on November 30, 2011
2022:Paul Taylor (1999).
1993:The Hacker Crackdown
1949:Two years probation
1838:Robert Tappan Morris
1691:18 months in prison
1568:juvenile delinquency
461:Masters of Deception
403:Application security
35:adding missing items
3916:on October 20, 2012
3373:on January 31, 2013
3167:on January 22, 2009
3059:The Washington Post
2695:BBC Russian Service
2446:Eastern Daily Press
2421:Eastern Daily Press
1612:Julian Paul Assange
740:Computer Misuse Act
719:Sentencing date(s)
607:subculture and the
438:Chaos Computer Club
173:Black Hat Briefings
47:Part of a series on
4183:Lists of criminals
4083:The New York Times
4055:The New York Times
3285:on August 20, 2006
3218:. 16 February 2004
3127:on August 19, 2009
3000:. January 24, 2006
2224:Digital Underworld
2179:The New York Times
1739:Nahshon Even-Chaim
1572:21 September 2000
1420:12 September 2001
1392:27 September 2001
1220:Kimberley Vanvaeck
1203:The New York Times
1144:Jeffrey Lee Parson
1132:13 September 2005
1014:Andrew Auernheimer
738:Money laundering,
700:Computer criminals
601:
590:
268:Social engineering
4018:The Seattle Times
3909:Los Angeles Times
3845:on August 5, 2009
3658:978-0-596-00732-4
3537:(June 15, 2001).
3460:on March 26, 2007
3243:(April 6, 2007).
2612:The Seattle Times
2203:The Seattle Times
1999:Project Gutenberg
1953:
1952:
1876:15 February 1990
1258:Jerome Heckenkamp
1246:16 February 2004
1057:"Samy is my hero"
1030:20 November 2012
927:Zeus Trojan horse
925:Accused of using
901:life imprisonment
660:Kenworth Truck Co
613:white hat hackers
564:computer networks
548:
547:
396:Computer security
363:Keystroke logging
16:(Redirected from
4190:
4154:
4152:
4150:
4141:. Archived from
4134:
4128:
4120:
4118:
4116:
4096:
4095:
4093:
4091:
4086:. March 17, 1984
4074:
4068:
4067:
4065:
4063:
4046:
4037:
4036:
4028:
4022:
4021:
4013:
4007:
4006:
4004:
4002:
3990:
3981:
3980:
3975:
3973:
3958:
3952:
3951:
3949:
3947:
3932:
3926:
3925:
3923:
3921:
3899:
3890:
3889:
3887:
3885:
3868:
3855:
3854:
3852:
3850:
3841:. Archived from
3830:
3824:
3823:
3821:
3819:
3802:
3793:
3792:
3790:
3783:
3772:
3766:
3765:
3763:
3762:
3756:
3749:
3738:
3732:
3731:
3729:
3727:
3708:
3699:
3698:
3682:
3672:
3663:
3662:
3646:
3636:
3630:
3629:
3627:
3626:
3610:
3604:
3603:
3591:
3585:
3584:
3582:
3580:
3563:
3554:
3553:
3551:
3549:
3531:
3522:
3521:
3519:
3517:
3502:
3496:
3495:
3493:
3491:
3476:
3470:
3469:
3467:
3465:
3446:
3440:
3439:
3437:
3435:
3420:
3411:
3410:
3408:
3406:
3389:
3383:
3382:
3380:
3378:
3369:. Archived from
3356:
3350:
3349:
3347:
3345:
3330:
3324:
3323:
3321:
3319:
3304:
3295:
3294:
3292:
3290:
3271:
3262:
3261:
3259:
3257:
3237:
3228:
3227:
3225:
3223:
3208:
3202:
3201:
3183:
3177:
3176:
3174:
3172:
3163:. Archived from
3156:Information Week
3146:
3137:
3136:
3134:
3132:
3113:
3107:
3106:
3104:
3102:
3081:
3075:
3074:
3072:
3070:
3061:. Archived from
3050:
3041:
3040:
3038:
3036:
3027:. Archived from
3016:
3010:
3009:
3007:
3005:
2990:
2984:
2983:
2981:
2979:
2968:
2959:
2958:
2956:
2954:
2939:
2933:
2932:
2930:
2928:
2912:
2906:
2905:
2903:
2902:
2887:
2881:
2880:
2878:
2870:
2864:
2863:
2861:
2860:
2850:
2844:
2829:
2823:
2815:
2809:
2808:
2806:
2804:
2789:
2783:
2782:
2780:
2779:
2766:
2760:
2759:
2757:
2756:
2740:
2734:
2733:
2731:
2730:
2725:on July 24, 2012
2721:. Archived from
2711:
2705:
2704:
2702:
2701:
2684:
2678:
2666:
2660:
2659:
2657:
2656:
2642:
2636:
2635:
2633:
2632:
2622:
2616:
2615:
2607:
2601:
2600:
2598:
2597:
2586:
2577:
2576:
2574:
2572:
2561:
2552:
2551:
2544:
2535:
2534:
2532:
2531:
2517:
2511:
2510:
2508:
2507:
2492:
2486:
2485:
2483:
2482:
2467:
2461:
2460:
2458:
2457:
2438:
2432:
2431:
2429:
2428:
2413:
2407:
2406:
2404:
2402:
2387:
2381:
2380:
2378:
2376:
2359:
2353:
2352:
2350:
2348:
2333:
2327:
2326:
2324:
2322:
2305:
2299:
2298:
2296:
2294:
2277:
2271:
2270:
2268:
2266:
2251:
2242:
2241:
2218:
2207:
2206:
2198:
2192:
2191:
2189:
2187:
2170:
2164:
2163:
2161:
2159:
2150:. Archived from
2137:
2126:
2125:
2123:
2121:
2104:
2098:
2097:
2095:
2093:
2078:
2072:
2071:
2065:
2063:
2048:
2042:
2041:
2019:
2013:
2012:
1984:
1928:
1927:
1926:
1842:
1841:
1840:
1806:
1805:
1804:
1778:
1777:
1776:
1743:
1742:
1741:
1704:
1703:
1702:
1679:The Black Baron
1676:
1675:
1674:
1648:
1647:
1646:
1628:5 December 1996
1616:
1615:
1614:
1588:
1587:
1586:
1557:
1556:
1555:
1530:Found guilty of
1521:
1520:
1519:
1493:
1492:
1491:
1465:
1464:
1463:
1436:
1435:
1434:
1408:
1407:
1406:
1377:
1376:
1375:
1322:
1321:
1320:
1290:
1289:
1288:
1262:
1261:
1260:
1224:
1223:
1222:
1179:
1178:
1177:
1163:28 January 2005
1148:
1147:
1146:
1116:
1115:
1114:
1085:
1084:
1083:
1046:
1045:
1044:
1018:
1017:
1016:
1002:1 February 2013
960:
959:
958:
916:
915:
914:
891:computer hacking
887:money laundering
844:Hamza Bendelladj
803:
802:
801:
704:
671:zombie computers
656:Sundstrand Corp.
540:
533:
526:
413:Network security
114:Hacker Manifesto
53:Computer hacking
44:
39:reliable sources
21:
4198:
4197:
4193:
4192:
4191:
4189:
4188:
4187:
4158:
4157:
4148:
4146:
4137:
4121:
4114:
4112:
4107:
4104:
4099:
4089:
4087:
4076:
4075:
4071:
4061:
4059:
4048:
4047:
4040:
4030:
4029:
4025:
4015:
4014:
4010:
4000:
3998:
3992:
3991:
3984:
3971:
3969:
3960:
3959:
3955:
3945:
3943:
3934:
3933:
3929:
3919:
3917:
3901:
3900:
3893:
3883:
3881:
3870:
3869:
3858:
3848:
3846:
3832:
3831:
3827:
3817:
3815:
3804:
3803:
3796:
3788:
3781:
3774:
3773:
3769:
3760:
3758:
3754:
3747:
3740:
3739:
3735:
3725:
3723:
3710:
3709:
3702:
3695:
3674:
3673:
3666:
3659:
3638:
3637:
3633:
3624:
3622:
3612:
3611:
3607:
3600:mycitypaper.com
3593:
3592:
3588:
3578:
3576:
3565:
3564:
3557:
3547:
3545:
3533:
3532:
3525:
3515:
3513:
3504:
3503:
3499:
3489:
3487:
3478:
3477:
3473:
3463:
3461:
3448:
3447:
3443:
3433:
3431:
3422:
3421:
3414:
3404:
3402:
3391:
3390:
3386:
3376:
3374:
3358:
3357:
3353:
3343:
3341:
3332:
3331:
3327:
3317:
3315:
3306:
3305:
3298:
3288:
3286:
3273:
3272:
3265:
3255:
3253:
3239:
3238:
3231:
3221:
3219:
3210:
3209:
3205:
3198:
3185:
3184:
3180:
3170:
3168:
3148:
3147:
3140:
3130:
3128:
3115:
3114:
3110:
3100:
3098:
3083:
3082:
3078:
3068:
3066:
3065:on May 16, 2011
3052:
3051:
3044:
3034:
3032:
3031:on May 31, 2009
3018:
3017:
3013:
3003:
3001:
2992:
2991:
2987:
2977:
2975:
2970:
2969:
2962:
2952:
2950:
2941:
2940:
2936:
2926:
2924:
2914:
2913:
2909:
2900:
2898:
2895:www.justice.gov
2889:
2888:
2884:
2876:
2872:
2871:
2867:
2858:
2856:
2852:
2851:
2847:
2842:Wayback Machine
2830:
2826:
2816:
2812:
2802:
2800:
2791:
2790:
2786:
2777:
2775:
2772:
2768:
2767:
2763:
2754:
2752:
2746:
2742:
2741:
2737:
2728:
2726:
2713:
2712:
2708:
2699:
2697:
2691:
2686:
2685:
2681:
2667:
2663:
2654:
2652:
2644:
2643:
2639:
2630:
2628:
2624:
2623:
2619:
2609:
2608:
2604:
2595:
2593:
2588:
2587:
2580:
2570:
2568:
2563:
2562:
2555:
2546:
2545:
2538:
2529:
2527:
2519:
2518:
2514:
2505:
2503:
2500:www.justice.gov
2494:
2493:
2489:
2480:
2478:
2475:www.justice.gov
2469:
2468:
2464:
2455:
2453:
2452:on 26 July 2024
2440:
2439:
2435:
2426:
2424:
2415:
2414:
2410:
2400:
2398:
2389:
2388:
2384:
2374:
2372:
2371:. July 11, 2006
2361:
2360:
2356:
2346:
2344:
2335:
2334:
2330:
2320:
2318:
2307:
2306:
2302:
2292:
2290:
2279:
2278:
2274:
2264:
2262:
2253:
2252:
2245:
2238:
2230:. p. 222.
