563:
555:. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or
582:
604:. Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around. They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. As the computer industry matured, individuals with malicious intentions (
852:. He stole from 217 American banks in total stealing $ 400 million and is alleged to have donated all the money to Africa and Palestine, though Trial documents did not mention any donations or charity activities. Despite much false information on the internet Bendelladj did not get sentenced to death, and claims saying he donated any money to charity is almost impossible to verify. The SpyEye software was also sold to other hackers and used as part of a botnet.
3892:
3902:
2057:
Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the
Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three
987:
Accused of causing 63 million dollar in damages. Primarily for his role in trafficking credit cards he obtained by hacking other hackers. Pleaded guilty to conspiracy to commit access device fraud and bank fraud, access device fraud, bank fraud, intentional damage to a protected computer, and
958:
Pleaded guilty to five counts of "unauthorised acts with intent to impair operation of or prevent/hinder access to a computer", two of "unauthorised computer access with intent to commit other offences", one of "unauthorised computer access with intent to commit other offences", and one of
2862:
639:, was sentenced to two years of probation. In May 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of
1434:
Pleaded guilty to theft and hacking offenses which fall under the
Computer Misuse Act and six charges of intentionally accessing sites containing credit card details and using this information for financial gain
1083:
Pleaded guilty to four federal charges of violating United States Code
Section 1030, Fraud and Related Activity in Connection with Computers, specifically subsections (a)(5)(A)(i), 1030 (a)(5)(B)(i) and 1030(b)
843:
Pleaded guilty to one count of conspiring to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiring to commit computer fraud and abuse, and 11 counts of computer fraud and abuse
801:
Convicted of 38 counts involving unauthorized access of business information systems and stealing over two million credit card numbers. Pleaded guilty to conspiracy to commit bank fraud.
2579:"Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $ 50 Million in Online Identity Theft and $ 9 Million Bank Fraud Conspiracy"
1463:
Admitted to cracking US and
Israeli computers, and pleaded guilty to conspiracy, wrongful infiltration of computerized material, disruption of computer use and destroying evidence
4119:
2430:
3073:
1441:
Three years of psychiatric treatment after evidence emerged that he was suffering from a mental condition which needed medical treatment rather than incarceration
3043:
3139:
2879:
2578:
1950:
3105:
526:
2536:
3349:
1840:
Intentional access of federal interest computers without authorization thereby preventing authorized access and causing a loss in excess of US$ 1,000
1325:
1146:
Pleaded guilty on August 11, 2004, to one count of intentionally causing or attempting to cause damage to a protected computer via his version of the
2484:
2826:
23:
2863:"Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft - European Commission (Fortezza mentioned as example)"
2703:
1929:
628:
3645:
1016:
On
November 20, 2012, was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization
356:
3438:
4166:
3603:
3765:
3731:
3704:
3267:
3013:
2614:
2459:
3263:
3009:
1114:
Pleaded guilty to hacking into the cell-phone account of celebrity Paris Hilton and participated in an attack on data-collection firm
50:
4097:
3681:
3184:
2405:
2224:
2130:
2024:
1995:
2438:
3700:
1846:
Three years probation and 400 hours of community service in a manner determined by the
Probation Office and approved by the Court
4161:
2045:
1477:
1412:
Eight months "open custody", by the
Montreal Youth Court, one year of probation, restricted use of the Internet and a small fine
1376:
1361:
807:
Sentenced to 27 years' imprisonment for the 2016 conviction, concurrent with sentence of 14 years for the second set of charges
3823:
3442:
246:
67:
1225:
624:
519:
2509:
19:
3083:
965:
and said to have penetrated the servers of
Department of Defense (DoD), Pentagon, NASA, NSA, other UK government websites.
2677:
2634:
459:
256:
139:
129:
1741:
15 charges including trespassing on the
University of Texas computer network, altering data at NASA and the theft of the
1061:
Three years of formal probation, 90 days of community service, restitution paid to MySpace, restrictions on computer use
27:
1469:
Six months of community service, one year of probation, a two-year suspended prison sentence and fined about US$ 18,000
166:
154:
2960:
2326:"Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information"
2325:
2097:
1523:
which caused service outages at a number of colleges and universities; victims were young males from whom he solicited
4171:
4066:
2074:
821:
Nine counts of
Illegal Computer Trespass to computers and one count of money laundering for an amount of $ 25 million
681:, 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals, and 68 months for
241:
4038:
3051:
2162:
1586:
Four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication
3200:
3153:
1782:
One year and six months suspended sentence, 300 hours of community service and psychiatric assessment and treatment
2379:
1762:
1742:
1321:
933:
879:
593:
478:
216:
3527:
3113:
2760:Суд над арестованными в США по обвинению в кибермошенничестве российскими студентами завершится в ближайшие месяцы
3359:
512:
261:
3323:
2880:"Dutch Citizen Sentenced to 12 Years in Prison for Computer Hacking Scheme that Stole and Sold Credit Card Info"
2070:
846:
728:
667:
437:
396:
366:
316:
2554:
600:
underground, criminal convictions were rare because there was an informal code of ethics that was followed by
3632:
Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
2758:
1646:
Pleaded guilty to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice
961:
Hacking attempt on the websites of Kent Police, Cambridge University and Oxford University. Former member of
4156:
1660:
1289:
1274:
1216:
1147:
1132:
176:
3469:
4067:"Two who raided computers pleading guilty—Late City Final Edition, Section 1, Page 6, Column 1, 383 words"
2842:
2807:
2711:
1887:
644:
431:
3297:
1200:
Six months detention at his parents' home plus two years probation and roughly US$ 65,000 in restitution
3149:
3106:"Blaster-B worm author sentenced to 18 months in jail - but bigger villain remains free, Sophos reports"
1790:
1069:
900:
655:
632:
3412:
2821:
1614:
31 charges of hacking and related charges. Pleaded guilty to 25 charges, the remaining 6 were dropped.
4127:
2932:
2905:
1981:
1826:
1556:
449:
391:
311:
2781:
1022:
Auernheimer was sentenced to 41 months in federal prison and ordered to pay $ 73,000 in restitution
3354:
2683:
2434:
2409:
2298:
2135:
1600:
1228:) computer viruses. Charged and arrested for computer data sabotage against internet security firm
753:
Conspiracy to commit access device fraud, access device fraud, and possession of child pornography
426:
251:
161:
3860:
3446:
1375:
Spreading data into a computer network with the intention of causing damage as the creator of the
4071:
4043:
2537:"Russian Cyber-Criminal Sentenced to 27 Years in Prison for Hacking and Credit Card Fraud Scheme"
2167:
1727:
1208:
1191:
1002:
773:
Conspiring to commit computer fraud, computer fraud, and two counts of aggravated identity theft
3673:
3666:
1812:
and 2 counts of computer fraud and three counts of interstate transportation of stolen property
3382:
2351:
4113:
3897:
3677:
3641:
3637:
3607:
3180:
2220:
2020:
1991:
1987:
1751:
1621:
1246:
889:
623:. In that case, six teenagers broke into a number of high-profile computer systems, including
552:
421:
384:
351:
3774:
3740:
3233:
926:. It is estimated that with nine other people Svechinskaya had skimmed $ 3 million in total.
