Here is a list of notable hackers who are known for their hacking acts.

Contents

0–9

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

See also

Related Research Articles

<span class="mw-page-title-main">Andy Müller-Maguhn</span> German hacker (born 1971)

Andy Müller-Maguhn is a member of the German hacker association Chaos Computer Club (CCC). Having been a member since 1986, he was appointed as a spokesman for the club in 1990, and later served on its board until 2012. He runs a company that develops cryptophones.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

Masters of Deception (MOD) was a New York–based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution.

<span class="mw-page-title-main">Mark Abene</span> American InfoSec expert and former hacker (born 1972)

Mark Abene is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonym Phiber Optik, he was once a member of the hacker groups Legion of Doom and Masters of Deception.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He is currently the chief information officer of DARPA. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

weev Internet troll and hacker (born 1985)

Andrew Alan Escher Auernheimer, best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, he has been described as a neo-Nazi, white supremacist, and antisemitic conspiracy theorist. He has used many aliases when he has contacted the media, but most sources state that his real first name is Andrew.

<span class="mw-page-title-main">Julian Assange</span> Australian editor and founder of WikiLeaks (born 1971)

Julian Paul Assange is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of leaks from Chelsea Manning, a United States Army intelligence analyst: footage of a U.S. airstrike in Baghdad, U.S. military logs from the Afghanistan and Iraq wars, and U.S. diplomatic cables. Assange has won multiple awards for publishing and journalism.

<span class="mw-page-title-main">Bernd Fix</span> German hacker and computer security expert

Bernd Fix is a German hacker and computer security expert.

VPL Research was one of the first companies that developed and sold virtual reality products. It was founded by computer scientist Jaron Lanier in 1984. "VPL" stood for "Virtual Programming Languages". In 1990, VPL Research filed for bankruptcy and in 1999 all of its patents were bought by Sun Microsystems.

Elias Ladopoulos is a technologist and investor from New York City. Under the pseudonym Acid Phreak, he was a founder of the Masters of Deception (MOD) hacker group along with Phiber Optik and Scorpion. Referred to as The Gang That Ruled Cyberspace in a 1995 non-fiction book, MOD was at the forefront of exploiting telephone systems to hack into the private networks of major corporations. In his later career, Ladopoulos developed new techniques for electronic trading and computerized projections of stocks and shares performance, as well as working as a security consultant for the defense department. As of 2015, he is CEO of Supermassive Corp, which is a hacker-based incubation studio for technology start-ups.

The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails stolen by one or more hackers operating under the pseudonym "Guccifer 2.0" who are alleged to be Russian intelligence agency hackers, according to indictments carried out by the Mueller investigation. These emails were subsequently leaked by DCLeaks in June and July 2016 and by WikiLeaks on July 22, 2016, just before the 2016 Democratic National Convention. This collection included 19,252 emails and 8,034 attachments from the DNC, the governing body of the United States Democratic Party. The leak includes emails from seven key DNC staff members dating from January 2015 to May 2016. On November 6, 2016, WikiLeaks released a second batch of DNC emails, adding 8,263 emails to its collection. The emails and documents showed that the Democratic Party's national committee favored Clinton over her rival Bernie Sanders in the primaries. These releases caused significant harm to the Clinton campaign, and have been cited as a potential contributing factor to her loss in the general election against Donald Trump.

"Guccifer 2.0" is a persona which claimed to be the hacker(s) who gained unauthorized access to the Democratic National Committee (DNC) computer network and then leaked its documents to the media, the website WikiLeaks, and a conference event. Some of the documents "Guccifer 2.0" released to the media appear to be forgeries cobbled together from public information and previous hacks, which had been mixed with disinformation. According to indictments in February 2018, the persona is operated by Russian military intelligence agency GRU. On July 13, 2018, Special Counsel Robert Mueller indicted 12 GRU agents for allegedly perpetrating the cyberattacks.

DCLeaks was a website that was established in June 2016. It was responsible for publishing leaks of emails belonging to multiple prominent figures in the United States government and military. Cybersecurity research firms determined the site is a front for the Russian cyber-espionage group Fancy Bear. On July 13, 2018, an indictment was made against 12 Russian GRU military officers; it alleged that DCLeaks is part of a Russian military operation to interfere in the 2016 U.S. presidential election.