2221:
2219:
2210:
2200:
2199:
2195:
2185:
2183:
2172:
2171:
2167:
2157:
2155:
2139:
2138:
2129:
2119:
2117:
2106:
2105:
2101:
2091:
2089:
2080:
2079:
2075:
2061:
2059:
2050:
2049:
2045:
2038:
2021:
2020:
2016:
2009:
2001:. p. 336.
1986:
1985:
1974:
1970:
1958:
1922:
1921:
1920:
1836:
1835:
1834:
1819:code) owned by
1800:
1799:
1798:
1772:
1771:
1770:
1737:
1736:
1735:
1698:
1697:
1696:
1682:United Kingdom
1670:
1669:
1668:
1642:
1641:
1640:
1610:
1609:
1608:
1582:
1581:
1580:
1551:
1550:
1549:
1536:tickling videos
1515:
1514:
1513:
1487:
1486:
1485:
1459:
1458:
1457:
1442:United Kingdom
1430:
1429:
1428:
1402:
1401:
1400:
1371:
1370:
1369:
1328:United Kingdom
1316:
1315:
1314:
1284:
1283:
1282:
1256:
1255:
1254:
1218:
1217:
1216:
1190:computer crimes
1173:
1172:
1171:
1142:
1141:
1140:
1112:Cameron Lacroix
1110:
1109:
1108:
1102:
1079:
1078:
1077:
1040:
1039:
1038:
1012:
1011:
1010:
992:Fortezza/Xakep
988:David Schrooten
971:
966:United Kingdom
954:
953:
952:
931:Bank of America
910:
909:
908:
797:
796:
795:
735:United Kingdom
702:
686:Albert Gonzalez
556:computer crimes
544:
515:
514:
484:
476:
475:
428:
418:
417:
398:
388:
387:
313:
303:
302:
288:
278:
277:
248:
238:
237:
218:
208:
207:
193:Security BSides
168:
158:
157:
103:
89:
88:
84:List of hackers
64:
42:
23:
22:
15:
12:
11:
5:
4196:
4194:
4186:
4185:
4180:
4175:
4170:
4168:Cybercriminals
4160:
4159:
4156:
4155:
4145:on 30 May 2013
4135:
4103:
4102:External links
4100:
4098:
4097:
4069:
4038:
4023:
4008:
3982:
3953:
3927:
3891:
3856:
3825:
3794:
3791:on 2012-08-21.
3767:
3733:
3700:
3693:
3664:
3657:
3631:
3605:
3586:
3555:
3523:
3512:. July 6, 2001
3497:
3471:
3441:
3412:
3384:
3351:
3325:
3296:
3263:
3241:Poulsen, Kevin
3229:
3203:
3196:
3178:
3138:
3108:
3076:
3042:
3011:
2985:
2960:
2934:
2907:
2882:
2865:
2845:
2824:
2810:
2799:. 24 June 2013
2784:
2761:
2748:(in Russian).
2735:
2706:
2693:(in Russian).