3799:
3387:
3271:
3017:
3010:""Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code"
2356:
2303:
2275:
2270:
1505:
1298:
20 months in federal prison, US$ 5,000 fine and 100 hours of community service upon release
875:
832:
605:
601:
401:
102:
3794:
3584:
3555:
2510:"Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm | SecurityWeek.Com"
1904:
Two weeks jail sentence, 200 hours community service, two years probation, fined US$ 2,000
3144:
2830:
1805:
1324:
of all time," although McKinnon himself states that he was merely looking for evidence of
1100:
1092:
Restitution of US$ 15,000 to the U.S. federal government for infecting military computers
976:
919:
674:
659:
181:
72:
41:
2140:
3708:
1932:
in New York and a Los Angeles bank and two counts of "making harassing telephone calls"
22:
and may never be able to satisfy particular standards for completeness. You can help by
3494:
2216:
1976:
1541:
1449:
1343:
1178:
915:
787:
716:
556:
544:
490:
321:
274:
204:
85:
62:
4150:
3827:
3630:
3523:
3229:
2485:"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft"
2248:
2244:
2102:
1776:
Trespassing on the University of Texas computer network and theft of the ZARDOZ file
1632:
1572:
1524:
1392:
1306:
864:
682:
616:
575:
571:
326:
221:
118:
3831:
3672:(November 2003 ed.). Checkmark Books, an imprint of Facts on File Inc. p.
2982:
611:
Convictions of computer crimes, or hacking, began as early as 1984 with the case of
562:
3955:
3929:
3078:
2732:
2663:
2657:
1420:
944:
745:
414:
281:
234:
89:
3951:
2738:
2581:(Press release). Washington, D.C.: U.S. Department of Justice. November 30, 2017
1851:
1350:
1346:
1163:
1030:
567:
484:
371:
108:
3767:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3733:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3177:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3238:
1688:
1624:
2,100 to ANU (to be paid in 3 months time) and a A$ 5,000 good-behaviour bond
1520:
1186:
1115:
1045:
678:
585:
540:
341:
336:
113:
2906:"Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data"
2329:
1044:
Pleaded guilty to violating California Penal Code 502(c)(8) for creating the
731:
crimes, breaching a Sexual Harm Prevention Order, conspiracy to commit fraud
3925:
3560:
3264:"Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison"
2782:"US court frees "world's sexiest computer hacker" prosecuted for bank fraud"
2016:
1883:
1182:
666:. He then sold the botnets to the highest bidder, who in turn used them for
640:
620:
548:
361:
211:
191:
96:
57:
2041:
1090:
57 months in prison, forfeit a 1993 BMW and more than US$ 58,000 in profit
994:
Extradited from Romania and sentenced to 144 months in U.S. federal prison
936:
and was released under $ 25,000 bail. Ordered to pay $ 35,000 in damages.
918:
to attack thousands of bank accounts and opened at least five accounts in
608:) would emerge to exploit computer systems for their own personal profit.
2707:
2383:
1920:
1912:
1891:
1329:
1048:
962:
923:
648:
636:
612:
597:
455:
186:
134:
3518:
3516:
827:
Two months jail sentence before they let him go due to lack of evidence
581:
3865:
1809:
1052:
443:
331:
306:
299:
171:
4020:
Hopkins, Jack (7 May 1986). "Computer intruder gets 2 weeks in jail".
2460:"Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft"
3201:"Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments"
3109:
1895:
1238:
Released within 24 hours on bail due to being a minor (17 years old)
1229:
849:
663:
497:
346:
286:
124:
4098:"Hacker High: 10 Stories of Teenage Hackers Getting into the System"
3967:
Under the plea agreements, ... Rose ... will serve a year in prison.
1713:
One count of computer trespass and one count of computer conspiracy
1342:
On 16 October 2012, after a series of legal proceedings in Britain,
1118:
Group that exposed personal records of more than 300,000 consumers
677:
for 20 years. The next longest sentences are those of 13 years for
2734:Россиянку, подозреваемую в США в мошенничестве, отпустят под залог
1702:
Misdemeanor theft-of-service for a free-call scam to a 900 number
1564:
Six-month prison sentence and probation until the age of eighteen
1533:
Fined $ 5,000 (USD) and sentenced to six months in federal prison
1224:
Wrote the Coconut-A, Sahay-A, and Sharp-A (first virus written in
580:
561:
3983:
1652:
51 months in prison and ordered to pay US$ 56,000 in restitution
1336:
activity and other technologies potentially useful to the public
1497:
Nine months in jail and US$ 5,000 in restitution to each victim
1260:
Admitted the hacking and pleaded guilty to two felonies in 2004
673:
As of 2012, the longest sentence for computer crimes is that of
4005:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2659:
Algerijnse hacker star van amerikanen en schonk aan palestijnen
2599:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2190:
Emery, Julie (7 May 1986). "Light jail term for young hacker".
2058:
roles – computer hackers, phone phreaks, and software pirates."
1320:
Accused in 2002 of perpetrating the "biggest military computer
1266:
Sentenced to time served after spending seven months in prison
654:
In 2006, a prison term of nearly five years was handed down to
3407:
3405:
2635:"Hamza Bendelladj: Is the Algerian hacker a hero? | News"
2431:"TalkTalk hacker Elliott Gunton jailed in cryptocurrency scam"
1333:
3901:. Business; PART-D; Financial Desk. p. 2. Archived from
2406:"Three Norwich schools probed for weakness by teenage hacker"
1620:
A recorded conviction on all counts, a reparation payment of
1288:
Pleaded guilty to knowingly spreading a computer virus, the
3824:"Q&A: Mark Abene, from 'Phiber Optik' to security guru"
2843:"Feds Arrest 'Kurupt' Carding Kingpin? – Krebs on Security"
2808:
Is Department of Defense (DoD), Pentagon, NASA, NSA secure?
539:
Convicted computer criminals are people who are caught and
4131:
3298:"Kournikova virus kiddie gets 150 hours community service"
2555:"Russian Hacker Sentenced to 27 Years in Credit Card Case"
1882:
Four counts of Illegal Computer Trespass to computers at:
1754:
1,000 good-behaviour bond and 500 hours community service
3291:
3289:
3008:
Debra Wong Chang - United States Attorney (May 8, 2006).
1592:
46 months in federal prison and US$ 4,125 in restitution
1124:
11 months in a Massachusetts juvenile detention facility
3701:"Kevin Mitnick sentenced to nearly four years in prison"
3179:. Hershey, PA: Business Science Reference. p. 146.
2380:"Kevin Mitnick Sentenced to Nearly Four Years in Prison"
3224:
3222:
1155:
18 months in prison and 100 hours of community service
3668:
The Encyclopedia of High-Tech Crime and Crime-Fighting
2042:"The electronic discourse of the computer underground"
3893:"Hacker Enters Guilty Plea in Theft of Computer Data"
3234:"Court Okays Counter-Hack of eBay Hacker's Computer"
2205:
2203:
2201:
892:
plus forty years, without the possibility of parole
2328:. cybercrime.gov. December 15, 2004. Archived from
1406:Pleaded guilty to 56 charges of "mischief to data"
3665:
3629:
3133:
3131:
2679:В деле о хакерах таблоиды США нашли вторую Чэпман
4118:: CS1 maint: bot: original URL status unknown (
2822:Man jailed for attempting to compromise websites
2548:
2546:
2382:. cybercrime.gov. August 9, 1999. Archived from
4033:
4031:
3886:
3884:
3556:"Hacker sentenced, must program jail computers"
3175:Holt, Thomas J.; Schell, Bernadette H. (2011).
2961:"MySpace speaks about Samy Kamkar's sentencing"
2704:"Kristina Svechinskaya: Accused Russian Hacker"
2615:"Hacker Hamza Bendelladj sentenced to 15 years"
2299:"Record 13-Year Sentence for Hacker Max Vision"
1527:who had stopped co-operating with his requests
3528:"Solar Sunrise hacker 'Analyzer' escapes jail"
2098:"FBI'S web site socked as hackers target feds"
520:
8:
4100:. Archived from the original on 1 March 2016
2825:, Kent Police, United Kingdom, 16 May 2013.
2238:
2236:
1984:—Law and Disorder on the Electronic Frontier
1951:Timeline of computer security hacker history
1894:Truck Co. and Resources Conservation Co. (a
662:to do his bidding via giant bot networks or
3789:
3787:
3550:
3548:
3324:"Anna Kournikova virus author stands trial"
3037:
3035:
2573:
2571:
2531:
2529:
1971:
1969:
1967:
1965:
959:"unauthorised access to computer material".
