|Most of this page uses content from Wikipedia. The original article was at Security hacker. The page may have contained some inaccurate or outdated information, so please rewrite some parts to avoid plagiarism.|
The list of authors can be seen in the page history. As with Malware Wiki, the text of Wikipedia is available under the Creative Common Attribution-ShareAlike 3.0 License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.
This page has multiple issues. These issues most likely include issues with references and manual of style violations. Please help Malware Wiki by correcting these issues.
In common usage, a hacker is a person who breaks into computers.<ref>Sterling, Bruce. "Part 2(d)". The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2.</ref> The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.<ref>Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds". New York Post. Retrieved on October 21, 2008.</ref> Not all hackers are bad, and some act for good. It depends on their intentions.
A common label for hackers are Black Hat Hackers, Grey Hats, and White Hats. Black Hats mainly hack for financial or personal gain. They may spread viruses or malware, or steal, modify or destroy data. Grey Hats can look for vulnerabilities in a system or a website and they will notify the creator for a price. White Hats are generally workers or paid employees working for companies that look for coding mistakes and security holes.
A well known hacker group is called "Anonymous".
While other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), they are rarely used in mainstream context.