Hacking pertains to the mischievous behaviour by the hackers by which they exploit the computer system or a private network in our device. They generally get access to unauthorized information and control our device or network. They access our personal information which is not a legal act.

Who are Hackers?

Hackers are persons who are proficient and experienced in computers, hardware, and software. Generally, one needs to have more expertise in misusing the system than building or developing one. They generally gather loads of information on operating systems (OS) and programming languages. They will be knowing all the possible techniques to alter the computer data or software. Hacking is generally done for financial reasons, spying, gaining power over someone or something, scamming etc. They generally steal personal information or destroy information, or they often install dangerous malware in our system without your assent or awareness.

How do Hackers find me?

Hackers find someone through the following ways:

  1. The private internet connections which you may connect has suspicious threats.
  2. Spamming emails.
  3. They even send suspicious links, by clicking them we would suffer.
  4. By continuously sending messages.
  5. Through multiple pop-ups on a website.
  6. They generally send messages like; you are going to win money if you click the link. You should beware of this spam.
  7. Through social networking sites by creating fake profiles.

What do Hackers do by accessing the system?

  1. Steal your personal information such as name, contact details.
  2. Steal your usernames and passwords.
  3. Fetch bank account details.
  4. Empty your credit and debit cards.
  5. Hijack bank accounts through your system.
  6. Selling your personal information to some third party for unlawful purposes is simply called black marketing.
  7. They install malicious malware in your system.
  8. Make shopping through your accounts.
  9. They can also send stolen information to someone through your device.
  10. They can also steal information related to your business.

Types of Hacking or Hackers:

Hackers focus on the security holes, that is, the weakness points in the security.

White Hat Hackers:

These people are termed to be good hackers. The hack to prevent their own security systems from being hacked. It belong to a particular organization, government agencies or company and work to improve security. In most ways, relate to “Ethical Hackers”. They generally prevent “Black Hat Hackers” from peeping into their systems. White Hat Hackers also have the same skills as Black Hat Hackers, but they use their skills in a noble way and work using system owners’ permissions.

Black Hat Hackers:

These people are termed, bad hackers. They hack for malicious purposes. Intentionally steal personal information or install some malware in the system. It exploit the laws for personal gains. They find vulnerable points and harm us. It are fraudulent and in some cases blackmail others for their personal benefits and always think in a malevolent manner.

Grey Hat Hackers:

There are somewhere in between white and black hat Hackers. These types of hackers’ hack with good intentions but might not hack completely in a decent or legal way. Their intention of hacking is not a criminal one. They break into the weak points of the system or software and intimate the owner regarding this and repair for some pay. The recommend or provide tools to patch vulnerabilities. But unauthorized access to one’s system would always be considered unethical or illegal.

Green Hat Hackers:

A Green hat hacker is also referred to as a script kiddie who is an inexperienced or unskilled hacker. The break into the system with the script or automated tools generated by black hat hackers in general. They usually have a compact understanding of the core theory or concept. There are new to hacking. They are new to hacking so they might not be knowing how to fix a problem if something went wrong while hacking. But the major difference is that green hat hackers are determined in doing their work and focus to improve their skills, while script kiddie just uses automated scripts and hack.

Blue Hat Hackers:

Blue hat Hackers are those who work outside of the organization or companies. Companies every so often invites them to debug or test vulnerabilities if any before they release some software into the market.
Microsoft generally arranges programs or conferences and invite them to cross-check its windows programs. That is why a few of the blue hat hackers are also called “Microsoft Hackers”.

Red Hat Hackers:

Red hat hackers are in some way related to White hat hackers. They also wanted to save the world from Black hat hackers but in an unlawful way that is an illegal way to achieve their goals. It generally go in the wrong way for doing the right things. Whenever they find a Black hat hacker they launch DDoS(Distributed Denial of Service) attacks and damage their systems with malware. They simply destroy the bad guys’ malware, server or resources for good to happen to the world but in an unethical way.


Phreaker is a person who breaks into the weak points of telephones rather than computers and exploits them.


Hacktivist is a person who uses hacking to circulate religious, social, ideological, or political messages. Hacktivism is also referred to as cyberterrorism or freedom of information. It sometimes looks like DDoS attacks. They make the information in such a way that only humans can understand but not the machine. It is mostly done by hijacking the websites and using them to send such information. Anonymous is the most famous hacktivist group.

What is Ethical Hacking?

Ethical hacking refers to the hacking which is legal. White hat hackers generally come under this type of hackers. They must get the permission of the owner before hacking. It should protect the privacy of the organization when hacking. They should transparently report all the weak points to the company or organization after hacking. Ethical hacking is compulsory for protecting or securing the organization’s information.

Also Read: What Is Data Loss Prevention?

Leave Comment

Your email address will not be published. Required fields are marked *