3984:"Judgment in U.S. v. Robert Tappan Morris"
3074:"Teen Pleds Guilty in Blaster Worm Attack"
2124:
2122:
2120:
1674:Writing and distributing computer viruses
692:
527:
513:
32:
3855:
3853:
3851:
3849:
3140:"Hacker Lamo Sentenced To Home Detention"
3795:"Phiber Optik Goes to Prison—Issue 2.04"
3695:
3693:
3258:
3256:
1928:Unauthorized access to computers at the
3977:
3975:
3926:"Legion of Doom's "Terminus" sentenced"
3659:
3657:
2955:
2953:
2933:"iPad Hack Statement Of Responsibility"
1961:
737:3½ years of imprisonment (most recent)
710:
704:
588:, who was convicted of computer charges
40:
4111:
3982:Ronald B. Standler (August 14, 2002).
3350:"Kournikova Virus Writer Found Guilty"
1013:United States (at time of sentencing)
882:, and conspiracy to traffic narcotics
734:November 2016; August 2019; July 2024
3583:Scoblionkov, Deborah (5 April 2001).
3383:"February 7, 2000: Mafiaboy's Moment"
3296:Robert Blincoe (September 27, 2001).
2013:Hackers: Crime in the Digital Sublime
1804:Illicit use of proprietary software (
7:
3564:. Associated Press. February 6, 2002
2297:Poulsen, Kevin (February 12, 2010).
2271:"TJX Hacker Gets 20 Years in Prison"
1868:One to two years suspended sentence
3705:United States Department of Justice
3495:"Teen hacker escapes jail sentence"
3268:United States Department of Justice
3014:United States Department of Justice
2983:"American owns up to hijacking PCs"
2352:"Crazy-Long Hacker Sentence Upheld"
869:altoid/frosty/Dread Pirate Roberts
635:. On May 1, 1984, one of the 414s,
247:forensics-focused operating systems
3891:Henry Weinstein (March 23, 1991).
3604:"Who Was Educating Your Children?"
3470:"'Bill Gates' hacker escapes jail"
3348:Joris Evers (September 28, 2001).
3322:John Leyden (September 14, 2001).
3112:. January 28, 2005. Archived from
2763:(in Russian). Information Security
2553:Perlroth, Nicole (21 April 2017).
2243:Robert Vamosi (January 27, 2006).
1292:, with the intent to cause damage
14:
4128:"CUSSE List of Convicted Hackers"
3950:Rodney Hoffman (March 31, 1991).
3924:Rodney Hoffman (March 27, 1991).
3138:George V. Hulme (July 15, 2004).
3082:. August 12, 2004. Archived from
3042:Brian Krebs (February 27, 2007).
2904:Zetter, Kim (November 20, 2012).
2245:"Cybercrime does pay; here's how"
651:. and Resources Conservation Co.
3773:. pp. 48–49. Archived from
3739:. pp. 48–49. Archived from
3707:. August 9, 1999. Archived from
2931:Zetter, Kim (January 23, 2013).
2096:Brian Blomquist (May 29, 1999).
2046:Florida International University
3606:. Antonnews.com. Archived from
3443:Federal Bureau of Investigation
2666:, édition du 22 septembre 2015.
2129:Andrew Brandt (April 2, 2001).
1491:Misdemeanor charges of hacking
804:August 2016 and September 2017
759:20 years of supervised release
668:denial-of-service (DoS) attacks
68:Hacking of consumer electronics
4022:The Seattle Post Intelligencer
3822:Elinor Mills (June 23, 2009).
3381:Tony Long (February 7, 2007).
2811:, TheHackerNews, May 14, 2011.
2437:. 26 July 2024. Archived from
2269:Zetter, Kim (March 25, 2010).
1708:35 hours of community service
625:Los Alamos National Laboratory
1:
3413:"Mafiaboy given eight months"
3270:. May 1, 2002. Archived from
2015:(November 3, 1999 ed.).
1930:Sloan-Kettering Cancer Center
1750:One-year suspended sentence:
629:Sloan-Kettering Cancer Center
3468:John Leyden (July 6, 2001).
3445:. April 2003. Archived from
2963:. TechSpot. January 31, 2007
2215:(August 23, 2005 ed.).
2071:"Interview with Chris Davis"
1873:Michael Princeton Wilkerson
1855:
1384:150 hours community service
1170:
907:
766:
167:Chaos Communication Congress
4167:Hacking (computer security)
3439:"FBI Facts and Figure 2003"
3044:"They'll Always Have Paris"
2829:September 25, 2013, at the
2075:Public Broadcasting Service
1353:order to the United States
988:aggravated identity theft.
4188:
3764:Dreyfus, Suelette (1997).
3730:Dreyfus, Suelette (1997).
3628:McWilliams, Brian (2004).
3591:. Philadelphia City Paper.
3150:United Business Media, Inc
2019:; 1 edition. p. 200.
1862:Found guilty of espionage
934:personal recognizance bond
658:, who created hundreds of
479:2600: The Hacker Quarterly
217:List of computer criminals
17:
4039:"Computer User Sentenced"
3952:"Correction Re: Terminus"
3869:. Melbourne. May 25, 2003
2163:"Computer User Sentenced"
1986:(January 1994 ed.).
1698:
1695:
1684:
812:Pascal van den Essenburg
779:57 months federal prison
707:
701:
695:
2759:
2733:
2678:
2564:– via NYTimes.com.
742:Conor Brian Fitzpatrick
698:
397:Cloud computing security
4162:Computing-related lists
3664:Michael Newton (2004).
2211:Richard Gissel (2005).
1818:One-year jail sentence
1719:One-year jail sentence
1326:free energy suppression
1055:social networking site
1051:that spread across the
971:Two years imprisonment
878:, conspiracy to commit
859:15 years jail sentence
559:) and electronic fraud.
177:Hackers on Planet Earth
2676:Козловский, Владимир.
2040:Steve Mizrach (2009).
845:He is a co-creator of
592:In the infancy of the
589:
578:
547:such as breaking into
432:Homebrew Computer Club
3711:on September 26, 2009
3585:"Who's Laughing Now?"
1377:Anna Kournikova virus
1148:Blaster computer worm
1070:Jeanson James Ancheta
901:Kristina Svechinskaya
656:Jeanson James Ancheta
633:Security Pacific Bank
584:
565:
3861:"Hack to the future"
3419:. September 13, 2001
2514:www.securityweek.com
2386:on December 19, 2011
2332:on November 30, 2011
2011:Paul Taylor (1999).
1982:The Hacker Crackdown
1938:Two years probation
1827:Robert Tappan Morris
1680:18 months in prison
1557:juvenile delinquency
450:Masters of Deception
392:Application security
24:adding missing items
3905:on October 20, 2012
3362:on January 31, 2013
3156:on January 22, 2009
3048:The Washington Post
2684:BBC Russian Service
2435:Eastern Daily Press
2410:Eastern Daily Press
1601:Julian Paul Assange
729:Computer Misuse Act
708:Sentencing date(s)
596:subculture and the
427:Chaos Computer Club
162:Black Hat Briefings
36:Part of a series on
4172:Lists of criminals
4072:The New York Times
4044:The New York Times
3274:on August 20, 2006
3207:. 16 February 2004
3116:on August 19, 2009
2989:. January 24, 2006
2213:Digital Underworld
2168:The New York Times
1728:Nahshon Even-Chaim
1561:21 September 2000
1409:12 September 2001
1381:27 September 2001
1209:Kimberley Vanvaeck
1192:The New York Times
1133:Jeffrey Lee Parson
1121:13 September 2005
1003:Andrew Auernheimer
727:Money laundering,
689:Computer criminals
590:
579:
257:Social engineering
4007:The Seattle Times
3898:Los Angeles Times
3834:on August 5, 2009
3647:978-0-596-00732-4
3526:(June 15, 2001).