2679:
2661:
2637:
2617:
2602:
2578:
2553:
2536:
2512:
2487:
2462:
2433:
2423:. 5 April 2019
2408:
2382:
2354:
2328:
2300:
2272:
2243:
2236:
2208:
2193:
2165:
2154:on May 1, 2009
2142:"Hacker Speak"
2127:
2099:
2073:
2043:
2036:
2014:
2007:
1988:Bruce Sterling
1971:
1969:
1966:
1965:
1964:
1957:
1954:
1951:
1950:
1947:
1944:
1937:
1936:United States
1934:
1929:
1917:
1916:
1913:
1910:
1901:Data Control,
1891:
1890:United States
1888:
1885:
1881:
1880:
1877:
1874:
1871:
1868:
1865:
1859:
1858:
1855:
1852:
1849:
1848:United States
1846:
1843:
1831:
1830:
1827:
1824:
1813:
1812:United States
1810:
1807:
1795:
1794:
1791:
1788:
1785:
1782:
1779:
1767:
1766:
1759:
1756:
1750:
1747:
1744:
1732:
1731:
1728:
1725:
1721:
1720:
1717:
1714:
1711:
1710:United States
1708:
1705:
1693:
1692:
1689:
1686:
1683:
1680:
1677:
1665:
1664:
1661:
1660:10 April 1995
1658:
1655:
1654:United States
1652:
1649:
1637:
1636:
1629:
1626:
1623:
1620:
1619:Mendax/profff
1617:
1605:
1604:
1601:
1600:9 August 1999
1598:
1595:
1594:United States
1592:
1589:
1577:
1576:
1573:
1570:
1566:Two counts of
1564:
1563:United States
1561:
1558:
1553:Jonathan James
1546:
1545:
1542:
1539:
1532:email bombings
1528:
1527:United States
1525:
1524:Terri DiSisto
1522:
1510:
1509:
1506:
1503:
1500:
1499:United States
1497:
1494:
1482:
1481:
1478:
1475:
1472:
1469:
1466:
1461:Ehud Tenenbaum
1454:
1453:
1450:
1447:
1443:
1440:
1437:
1425:
1424:
1421:
1418:
1415:
1412:
1409:
1397:
1396:
1393:
1390:
1384:
1381:
1378:
1366:
1365:
1355:Home Secretary
1351:
1348:
1329:
1326:
1323:
1311:
1310:
1307:
1304:
1297:
1296:United States
1294:
1291:
1286:David L. Smith
1279:
1278:
1275:
1272:
1269:
1268:United States
1266:
1263:
1251:
1250:
1247:
1244:
1233:
1230:
1225:
1213:
1212:
1209:
1206:
1186:
1185:United States
1183:
1180:
1168:
1167:
1164:
1161:
1155:
1154:United States
1152:
1149:
1137:
1136:
1133:
1130:
1123:
1122:United States
1120:
1117:
1105:
1104:
1099:
1096:
1092:
1091:United States
1089:
1086:
1074:
1073:
1070:
1067:
1053:
1052:United States
1050:
1047:
1035:
1034:
1031:
1028:
1025:
1022:
1019:
1007:
1006:
1003:
1000:
996:
993:
990:
984:
983:
980:
977:
967:
964:
961:
949:
948:
941:
938:
923:
920:
917:
905:
904:
897:
894:
884:
883:United States
881:
878:
872:
871:
868:
867:23 April 2016
865:
852:
849:
846:
840:
839:
836:
833:
830:
827:
824:
820:
819:
816:
813:
810:
807:
804:
799:Roman Seleznev
792:
791:
788:
785:
782:
781:United States
779:
776:
772:
771:
768:
765:
762:
761:United States
759:
754:
750:
749:
746:
743:
736:
733:
730:
728:Elliott Gunton
724:
723:
720:
717:
716:Conviction(s)
714:
711:
708:
701:
698:
568:identity theft
546:
545:
543:
542:
535:
528:
520:
517:
516:
513:
512:
505:
502:Nuts and Volts
498:
493:
485:
482:
481:
478:
477:
474:
473:
464:
458:
452:
449:Legion of Doom
446:
440:
435:
429:
424:
423:
420:
419:
416:
415:
410:
405:
399:
394:
393:
390:
389:
386:
385:
380:
375:
370:
365:
360:
355:
350:
345:
340:
335:
330:
325:
320:
314:
309:
308:
305:
304:
301:
300:
295:
289:
286:Practice sites
284:
283:
280:
279:
276:
275:
270:
265:
260:
255:
249:
244:
243:
240:
239:
236:
235:
230:
225:
219:
216:Computer crime
214:
213:
210:
209:
206:
205:
200:
195:
190:
185:
180:
175:
169:
164:
163:
160:
159:
156:
155:
154:
153:
148:
143:
132:
127:
122:
117:
110:
104:
97:Hacker culture
95:
94:
91:
90:
87:
86:
81:
76:
74:Cryptovirology
71:
65:
60:
59:
56:
55:
49:
48:
24:
14:
13:
10:
9:
6:
4:
3:
2:
4195:
4184:
4181:
4179:
4176:
4174:
4171:
4169:
4166:
4165:
4163:
4144:
4140:
4136:
4132:
4126:
4110:
4106:
4105:
4101:
4085:
4084:
4079:
4073:
4070:
4062:September 11,
4058:. May 1, 1983
4057:
4056:
4051:
4045:
4043:
4039:
4034:
4027:
4024:
4019:
4012:
4009:
3996:
3989:
3987:
3983:
3979:
3968:
3964:
3957:
3954:
3942:
3938:
3931:
3928:
3915:
3911:
3910:
3905:
3898:
3896:
3892:
3879:
3878:
3873:
3867:
3865:
3863:
3861:
3857:
3844:
3840:
3839:CNET Networks
3836:
3829:
3826:
3813:
3812:
3807:
3801:
3799:
3795:
3787:
3780:
3779:
3771:
3768:
3757:on 2011-05-21
3753:
3746:
3745:
3737:
3734:
3721:
3717:
3713:
3707:
3705:
3701:
3696:
3694:0-8160-4978-5
3690:
3686:
3681:
3680:
3671:
3669:
3665:
3660:
3654:
3650:
3645:
3644:
3635:
3632:
3621:on 2013-08-08
3620:
3616:
3609:
3606:
3601:
3597:
3590:
3587:
3574:
3573:
3568:
3562:
3560:
3556:
3548:September 11,
3544:
3540:
3536:
3535:Kevin Poulsen
3530:
3528:
3524:
3516:September 11,
3511:
3507:
3501:
3498:
3490:September 11,
3486:
3482:
3475:
3472:
3459:
3455:
3451:
3445:
3442:
3429:
3425:
3419:
3417:
3413:
3401:
3400:
3395:
3388:
3385:
3372:
3368:
3367:
3362:
3355:
3352:
3340:
3336:
3329:
3326:
3314:
3310:
3303:
3301:
3297:
3284:
3280:
3276:
3270:
3268:
3264:
3252:
3251:
3246:
3242:
3236:
3234:
3230:
3217:
3213:
3207:
3204:
3199:
3197:9781616928056
3193:
3189:
3182:
3179:
3166:
3162:
3158:
3157:
3152:
3145:
3143:
3139:
3126:
3122:
3118:
3112:
3109:
3097:on 2011-06-06
3096:
3092:
3091:
3086:
3080:
3077:
3064:
3060:
3056:
3049:
3047:
3043:
3030:
3026:
3022:
3015:
3012:
2999:
2995:
2989:
2986:
2973:
2967:
2965:
2961:
2949:
2945:
2938:
2935:
2922:
2918:
2911:
2908:
2896:
2892:
2886:
2883:
2875:
2869:
2866:
2855:
2849:
2846:
2843:
2839:
2835:
2834:
2828:
2825:
2821:
2820:
2814:
2811:
2798:
2794:
2788:
2785:
2773:
2765:
2762:
2751:
2747:
2739:
2736:
2724:
2720:
2716:
2710:
2707:
2696:
2692:
2683:
2680:
2676:
2672:
2671:
2665:
2662:
2651:
2647:
2641:
2638:
2627:
2621:
2618:
2613:
2606:
2603:
2591:
2585:
2583:
2579:
2567:
2560:
2558:
2554:
2549:
2543:
2541:
2537:
2526:
2522:
2516:
2513:
2501:
2497:
2491:
2488:
2476:
2472:
2466:
2463:
2451:
2447:
2443:
2437:
2434:
2422:
2418:
2412:
2409:
2396:
2392:
2386:
2383:
2370:
2369:
2364:
2358:
2355:
2342:
2338:
2332:
2329:
2317:
2316:
2311:
2304:
2301:
2289:
2288:
2283:
2276:
2273:
2265:September 11,
2261:
2257:
2250:
2248:
2244:
2239:
2237:1-4116-4423-9
2233:
2229:
2225:
2217:
2215:
2213:
2209:
2204:
2197:
2194:
2186:September 11,
2182:. May 1, 1984
2181:
2180:
2175:
2169:
2166:
2153:
2149:
2148:
2143:
2136:
2134:
2132:
2128:
2116:
2115:
2114:New York Post
2110:
2103:
2100:
2087:
2083:
2077:
2074:
2070:
2058:
2054:
2047:
2044:
2039:
2037:0-415-18072-4
2033:
2029:
2025:
2018:
2015:
2010:
2008:0-553-56370-X
2004:
2000:
1996:
1994:
1989:
1983:
1981:
1979:
1977:
1973:
1967:
1963:
1960:
1959:
1955:
1948:
1945:
1942:
1938:
1935:
1933:
1930:
1925:
1924:Gerald Wondra
1919:
1918:
1914:
1911:
1908:
1904:
1900:
1896:
1892:
1889:
1887:The Sprinter
1886:
1883:
1882:
1878:
1875:
1872:
1869:
1864:
1861:
1860:
1856:
1854:7 March 1991
1853:
1850:
1847:
1844:
1839:
1833:
1832:
1828:
1826:12 June 1991
1825:
1822:
1818:
1814:
1811:
1808:
1803:
1797:
1796:
1792:
1789:
1786:
1783:
1780:
1775:
1774:Richard Jones
1769:
1768:
1764:
1760:
1757:
1755:
1751:
1748:
1745:
1740:
1734:
1733:
1729:
1726:
1723:
1722:
1718:
1715:
1712:
1707:Phiber Optik
1701:
1694:
1690:
1687:
1684:
1681:
1678:
1673:
1667:
1666:
1662:
1659:
1656:
1653:
1650:
1645:
1644:Kevin Poulsen
1639:
1638:
1634:
1630:
1627:
1624:
1621:
1618:
1613:
1607:
1606:
1602:
1599:
1596:
1593:
1590:
1585:
1584:Kevin Mitnick
1579:
1578:
1574:
1571:
1569:
1565:
1562:
1559:
1554:
1548:
1547:
1543:
1540:
1537:
1533:
1529:
1526:
1523:
1518:
1517:David D'Amato
1512:
1511:
1507:
1505:9 March 2001
1504:
1501:
1498:
1495:
1490:
1484:
1483:
1479:
1477:15 June 2001
1476:
1473:
1470:
1467:
1462:
1456:
1455:
1451:
1448:
1444:
1441:
1438:
1433:
1427:
1426:
1422:
1419:
1416:
1413:
1410:
1405:
1404:Michael Calce
1399:
1398:
1394:
1391:
1389:
1385:
1382:
1379:
1374:
1368:
1367:
1363:
1360:withdrew her
1359:
1356:
1352:
1349:
1346:
1342:
1338:
1334:
1330:
1327:
1324:
1319:
1318:Gary McKinnon
1313:
1312:
1308:
1305:
1302:
1301:Melissa virus
1298:
1295:
1292:
1287:
1281:
1280:
1276:
1273:
1270:
1267:
1264:
1259:
1253:
1252:
1248:
1245:
1242:
1238:
1234:
1231:
1229:
1226:
1221:
1215:
1214:
1210:
1208:15 July 2004
1207:
1205:
1204:
1199:
1195:
1191:
1188:One-count of
1187:
1184:
1176:
1170:
1169:
1165:
1162:
1160:
1156:
1153:
1150:
1145:
1139:
1138:
1134:
1131:
1128:
1124:
1121:
1118:
1113:
1107:
1106:
1100:
1097:
1093:
1090:
1087:
1082:
1076:
1075:
1071:
1068:
1065:
1061:
1058:
1054:
1051:
1048:
1043:
1037:
1036:
1032:
1029:
1026:
1023:
1020:
1015:
1009:
1008:
1004:
1001:
997:
994:
991:
989:
986:
985:
981:
978:
975:
968:
965:
962:
957:
951:
950:
946:
942:
940:24 June 2013
939:
936:
932:
928:
924:
921:
913:
907:
906:
902:
898:
895:
892:
888:
885:
882:
879:
877:
876:Ross Ulbricht
874:
873:
869:
866:
864:
862:
859:
853:
850:
847:
845:
842:
841:
837:
834:
831:
828:
825:
822:
821:
817:
814:
811:
808:
805:
800:
794:
793:
789:
786:
783:
780:
774:
773:
769:
767:January 2024
766:
763:
760:
758:
755:
752:
751:
747:
744:
741:
737:
734:
732:Glubz/planet
731:
729:
726:
725:
705:
699:
697:
695:
694:Kevin Mitnick
691:
687:
682:
680:
676:
672:
668:
663:
661:
657:
653:
649:
648:Gerald Wondra
645:
641:
637:
633:
629:
628:414 area code
625:
620:
618:
614:
610:
606:
598:
594:
588:
587:Kevin Poulsen
584:
583:Kevin Mitnick
580:
575:
571:
569:
565:
561:
557:
553:
541:
536:
534:
529:
527:
522:
521:
519:
518:
511:
510:
506:
504:
503:
499:
497:
494:
492:
491:
487:
486:
480:
479:
472:
468:
465:
462:
459:
456:
453:
450:
447:
444:
441:
439:
436:
434:
431:
430:
427:
422:
421:
414:
411:
409:
406:
404:
401:
400:
397:
392:
391:
384:
381:
379:
376:
374:
371:
369:
366:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
315:
312:
307:
306:
299:
296:
294:
291:
290:
287:
282:
281:
274:
273:Vulnerability
271:
269:
266:
264:
261:
259:
256:
254:
251:
250:
247:
246:Hacking tools
242:
241:
234:
233:Script kiddie
231:
229:
226:
224:
221:
220:
217:
212:
211:
204:
201:
199:
196:
194:
191:
189:
186:
184:
181:
179:
176:
174:
171:
170:
167:
162:
161:
152:
149:
147:
144:
142:
139:
138:
137:
133:
131:
130:Maker culture
128:
126:
123:
121:
118:
116:
115:
111:
109:
106:
105:
102:
98:
93:
92:
85:
82:
80:
77:
75:
72:
70:
67:
66:
63:
58:
57:
54:
50:
46:
45:
40:
36:
32:
27:
19:
4147:. Retrieved
4143:the original
4115:11 September
4113:. Retrieved
4088:. Retrieved
4081:
4072:
4060:. Retrieved
4053:
4032:
4026:
4017:
4011:
3999:. Retrieved
3977:
3970:. Retrieved
3967:RISKS Digest
3956:
3944:. Retrieved
3941:RISKS Digest
3930:
3918:. Retrieved
3914:the original
3907:
3882:. Retrieved
3875:
3847:. Retrieved
3843:the original
3828:
3816:. Retrieved
3814:. April 1994
3809:
3786:the original
3777:
3770:
3759:. Retrieved
3752:the original
3743:
3736:
3724:. Retrieved
3720:the original
3678:
3642:
3634:
3623:. Retrieved
3619:the original
3613:Rizza, Joe.
