Most of this page uses content from Wikipedia. The original article was at Security hacker. The page may have contained some inaccurate or outdated information, so please edit it so it contains better information.
The list of authors can be seen in the page history. As with Malware Wiki, the text of Wikipedia is available under the Creative Common Attribution-ShareAlike 3.0 License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.

In common usage, a hacker is a person who breaks into computers.[1] The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[2] Not all hackers are bad, and some act for good. It depends on their intentions.


The Anonymous symbol

A common label for hackers are Black Hat Hackers, Grey Hats, and White Hats. Black Hats mainly hack for financial or personal gain. They may spread viruses or malware, or steal, modify or destroy data. Grey Hats can look for vulnerabilities in a system or a website and they will notify the creator for a price. White Hats are generally workers or paid employees working for companies that look for coding mistakes and security holes.

A well known hacker group is called "Anonymous".

While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context.

Hackers can also put malware on users' computers and find deadly exploits in their operating system and programs.

10 Biggest Computer Hacks Of All Time

10 Biggest Computer Hacks Of All Time


  1. Sterling, Bruce. "Part 2(d)". The Hacker Crackdown. McLean, Virginia: p. 61. ISBN 1-4043-0641-2.
  2. Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds". New York Post. Retrieved on October 21, 2008.

Community content is available under CC-BY-SA unless otherwise noted.