3449:on March 26, 2007
3232:(April 6, 2007).
2601:The Seattle Times
2192:The Seattle Times
1988:Project Gutenberg
1942:
1941:
1865:15 February 1990
1247:Jerome Heckenkamp
1235:16 February 2004
1046:"Samy is my hero"
1019:20 November 2012
916:Zeus Trojan horse
914:Accused of using
890:life imprisonment
649:Kenworth Truck Co
602:white hat hackers
553:computer networks
537:
536:
385:Computer security
352:Keystroke logging
4179:
4143:
4141:
4139:
4130:. Archived from
4123:
4117:
4109:
4107:
4105:
4085:
4084:
4082:
4080:
4075:. March 17, 1984
4063:
4057:
4056:
4054:
4052:
4035:
4026:
4025:
4017:
4011:
4010:
4002:
3996:
3995:
3993:
3991:
3979:
3970:
3969:
3964:
3962:
3947:
3941:
3940:
3938:
3936:
3921:
3915:
3914:
3912:
3910:
3888:
3879:
3878:
3876:
3874:
3857:
3844:
3843:
3841:
3839:
3830:. Archived from
3819:
3813:
3812:
3810:
3808:
3791:
3782:
3781:
3779:
3772:
3761:
3755:
3754:
3752:
3751:
3745:
3738:
3727:
3721:
3720:
3718:
3716:
3697:
3688:
3687:
3671:
3661:
3652:
3651:
3635:
3625:
3619:
3618:
3616:
3615:
3599:
3593:
3592:
3580:
3574:
3573:
3571:
3569:
3552:
3543:
3542:
3540:
3538:
3520:
3511:
3510:
3508:
3506:
3491:
3485:
3484:
3482:
3480:
3465:
3459:
3458:
3456:
3454:
3435:
3429:
3428:
3426:
3424:
3409:
3400:
3399:
3397:
3395:
3378:
3372:
3371:
3369:
3367:
3358:. Archived from
3345:
3339:
3338:
3336:
3334:
3319:
3313:
3312:
3310:
3308:
3293:
3284:
3283:
3281:
3279:
3260:
3251:
3250:
3248:
3246:
3226:
3217:
3216:
3214:
3212:
3197:
3191:
3190:
3172:
3166:
3165:
3163:
3161:
3152:. Archived from
3145:Information Week
3135:
3126:
3125:
3123:
3121:
3102:
3096:
3095:
3093:
3091:
3070:
3064:
3063:
3061:
3059:
3050:. Archived from
3039:
3030:
3029:
3027:
3025:
3016:. Archived from
3005:
2999:
2998:
2996:
2994:
2979:
2973:
2972:
2970:
2968:
2957:
2948:
2947:
2945:
2943:
2928:
2922:
2921:
2919:
2917:
2901:
2895:
2894:
2892:
2891:
2876:
2870:
2869:
2867:
2859:
2853:
2852:
2850:
2849:
2839:
2833:
2818:
2812:
2804:
2798:
2797:
2795:
2793:
2778:
2772:
2771:
2769:
2768:
2755:
2749:
2748:
2746:
2745:
2729:
2723:
2722:
2720:
2719:
2714:on July 24, 2012
2710:. Archived from
2700:
2694:
2693:
2691:
2690:
2673:
2667:
2655:
2649:
2648:
2646:
2645:
2631:
2625:
2624:
2622:
2621:
2611:
2605:
2604:
2596:
2590:
2589:
2587:
2586:
2575:
2566:
2565:
2563:
2561:
2550:
2541:
2540:
2533:
2524:
2523:
2521:
2520:
2506:
2500:
2499:
2497:
2496:
2481:
2475:
2474:
2472:
2471:
2456:
2450:
2449:
2447:
2446:
2427:
2421:
2420:
2418:
2417:
2402:
2396:
2395:
2393:
2391:
2376:
2370:
2369:
2367:
2365:
2348:
2342:
2341:
2339:
2337:
2322:
2316:
2315:
2313:
2311:
2294:
2288:
2287:
2285:
2283:
2266:
2260:
2259:
2257:
2255:
2240:
2231:
2230:
2207:
2196:
2195:
2187:
2181:
2180:
2178:
2176:
2159:
2153:
2152:
2150:
2148:
2139:. Archived from
2126:
2115:
2114:
2112:
2110:
2093:
2087:
2086:
2084:
2082:
2067:
2061:
2060:
2054:
2052:
2037:
2031:
2030:
2008:
2002:
2001:
1973:
1917:
1916:
1915:
1831:
1830:
1829:
1795:
1794:
1793:
1767:
1766:
1765:
1732:
1731:
1730:
1693:
1692:
1691:
1668:The Black Baron
1665:
1664:
1663:
1637:
1636:
1635:
1617:5 December 1996
1605:
1604:
1603:
1577:
1576:
1575:
1546:
1545:
1544:
1519:Found guilty of
1510:
1509:
1508:
1482:
1481:
1480:
1454:
1453:
1452:
1425:
1424:
1423:
1397:
1396:
1395:
1366:
1365:
1364:
1311:
1310:
1309:
1279:
1278:
1277:
1251:
1250:
1249:
1213:
1212:
1211:
1168:
1167:
1166:
1152:28 January 2005
1137:
1136:
1135:
1105:
1104:
1103:
1074:
1073:
1072:
1035:
1034:
1033:
1007:
1006:
1005:
991:1 February 2013
949:
948:
947:
905:
904:
903:
880:computer hacking
876:money laundering
833:Hamza Bendelladj
792:
791:
790:
693:
660:zombie computers
645:Sundstrand Corp.
529:
522:
515:
402:Network security
103:Hacker Manifesto
42:Computer hacking
33:
28:reliable sources
4187:
4186:
4182:
4181:
4180:
4178:
4177:
4176:
4147:
4146:
4137:
4135:
4126:
4110:
4103:
4101:
4096:
4093:
4088:
4078:
4076:
4065:
4064:
4060:
4050:
4048:
4037:
4036:
4029:
4019:
4018:
4014:
4004:
4003:
3999:
3989:
3987:
3981:
3980:
3973:
3960:
3958:
3949:
3948:
3944:
3934:
3932:
3923:
3922:
3918:
3908:
3906:
3890:
3889:
3882:
3872:
3870:
3859:
3858:
3847:
3837:
3835:
3821:
3820:
3816:
3806:
3804:
3793:
3792:
3785:
3777:
3770:
3763:
3762:
3758:
3749:
3747:
3743:
3736:
3729:
3728:
3724:
3714:
3712:
3699:
3698:
3691:
3684:
3663:
3662:
3655:
3648:
3627:
3626:
3622:
3613:
3611:
3601:
3600:
3596:
3589:mycitypaper.com
3582:
3581:
3577:
3567:
3565:
3554:
3553:
3546:
3536:
3534:
3522:
3521:
3514:
3504:
3502:
3493:
3492:
3488:
3478:
3476:
3467:
3466:
3462:
3452:
3450:
3437:
3436:
3432:
3422:
3420:
3411:
3410:
3403:
3393:
3391:
3380:
3379:
3375:
3365:
3363:
3347:
3346:
3342:
3332:
3330:
3321:
3320:
3316:
3306:
3304:
3295:
3294:
3287:
3277:
3275:
3262:
3261:
3254:
3244:
3242:
3228:
3227:
3220:
3210:
3208:
3199:
3198:
3194:
3187:
3174:
3173:
3169:
3159:
3157:
3137:
3136:
3129:
3119:
3117:
3104:
3103:
3099:
3089:
3087:
3072:
3071:
3067:
3057:
3055:
3054:on May 16, 2011
3041:
3040:
3033:
3023:
3021:
3020:on May 31, 2009
3007:
3006:
3002:
2992:
2990:
2981:
2980:
2976:
2966:
2964:
2959:
2958:
2951:
2941:
2939:
2930:
2929:
2925:
2915:
2913:
2903:
2902:
2898:
2889:
2887:
2884:www.justice.gov
2878:
2877:
2873:
2865:
2861:
2860:
2856:
2847:
2845:
2841:
2840:
2836:
2831:Wayback Machine
2819:
2815:
2805:
2801:
2791:
2789:
2780:
2779:
2775:
2766:
2764:
2761:
2757:
2756:
2752:
2743:
2741:
2735:
2731:
2730:
2726:
2717:
2715:
2702:
2701:
2697:
2688:
2686:
2680:
2675:
2674:
2670:
2656:
2652:
2643:
2641:
2633:
2632:
2628:
2619:
2617:
2613:
2612:
2608:
2598:
2597:
2593:
2584:
2582:
2577:
2576:
2569:
2559:
2557:
2552:
2551:
2544:
2535:
2534:
2527:
2518:
2516:
2508:
2507:
2503:
2494:
2492:
2489:www.justice.gov
2483:
2482:
2478:
2469:
2467:
2464:www.justice.gov
2458:
2457:
2453:
2444:
2442:
2441:on 26 July 2024
2429:
2428:
2424:
2415:
2413:
2404:
2403:
2399:
2389:
2387:
2378:
2377:
2373:
2363:
2361:
2360:. July 11, 2006
2350:
2349:
2345:
2335:
2333:
2324:
2323:
2319:
2309:
2307:
2296:
2295:
2291:
2281:
2279:
2268:
2267:
2263:
2253:
2251:
2242:
2241:
2234:
2227:
2219:. p. 222.