3608:
3599:
3589:
3577:. Retrieved
3570:
3546:. Retrieved
3543:The Register
3542:
3514:. Retrieved
3509:
3500:
3488:. Retrieved
3485:The Register
3484:
3474:
3462:. Retrieved
3458:the original
3444:
3432:. Retrieved
3428:The Register
3427:
3403:. Retrieved
3397:
3387:
3375:. Retrieved
3371:the original
3364:
3354:
3342:. Retrieved
3339:The Register
3338:
3328:
3316:. Retrieved
3313:The Register
3312:
3287:. Retrieved
3283:the original
3254:. Retrieved
3248:
3220:. Retrieved
3215:
3206:
3187:
3181:
3169:. Retrieved
3165:the original
3154:
3129:. Retrieved
3125:the original
3111:
3099:. Retrieved
3095:the original
3090:CRN Magazine
3088:
3079:
3067:. Retrieved
3063:the original
3058:
3033:. Retrieved
3029:the original
3014:
3002:. Retrieved
2997:
2988:
2978:December 27,
2976:. Retrieved
2953:February 15,
2951:. Retrieved
2947:
2937:
2927:February 15,
2925:. Retrieved
2921:Threat Level
2920:
2910:
2899:. Retrieved
2897:. 2015-03-09
2894:
2885:
2868:
2857:. Retrieved
2848:
2831:
2827:
2817:
2813:
2801:. Retrieved
2796:
2787:
2776:. Retrieved
2764:
2753:. Retrieved
2738:
2727:. Retrieved
2723:the original
2709:
2698:. Retrieved
2682:
2675:De Standaard
2669:
2664:
2653:. Retrieved
2649:
2640:
2629:. Retrieved
2620:
2611:
2605:
2594:. Retrieved
2569:. Retrieved
2528:. Retrieved
2524:
2515:
2504:. Retrieved
2502:. 2020-08-13
2499:
2490:
2479:. Retrieved
2477:. 2019-11-12
2474:
2465:
2454:. Retrieved
2450:the original
2436:
2425:. Retrieved
2411:
2399:. Retrieved
2395:the original
2385:
2373:. Retrieved
2366:
2357:
2345:. Retrieved
2341:the original
2331:
2319:. Retrieved
2313:
2303:
2291:. Retrieved
2285:
2275:
2263:. Retrieved
2260:CNET Reviews
2223:
2202:
2196:
2184:. Retrieved
2177:
2168:
2156:. Retrieved
2152:the original
2145:
2118:. Retrieved
2112:
2102:
2090:. Retrieved
2076:
2067:
2060:. Retrieved
2046:
2023:
2017:
1991:
1909:subsidiary)
1802:Leonard Rose
1489:Dennis Moran
1449:6 July 2001
1432:Raphael Gray
1383:Netherlands
1201:
995:Netherlands
979:16 May 2013
956:Lewys Martin
896:29 May 2015
858:Trojan horse
855:
829:Netherlands
713:Nationality
683:
664:
621:
602:
581:(left) with
549:
507:
500:
488:
483:Publications
328:Trojan horse
293:HackThisSite
112:
31:dynamic list
26:
2750:RIA Novosti
2401:January 22,
2375:January 22,
2347:January 22,
2321:January 22,
2293:January 22,
1946:1 May 1983
1912:7 May 1986
1863:Markus Hess
1754:ZARDOZ file
1651:Dark Dante
1362:extradition
1358:Theresa May
1306:1 May 2002
1175:Adrian Lamo
1098:8 May 2006
1042:Samy Kamkar
775:Tyler King
757:Pompompurin
579:Adrian Lamo
496:Hacker News
383:Infostealer
166:Conferences
120:Hackerspace
4162:Categories
4149:2 February
4001:August 23,
3884:August 23,
3818:August 23,
3761:2011-09-13
3726:August 23,
3625:2013-05-02
3579:August 23,
3250:Wired News
3171:August 23,
3121:Sophos Plc
2901:2021-08-01
2859:2021-08-01
2778:2011-11-26
2755:2010-12-04
2729:2010-11-02
2700:2010-11-02
2655:2018-05-24
2650:Al Jazeera
2631:2016-05-23
2596:2018-05-26
2530:2022-04-30
2506:2022-04-30
2481:2022-04-30
2456:2024-09-01
2427:2024-09-01
1968:References
1899:Sundstrand
1784:Australia
1749:Australia
1700:Mark Abene
1672:Chris Pile
1622:Australia
1373:Jan de Wit
1198:LexisNexis
1127:LexisNexis
690:Max Butler
617:black hats
597:Mark Abene
353:Logic bomb
348:Ransomware
125:Hacktivism
29:This is a
3572:USA Today
3464:March 27,
3256:April 21,
2028:Routledge
1895:Microsoft
1809:Terminus
1781:Electron
1468:Analyzer
1411:MafiaBoy
1380:OnTheFly
1194:Microsoft
943:Signed a
696:in 1999.
652:Microsoft
632:Milwaukee
626:from the
560:computers
552:convicted
471:Blue team
463:(defunct)
457:(defunct)
451:(defunct)
445:(defunct)
433:Anonymous
373:Web shell
223:Crimeware
203:Summercon
151:White hat
141:Black hat
134:Types of
108:Hackathon
69:Phreaking
4125:cite web
3849:June 28,
3649:O'Reilly
3510:BBC News
3366:PC World
3344:June 22,
3222:9 August
3035:June 22,
3004:June 22,
2998:BBC News
2838:Archived
2719:CBS News
2147:PC World
1990:(1993).
1956:See also
1932:The 414s
1903:Kenworth
1870:Germany
1821:AT&T
1817:UNIX 3.2
1746:Phoenix
1560:c0mrade
1439:Curador
1341:cover-up
1293:Kwyjibo
1265:MagicFX
1232:Belgium
1228:Gigabyte
1192:against
1060:XSS worm
974:NullCrew
935:Wachovia
851:Algeria
826:Twinkie
809:Russian
722:Penalty
624:The 414s
609:computer
467:Red team
323:Backdoor
198:ShmooCon
146:Grey hat
3877:The Age
3434:May 23,
3405:May 23,
3377:May 23,
3318:May 10,
3289:May 11,
3131:May 11,
3101:May 11,
2923:. Wired
2803:31 July
2158:May 10,
2062:May 10,
1591:Condor
1496:Coolio
1471:Israel
1414:Canada
1151:T33kid
1064:MySpace
922:Russia
899:Double
806:Track2
710:Handle
675:botnets
577:Hacker
455:LulzSec
343:Spyware
318:Rootkit
311:Malware
263:Payload
253:Exploit
183:DEF CON
136:hackers
62:History
4090:May 9,
3997:. rbs2
3972:May 9,
3946:May 9,
3920:May 9,
3691:
3655:
3216:Sophos
3194:
3069:May 9,
2571:21 May
2234:
2220:pg 26—
2120:May 8,
2092:May 9,
2088:. 2001
2034:
2005:
1907:Boeing
1339:and a
1241:Sophos
963:sl1nk
861:SpyEye
605:hacker
509:Phrack
426:Groups
358:Botnet
298:Zone-H
3811:Wired
3789:(PDF)
3782:(PDF)
3755:(PDF)
3748:(PDF)
3399:Wired
2948:Wired
2877:(PDF)
2797:RAPSI
2368:Wired
2315:Wired
2287:Wired
1790:1993
1758:1993
1727:1993
1716:1991
1688:1995
1541:2001
1350:2002
1325:Solo
1274:2004
1119:cam0
1088:Gobo
1069:2007
1049:samy
1021:Weev
835:2017
787:2019
707:Name
333:Virus
101:ethic
37:with
4151:2012
4131:link
4117:2008
4092:2009
4064:2008
4003:2008
3974:2009
3948:2009
3922:2009
3886:2008
3851:2009
3820:2008
3728:2008
3689:ISBN
3653:ISBN
3581:2008
3550:2008
3518:2008
3492:2008
3466:2007
3436:2009
3407:2009
3379:2009
3346:2009
3320:2009
3291:2009
3258:2010
3224:2017
3192:ISBN
3173:2008
3133:2009
3103:2009
3071:2009
3037:2009
3006:2009
2980:2010
2955:2018
2929:2018
2805:2017
2573:2017
2403:2012
2377:2012
2349:2012
2323:2012
2295:2012
2267:2008
2232:ISBN
2228:Lulu
2188:2008
2160:2009
2122:2009
2094:2009
2064:2009
2032:ISBN
2003:ISBN
1845:rtm
1333:hack
1200:and
933:and
848:Bx1
642:and
585:and
368:HIDS
338:Worm
99:and
3685:416
1763:A$
1633:A$
1345:UFO
1343:of
630:in
562:or
554:of
378:RCE
4164::
4127:}}
4123:{{
4080:.
4052:.
4041:^
3985:^
3976:.
3965:.
3939:.
3906:.
3894:^
3874:.
3859:^
3837:.
3808:.
3797:^
3714:.
3703:^
3687:.
3667:^
3651:.
3647:.
3598:.
3569:.
3558:^
3541:.
3526:^
3508:.
3483:.
3452:.
3426:.
3415:^
3396:.
3363:.
3337:.
3311:.
3299:^
3277:.
3266:^
3247:.
3232:^
3214:.
3159:.
3153:.
3141:^
3119:.
3087:.
3057:.
3045:^
3023:.
2996:.
2963:^
2946:.
2919:.
2893:.
2795:.
2717:.
2673:,
2648:.
2581:^
2556:^
2539:^
2523:.
2498:.
2473:.
2444:.
2419:.
2365:.
2312:.
2284:.
2258:.
2246:^
2211:^
2176:.
2144:.
2130:^
2111:.
2084:.
2066:.
2055:.
1975:^
1897:,
1867:—
1243:.
1237:C#
1196:,
1182:—
919:—
778:—
681:.
658:,
654:,
638:,
469:/
4153:.
4133:)
4119:.
4094:.
4066:.
4035:.
4020:.
4005:.
3950:.
3924:.
3888:.
3853:.
3822:.
3764:.
3730:.
3697:.
3661:.
3628:.
3583:.
3552:.
3520:.
3494:.
3468:.
3438:.
3409:.
3381:.
3348:.
3322:.
3293:.
3260:.
3226:.
3200:.
3175:.
3135:.
3105:.
3073:.
3039:.
3008:.
2982:.
2957:.
2931:.
2904:.
2879:.
2862:.
2807:.
2781:.
2758:.
2732:.
2703:.
2658:.
2634:.
2614:.
2599:.
2550:.
2533:.
2509:.
2484:.
2459:.
2430:.
2405:.
2379:.
2351:.
2325:.
2297:.
2269:.
2240:.
2205:.
2190:.
2162:.
2124:.
2096:.
2040:.
2011:.
539:e
532:t
525:v
41:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.