2210:
2208:
2199:
2189:
2188:
2184:
2174:
2172:
2161:
2160:
2156:
2146:
2144:
2128:
2127:
2118:
2108:
2106:
2095:
2094:
2090:
2080:
2078:
2069:
2068:
2064:
2050:
2048:
2039:
2038:
2034:
2027:
2010:
2009:
2005:
1998:
1990:. p. 336.
1975:
1974:
1963:
1959:
1947:
1911:
1910:
1909:
1825:
1824:
1823:
1808:code) owned by
1789:
1788:
1787:
1761:
1760:
1759:
1726:
1725:
1724:
1687:
1686:
1685:
1671:United Kingdom
1659:
1658:
1657:
1631:
1630:
1629:
1599:
1598:
1597:
1571:
1570:
1569:
1540:
1539:
1538:
1525:tickling videos
1504:
1503:
1502:
1476:
1475:
1474:
1448:
1447:
1446:
1431:United Kingdom
1419:
1418:
1417:
1391:
1390:
1389:
1360:
1359:
1358:
1317:United Kingdom
1305:
1304:
1303:
1273:
1272:
1271:
1245:
1244:
1243:
1207:
1206:
1205:
1179:computer crimes
1162:
1161:
1160:
1131:
1130:
1129:
1101:Cameron Lacroix
1099:
1098:
1097:
1091:
1068:
1067:
1066:
1029:
1028:
1027:
1001:
1000:
999:
981:Fortezza/Xakep
977:David Schrooten
960:
955:United Kingdom
943:
942:
941:
920:Bank of America
899:
898:
897:
786:
785:
784:
724:United Kingdom
691:
675:Albert Gonzalez
545:computer crimes
533:
504:
503:
473:
465:
464:
417:
407:
406:
387:
377:
376:
302:
292:
291:
277:
267:
266:
237:
227:
226:
207:
197:
196:
182:Security BSides
157:
147:
146:
92:
78:
77:
73:List of hackers
53:
31:
12:
11:
5:
4185:
4183:
4175:
4174:
4169:
4164:
4159:
4157:Cybercriminals
4149:
4148:
4145:
4144:
4134:on 30 May 2013
4124:
4092:
4091:External links
4089:
4087:
4086:
4058:
4027:
4012:
3997:
3971:
3942:
3916:
3880:
3845:
3814:
3783:
3780:on 2012-08-21.
3756:
3722:
3689:
3682:
3653:
3646:
3620:
3594:
3575:
3544:
3512:
3501:. July 6, 2001
3486:
3460:
3430:
3401:
3373:
3340:
3314:
3285:
3252:
3230:Poulsen, Kevin
3218:
3192:
3185:
3167:
3127:
3097:
3065:
3031:
3000:
2974:
2949:
2923:
2896:
2871:
2854:
2834:
2813:
2799:
2788:. 24 June 2013
2773:
2750:
2737:(in Russian).
2724:
2695:
2682:(in Russian).
2668:
2650:
2626:
2606:
2591:
2567:
2542:
2525:
2501:
2476:
2451:
2422:
2412:. 5 April 2019
2397:
2371:
2343:
2317:
2289:
2261:
2232:
2225:
2197:
2182:
2154:
2143:on May 1, 2009
2131:"Hacker Speak"
2116:
2088:
2062:
2032:
2025:
2003:
1996:
1977:Bruce Sterling
1960:
1958:
1955:
1954:
1953:
1946:
1943:
1940:
1939:
1936:
1933:
1926:
1925:United States
1923:
1918:
1906:
1905:
1902:
1899:
1890:Data Control,
1880:
1879:United States
1877:
1874:
1870:
1869:
1866:
1863:
1860:
1857:
1854:
1848:
1847:
1844:
1841:
1838:
1837:United States
1835:
1832:
1820:
1819:
1816:
1813:
1802:
1801:United States
1799:
1796:
1784:
1783:
1780:
1777:
1774:
1771:
1768:
1756:
1755:
1748:
1745:
1739:
1736:
1733:
1721:
1720:
1717:
1714:
1710:
1709:
1706:
1703:
1700:
1699:United States
1697:
1694:
1682:
1681:
1678:
1675:
1672:
1669:
1666:
1654:
1653:
1650:
1649:10 April 1995
1647:
1644:
1643:United States
1641:
1638:
1626:
1625:
1618:
1615:
1612:
1609:
1608:Mendax/profff
1606:
1594:
1593:
1590:
1589:9 August 1999
1587:
1584:
1583:United States
1581:
1578:
1566:
1565:
1562:
1559:
1555:Two counts of
1553:
1552:United States
1550:
1547:
1542:Jonathan James
1535:
1534:
1531:
1528:
1521:email bombings
1517:
1516:United States
1514:
1513:Terri DiSisto
1511:
1499:
1498:
1495:
1492:
1489:
1488:United States
1486:
1483:
1471:
1470:
1467:
1464:
1461:
1458:
1455:
1450:Ehud Tenenbaum
1443:
1442:
1439:
1436:
1432:
1429:
1426:
1414:
1413:
1410:
1407:
1404:
1401:
1398:
1386:
1385:
1382:
1379:
1373:
1370:
1367:
1355:
1354:
1344:Home Secretary
1340:
1337:
1318:
1315:
1312:
1300:
1299:
1296:
1293:
1286:
1285:United States
1283:
1280:
1275:David L. Smith
1268:
1267:
1264:
1261:
1258:
1257:United States
1255:
1252:
1240:
1239:
1236:
1233:
1222:
1219:
1214:
1202:
1201:
1198:
1195:
1175:
1174:United States
1172:
1169:
1157:
1156:
1153:
1150:
1144:
1143:United States
1141:
1138:
1126:
1125:
1122:
1119:
1112:
1111:United States
1109:
1106:
1094:
1093:
1088:
1085:
1081:
1080:United States
1078:
1075:
1063:
1062:
1059:
1056:
1042:
1041:United States
1039:
1036:
1024:
1023:
1020:
1017:
1014:
1011:
1008:
996:
995:
992:
989:
985:
982:
979:
973:
972:
969:
966:
956:
953:
950:
938:
937:
930:
927:
912:
909:
906:
894:
893:
886:
883:
873:
872:United States
870:
867:
861:
860:
857:
856:23 April 2016
854:
841:
838:
835:
829:
828:
825:
822:
819:
816:
813:
809:
808:
805:
802:
799:
796:
793:
788:Roman Seleznev
781:
780:
777:
774:
771:
770:United States
768:
765:
761:
760:
757:
754:
751:
750:United States
748:
743:
739:
738:
735:
732:
725:
722:
719:
717:Elliott Gunton
713:
712:
709:
706:
705:Conviction(s)
703:
700:
697:
690:
687:
557:identity theft
535:
534:
532:
531:
524:
517:
509:
506:
505:
502:
501:
494:
491:Nuts and Volts
487:
482:
474:
471:
470:
467:
466:
463:
462:
453:
447:
441:
438:Legion of Doom
435:
429:
424:
418:
413:
412:
409:
408:
405:
404:
399:
394:
388:
383:
382:
379:
378:
375:
374:
369:
364:
359:
354:
349:
344:
339:
334:
329:
324:
319:
314:
309:
303:
298:
297:
294:
293:
290:
289:
284:
278:
275:Practice sites
273:
272:
269:
268:
265:
264:
259:
254:
249:
244:
238:
233:
232:
229:
228:
225:
224:
219:
214:
208:
205:Computer crime
203:
202:
199:
198:
195:
194:
189:
184:
179:
174:
169:
164:
158:
153:
152:
149:
148:
145:
144:
143:
142:
137:
132:
121:
116:
111:
106:
99:
93:
86:Hacker culture
84:
83:
80:
79:
76:
75:
70:
65:
63:Cryptovirology
60:
54:
49:
48:
45:
44:
38:
37:
13:
10:
9:
6:
4:
3:
2:
4184:
4173:
4170:
4168:
4165:
4163:
4160:
4158:
4155:
4154:
4152:
4133:
4129:
4125:
4121:
4115:
4099:
4095:
4094:
4090:
4074:
4073:
4068:
4062:
4059:
4051:September 11,
4047:. May 1, 1983
4046:
4045:
4040:
4034:
4032:
4028:
4023:
4016:
4013:
4008:
4001:
3998:
3985:
3978:
3976:
3972:
3968:
3957:
3953:
3946:
3943:
3931:
3927:
3920:
3917:
3904:
3900:
3899:
3894:
3887:
3885:
3881:
3868:
3867:
3862:
3856:
3854:
3852:
3850:
3846:
3833:
3829:
3828:CNET Networks
3825:
3818:
3815:
3802:
3801:
3796:
3790:
3788:
3784:
3776:
3769:
3768:
3760:
3757:
3746:on 2011-05-21
3742:
3735:
3734:
3726:
3723:
3710:
3706:
3702:
3696:
3694:
3690:
3685:
3683:0-8160-4978-5
3679:
3675:
3670:
3669:
3660:
3658:
3654:
3649:
3643:
3639:
3634:
3633:
3624:
3621:
3610:on 2013-08-08
3609:
3605:
3598:
3595:
3590:
3586:
3579:
3576:
3563:
3562:
3557:
3551:
3549:
3545:
3537:September 11,
3533:
3529:
3525:
3524:Kevin Poulsen
3519:
3517:
3513:
3505:September 11,
3500:
3496:
3490:
3487:
3479:September 11,
3475:
3471:
3464:
3461:
3448:
3444:
3440:
3434:
3431:
3418:
3414:
3408:
3406:
3402:
3390:
3389:
3384:
3377:
3374:
3361:
3357:
3356:
3351:
3344:
3341:
3329:
3325:
3318:
3315:
3303:
3299:
3292:
3290:
3286:
3273:
3269:
3265:
3259:
3257:
3253:
3241:
3240:
3235:
3231:
3225:
3223:
3219:
3206:
3202:
3196:
3193:
3188:
3186:9781616928056
3182:
3178:
3171:
3168:
3155:
3151:
3147:
3146:
3141:
3134:
3132:
3128:
3115:
3111:
3107:
3101:
3098:
3086:on 2011-06-06
3085:
3081:
3080:
3075:
3069:
3066:
3053:
3049:
3045:
3038:
3036:
3032:
3019:
3015:
3011:
3004:
3001:
2988:
2984:
2978:
2975:
2962:
2956:
2954:
2950:
2938:
2934:
2927:
2924:
2911:
2907:
2900:
2897:
2885:
2881:
2875:
2872:
2864:
2858:
2855:
2844:
2838:
2835:
2832:
2828:
2824:
2823:
2817:
2814:
2810:
2809:
2803:
2800:
2787:
2783:
2777:
2774:
2762:
2754:
2751:
2740:
2736:
2728:
2725:
2713:
2709:
2705:
2699:
2696:
2685:
2681:
2672:
2669:
2665:
2661:
2660:
2654:
2651:
2640:
2636:
2630:
2627:
2616:
2610:
2607:
2602:
2595:
2592:
2580:
2574:
2572:
2568:
2556:
2549:
2547:
2543:
2538:
2532:
2530:
2526:
2515:
2511:
2505:
2502:
2490:
2486:
2480:
2477:
2465:
2461:
2455:
2452:
2440:
2436:
2432:
2426:
2423:
2411:
2407:
2401:
2398:
2385:
2381:
2375:
2372:
2359:
2358:
2353:
2347:
2344:
2331:
2327:
2321:
2318:
2306:
2305:
2300:
2293:
2290:
2278:
2277:
2272:
2265:
2262:
2254:September 11,
2250:
2246:
2239:
2237:
2233:
2228:
2226:1-4116-4423-9
2222:
2218:
2214:
2206:
2204:
2202:
2198:
2193:
2186:
2183:
2175:September 11,
2171:. May 1, 1984
2170:
2169:
2164:
2158:
2155:
2142:
2138:
2137:
2132:
2125:
2123:
2121:
2117:
2105:
2104:
2103:New York Post
2099:
2092:
2089:
2076:
2072:
2066:
2063:
2059:
2047:
2043:
2036:
2033:
2028:
2026:0-415-18072-4
2022:
2018:
2014:
2007:
2004:
1999:
1997:0-553-56370-X
1993:
1989:
1985:
1983:
1978:
1972:
1970:
1968:
1966:
1962:
1956:
1952:
1949:
1948:
1944:
1937:
1934:
1931:
1927:
1924:
1922:
1919:
1914:
1913:Gerald Wondra
1908:
1907:
1903:
1900:
1897:
1893:
1889:
1885:
1881:
1878:
1876:The Sprinter
1875:
1872:
1871:
1867:
1864:
1861:
1858:
1853:
1850:
1849:
1845:
1843:7 March 1991
1842:
1839:
1836:
1833:
1828:
1822:
1821:
1817:
1815:12 June 1991
1814:
1811:
1807:
1803:
1800:
1797:
1792:
1786:
1785:
1781:
1778:
1775:
1772:
1769:
1764:
1763:Richard Jones
1758:
1757:
1753:
1749:
1746:
1744:
1740:
1737:
1734:
1729:
1723:
1722:
1718:
1715:
1712:
1711:
1707:
1704:
1701:
1696:Phiber Optik
1690:
1683:
1679:
1676:
1673:
1670:
1667:
1662:
1656:
1655:
1651:
1648:
1645:
1642:
1639:
1634:
1633:Kevin Poulsen
1628:
1627:
1623:
1619:
1616:
1613:
1610:
1607:
1602:
1596:
1595:
1591:
1588:
1585:
1582:
1579:
1574:
1573:Kevin Mitnick
1568:
1567:
1563:
1560:
1558:
1554:
1551:
1548:
1543:
1537:
1536:
1532:
1529:
1526:
1522:
1518:
1515:
1512:
1507:
1506:David D'Amato
1501:
1500:
1496:
1494:9 March 2001
1493:
1490:
1487:
1484:
1479:
1473:
1472:
1468:
1466:15 June 2001
1465:
1462:
1459:
1456:
1451:
1445:
1444:
1440:
1437:
1433:
1430:
1427:
1422:
1416:
1415:
1411:
1408:
1405:
1402:
1399:
1394:
1393:Michael Calce
1388:
1387:
1383:
1380:
1378:
1374:
1371:
1368:
1363:
1357:
1356:
1352:
1349:withdrew her
1348:
1345:
1341:
1338:
1335:
1331:
1327:
1323:
1319:
1316:
1313:
1308:
1307:Gary McKinnon
1302:
1301:
1297:
1294:
1291:
1290:Melissa virus
1287:
1284:
1281:
1276:
1270:
1269:
1265:
1262:
1259:
1256:
1253:
1248:
1242:
1241:
1237:
1234:
1231:
1227:
1223:
1220:
1218:
1215:
1210:
1204:
1203:
1199:
1197:15 July 2004
1196:
1194:
1193:
1188:
1184:
1180:
1177:One-count of
1176:
1173:
1165:
1159:
1158:
1154:
1151:
1149:
1145:
1142:
1139:
1134:
1128:
1127:
1123:
1120:
1117:
1113:
1110:
1107:
1102:
1096:
1095:
1089:
1086:
1082:
1079:
1076:
1071:
1065:
1064:
1060:
1057:
1054:
1050:
1047:
1043:
1040:
1037:
1032:
1026:
1025:
1021:
1018:
1015:
1012:
1009:
1004:
998:
997:
993:
990:
986:
983:
980:
978:
975:
974:
970:
967:
964:
957:
954:
951:
946:
940:
939:
935:
931:
929:24 June 2013
928:
925:
921:
917:
913:
910:
902:
896:
895:
891:
887:
884:
881:
877:
874:
871:
868:
866:
865:Ross Ulbricht
863:
862:
858:
855:
853:
851:
848:
842:
839:
836:
834:
831:
830:
826:
823:
820:
817:
814:
811:
810:
806:
803:
800:
797:
794:
789:
783:
782:
778:
775:
772:
769:
763:
762:
758:
756:January 2024
755:
752:
749:
747:
744:
741:
740:
736:
733:
730:
726:
723:
721:Glubz/planet
720:
718:
715:
714:
694:
688:
686:
684:
683:Kevin Mitnick
680:
676:
671:
669:
665:
661:
657:
652:
650:
646:
642:
638:
637:Gerald Wondra
634:
630:
626:
622:
618:
617:414 area code
614:
609:
607:
603:
599:
595:
587:
583:
577:
576:Kevin Poulsen
573:
572:Kevin Mitnick
569:
564:
560:
558:
554:
550:
546:
542:
530:
525:
523:
518:
516:
511:
510:
508:
507:
500:
499:
495:
493:
492:
488:
486:
483:
481:
480:
476:
475:
469:
468:
461:
457:
454:
451:
448:
445:
442:
439:
436:
433:
430:
428:
425:
423:
420:
419:
416:
411:
410:
403:
400:
398:
395:
393:
390:
389:
386:
381:
380:
373:
370:
368:
365:
363:
360:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
304:
301:
296:
295:
288:
285:
283:
280:
279:
276:
271:
270:
263:
262:Vulnerability
260:
258:
255:
253:
250:
248:
245:
243:
240:
239:
236:
235:Hacking tools
231:
230:
223:
222:Script kiddie
220:
218:
215:
213:
210:
209:
206:
201:
200:
193:
190:
188:
185:
183:
180:
178:
175:
173:
170:
168:
165:
163:
160:
159:
156:
151:
150:
141:
138:
136:
133:
131:
128:
127:
126:
122:
120:
119:Maker culture
117:
115:
112:
110:
107:
105:
104:
100:
98:
95:
94:
91:
87:
82:
81:
74:
71:
69:
66:
64:
61:
59:
56:
55:
52:
47:
46:
43:
39:
35:
34:
29:
25:
21:
16:
4136:. Retrieved
4132:the original
4104:11 September
4102:. Retrieved
4077:. Retrieved
4070:
4061:
4049:. Retrieved
4042:
4021:
4015:
4006:
4000:
3988:. Retrieved
3966:
3959:. Retrieved
3956:RISKS Digest
3945:
3933:. Retrieved
3930:RISKS Digest
3919:
3907:. Retrieved
3903:the original
3896:
3871:. Retrieved
3864:
3836:. Retrieved
3832:the original
3817:
3805:. Retrieved
3803:. April 1994
3798:
3775:the original
3766:
3759:
3748:. Retrieved
3741:the original
3732:
3725:
3713:. Retrieved
3709:the original
3667:
3631:
3623:
3612:. Retrieved
3608:the original
3602:Rizza, Joe.
3597:
3588:
3578:
3566:. Retrieved
3559:
3535:. Retrieved
3532:The Register
3531:
3503:. Retrieved
3498:
3489:
3477:. Retrieved
3474:The Register
3473:
3463:
3451:. Retrieved
3447:the original
3433:
3421:. Retrieved
3417:The Register
3416:
3392:. Retrieved
3386:
3376:
3364:. Retrieved
3360:the original
3353:
3343:
3331:. Retrieved
3328:The Register
3327:
3317:
3305:. Retrieved
3302:The Register
3301:
3276:. Retrieved
3272:the original
3243:. Retrieved
3237:
3209:. Retrieved
3204:
3195:
3176:
3170:
3158:. Retrieved
3154:the original
3143:
3118:. Retrieved
3114:the original
3100:
3088:. Retrieved
3084:the original
3079:CRN Magazine
3077:
3068:
3056:. Retrieved
3052:the original
3047:
3022:. Retrieved
3018:the original
3003:
2991:. Retrieved
2986:
2977:
2967:December 27,
2965:. Retrieved
2942:February 15,
2940:. Retrieved
2936:
2926:
2916:February 15,
2914:. Retrieved
2910:Threat Level
2909:
2899:
2888:. Retrieved
2886:. 2015-03-09
2883:
2874:
2857:
2846:. Retrieved
2837:
2820:
2816:
2806:
2802:
2790:. Retrieved
2785:
2776:
2765:. Retrieved
2753:
2742:. Retrieved
2727:
2716:. Retrieved
2712:the original
2698:
2687:. Retrieved
2671:
2664:De Standaard
2658:
2653:
2642:. Retrieved
2638:
2629:
2618:. Retrieved
2609:
2600:
2594:
2583:. Retrieved
2558:. Retrieved
2517:. Retrieved
2513:
2504:
2493:. Retrieved
2491:. 2020-08-13
2488:
2479:
2468:. Retrieved
2466:. 2019-11-12
2463:
2454:
2443:. Retrieved
2439:the original
2425:
2414:. Retrieved
2400:
2388:. Retrieved
2384:the original
2374:
2362:. Retrieved
2355:
2346:
2334:. Retrieved
2330:the original
2320:
2308:. Retrieved
2302:
2292:
2280:. Retrieved
2274:
2264:
2252:. Retrieved
2249:CNET Reviews
2212:
2191:
2185:
2173:. Retrieved
2166:
2157:
2145:. Retrieved
2141:the original
2134:
2107:. Retrieved
2101:
2091:
2079:. Retrieved
2065:
2056:
2049:. Retrieved
2035:
2012:
2006:
1980:
1898:subsidiary)
1791:Leonard Rose
1478:Dennis Moran
1438:6 July 2001
1421:Raphael Gray
1372:Netherlands
1190:
984:Netherlands
968:16 May 2013
945:Lewys Martin
885:29 May 2015
847:Trojan horse
844:
818:Netherlands
702:Nationality
672:
653:
610:
591:
570:(left) with
538:
496:
489:
477:
472:Publications
317:Trojan horse
282:HackThisSite
101:
20:dynamic list
15:
2739:RIA Novosti
2390:January 22,
2364:January 22,
2336:January 22,
2310:January 22,
2282:January 22,
1935:1 May 1983
1901:7 May 1986
1852:Markus Hess
1743:ZARDOZ file
1640:Dark Dante
1351:extradition
1347:Theresa May
1295:1 May 2002
1164:Adrian Lamo
1087:8 May 2006
1031:Samy Kamkar
764:Tyler King
746:Pompompurin
568:Adrian Lamo
485:Hacker News
372:Infostealer
155:Conferences
109:Hackerspace
4151:Categories
4138:2 February
3990:August 23,
3873:August 23,
3807:August 23,
3750:2011-09-13
3715:August 23,
3614:2013-05-02
3568:August 23,
3239:Wired News
3160:August 23,
3110:Sophos Plc
2890:2021-08-01
2848:2021-08-01
2767:2011-11-26
2744:2010-12-04
2718:2010-11-02
2689:2010-11-02
2644:2018-05-24
2639:Al Jazeera
2620:2016-05-23
2585:2018-05-26
2519:2022-04-30
2495:2022-04-30
2470:2022-04-30
2445:2024-09-01
2416:2024-09-01
1957:References
1888:Sundstrand
1773:Australia
1738:Australia
1689:Mark Abene
1661:Chris Pile
1611:Australia
1362:Jan de Wit
1187:LexisNexis
1116:LexisNexis
679:Max Butler
606:black hats
586:Mark Abene
342:Logic bomb
337:Ransomware
114:Hacktivism
18:This is a
3561:USA Today
3453:March 27,
3245:April 21,
2017:Routledge
1884:Microsoft
1798:Terminus
1770:Electron
1457:Analyzer
1400:MafiaBoy
1369:OnTheFly
1183:Microsoft
932:Signed a
685:in 1999.
641:Microsoft
621:Milwaukee
615:from the
549:computers
541:convicted
460:Blue team
452:(defunct)
446:(defunct)
440:(defunct)
434:(defunct)
422:Anonymous
362:Web shell
212:Crimeware
192:Summercon
140:White hat
130:Black hat
123:Types of
97:Hackathon
58:Phreaking
4114:cite web
3838:June 28,
3638:O'Reilly
3499:BBC News
3355:PC World
3333:June 22,
3211:9 August
3024:June 22,
2993:June 22,
2987:BBC News
2827:Archived
2708:CBS News
2136:PC World
1979:(1993).
1945:See also
1921:The 414s
1892:Kenworth
1859:Germany
1810:AT&T
1806:UNIX 3.2
1735:Phoenix
1549:c0mrade
1428:Curador
1330:cover-up
1282:Kwyjibo
1254:MagicFX
1221:Belgium
1217:Gigabyte
1181:against
1049:XSS worm
963:NullCrew
924:Wachovia
840:Algeria
815:Twinkie
798:Russian
711:Penalty
613:The 414s
598:computer
456:Red team
312:Backdoor
187:ShmooCon
135:Grey hat
3866:The Age
3423:May 23,
3394:May 23,
3366:May 23,
3307:May 10,
3278:May 11,
3120:May 11,
3090:May 11,
2912:. Wired
2792:31 July
2147:May 10,
2051:May 10,
1580:Condor
1485:Coolio
1460:Israel
1403:Canada
1140:T33kid
1053:MySpace
911:Russia
888:Double
795:Track2
699:Handle
664:botnets
566:Hacker
444:LulzSec
332:Spyware
307:Rootkit
300:Malware
252:Payload
242:Exploit
172:DEF CON
125:hackers
51:History
4079:May 9,
3986:. rbs2
3961:May 9,
3935:May 9,
3909:May 9,
3680:
3644:
3205:Sophos
3183:
3058:May 9,
2560:21 May
2223:
2209:pg 26—
2109:May 8,
2081:May 9,
2077:. 2001
2023:
1994:
1896:Boeing
1328:and a
1230:Sophos
952:sl1nk
850:SpyEye
594:hacker
498:Phrack
415:Groups
347:Botnet
287:Zone-H
3800:Wired
3778:(PDF)
3771:(PDF)
3744:(PDF)
3737:(PDF)
3388:Wired
2937:Wired
2866:(PDF)
2786:RAPSI
2357:Wired
2304:Wired
2276:Wired
1779:1993
1747:1993
1716:1993
1705:1991
1677:1995
1530:2001
1339:2002
1314:Solo
1263:2004
1108:cam0
1077:Gobo
1058:2007
1038:samy
1010:Weev
824:2017
776:2019
696:Name
322:Virus
90:ethic
26:with
4140:2012
4120:link
4106:2008
4081:2009
4053:2008
3992:2008
3963:2009
3937:2009
3911:2009
3875:2008
3840:2009
3809:2008
3717:2008
3678:ISBN
3642:ISBN
3570:2008
3539:2008
3507:2008
3481:2008
3455:2007
3425:2009
3396:2009
3368:2009
3335:2009
3309:2009
3280:2009
3247:2010
3213:2017
3181:ISBN
3162:2008
3122:2009
3092:2009
3060:2009
3026:2009
2995:2009
2969:2010
2944:2018
2918:2018
2794:2017
2562:2017
2392:2012
2366:2012
2338:2012
2312:2012
2284:2012
2256:2008
2221:ISBN
2217:Lulu
2177:2008
2149:2009
2111:2009
2083:2009
2053:2009
2021:ISBN
1992:ISBN
1834:rtm
1322:hack
1189:and
922:and
837:Bx1
631:and
574:and
357:HIDS
327:Worm
88:and
3674:416
1752:A$
1622:A$
1334:UFO
1332:of
619:in
551:or
543:of
367:RCE
4153::
4116:}}
4112:{{
4069:.
4041:.
4030:^
3974:^
3965:.
3954:.
3928:.
3895:.
3883:^
3863:.
3848:^
3826:.
3797:.
3786:^
3703:.
3692:^
3676:.
3656:^
3640:.
3636:.
3587:.
3558:.
3547:^
3530:.
3515:^
3497:.
3472:.
3441:.
3415:.
3404:^
3385:.
3352:.
3326:.
3300:.
3288:^
3266:.
3255:^
3236:.
3221:^
3203:.
3148:.
3142:.
3130:^
3108:.
3076:.
3046:.
3034:^
3012:.
2985:.
2952:^
2935:.
2908:.
2882:.
2784:.
2706:.
2662:,
2637:.
2570:^
2545:^
2528:^
2512:.
2487:.
2462:.
2433:.
2408:.
2354:.
2301:.
2273:.
2247:.
2235:^
2200:^
2165:.
2133:.
2119:^
2100:.
2073:.
2055:.
2044:.
1964:^
1886:,
1856:—
1232:.
1226:C#
1185:,
1171:—
908:—
767:—
670:.
647:,
643:,
627:,
458:/
4142:.
4122:)
4108:.
4083:.
4055:.
4024:.
4009:.
3994:.
3939:.
3913:.
3877:.
3842:.
3811:.
3753:.
3719:.
3686:.
3650:.
3617:.
3572:.
3541:.
3509:.
3483:.
3457:.
3427:.
3398:.
3370:.
3337:.
3311:.
3282:.
3249:.
3215:.
3189:.
3164:.
3124:.
3094:.
3062:.
3028:.
2997:.
2971:.
2946:.
2920:.
2893:.
2868:.
2851:.
2796:.
2770:.
2747:.
2721:.
2692:.
2647:.
2623:.
2603:.
2588:.
2539:.
2522:.
2498:.
2473:.
2448:.
2419:.
2394:.
2368:.
2340:.
2314:.
2286:.
2258:.
2229:.
2194:.
2179:.
2151:.
2113:.
2085:.
2029:.
2000:.
528:e
521:t
514:v
30:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.