<span class="mw-page-title-main">Cris Thomas</span> American cybersecurity researcher and hacker

Cris Thomas is an American cybersecurity researcher, white hat hacker, and award winning best selling author. A founding member and researcher at the high-profile hacker security think tank L0pht Heavy Industries, Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1998) on the topic of government and homeland computer security, specifically warning of internet vulnerabilities and claiming that the group could "take down the internet within 30 minutes".

This is a timeline of events related to Russian interference in the 2016 United States elections, sorted by topics. It also includes events described in investigations into the many suspicious links between Trump associates and Russian officials and spies. Those investigations continued in 2017, the first and second halves of 2018, and 2019, largely as parts of the Crossfire Hurricane FBI investigation, the Special Counsel investigation, multiple ongoing criminal investigations by several State Attorneys General, and the investigation resulting in the Inspector General report on FBI and DOJ actions in the 2016 election.

This is a timeline of events related to Russian interference in the 2016 United States elections.

<span class="mw-page-title-main">Emma Best (journalist)</span> American journalist and whistleblower

Emma Best is an American investigative reporter and whistleblower. They gained national attention for their work with WikiLeaks and activist Julian Assange. Best is known for prolific filing of Freedom of Information Act (FOIA) requests on behalf of MuckRock and co-founding the whistleblower site Distributed Denial of Secrets (DDoSecrets).

References

  1. Gabriel, Trip (14 January 1995). "Reprogramming a Convicted Hacker; To His On-Line Friends, Phiber Optik Is a Virtual Hero". The New York Times . Retrieved 17 March 2015.
  2. 1 2 3 4 Bright, Peter (16 May 2013). ""The cutting edge of cybercrime"—Lulzsec hackers get up to 32 months in jail". Ars Technica . Retrieved 17 March 2015.
  3. Tweney, Dylan (29 March 2009). "DIY Freaks Flock to 'Hacker Spaces' Worldwide". wired.com. Wired.
  4. Emmanuel Goldstein; Mitch Altman; Bre Pettis; [dot]Ret; Bernie S.; Jim Vichench; Rob Vincent; Mike Castleman (13 January 2010). "Off The Hook 13 January" (MP3). Off The Hook, 2600: The Hacker Quarterly, WBAI.
  5. Rich, Nathaniel (1 December 2010). "The American Wikileaks Hacker". Rolling Stone . Retrieved 21 March 2015.
  6. Assange, Julian (22 September 2011). "Julian Assange: 'I am – like all hackers – a little bit autistic'". The Guardian .
  7. Moss, Stephen (13 July 2010). "Julian Assange: the whistleblower". The Guardian. Retrieved 21 March 2015.
  8. Zetter, Kim. "Appeals Court Overturns Conviction of AT&T Hacker 'Weev'". Wired. Wired.
  9. 1 2 Sterling, Bruce (1991). The Hacker Crackdown: Law and Disorder on the Electronic Frontier . Bantam Books. ISBN   0-553-56370-X.
  10. "Teen 'Cyber Anakin' hacker wants revenge on Russia after the MH17 crash". news.com.au . 5 March 2016. Retrieved 1 June 2019.
  11. 1 2 Rosenbaum, Ron (October 1971). "Secrets of the Little Blue Box". slate.com (7 October 2011). Esquire Magazine.
  12. Penenberg, Adam L. (10 October 1997). "Hacking the corporate ladder". Forbes .
  13. 1 2 Levy, Steven (1984). "Hackers: Heroes of the Computer Revolution". Doubleday Publishing. ISBN   0-385-19195-2.
  14. Clifford Stoll (1989). The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage . Doubleday. ISBN   0-385-24946-2.
  15. Phil Lapsley; Steve Wozniak (January 2013). Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell . Grove Press. ISBN   9780802120618.
  16. Martin, Douglas (20 August 2007). "Joybubbles, 58, Peter Pan of Phone Hackers, Dies". The New York Times .
  17. Kahn, Jennifer. "Wired 12.04: The Homeless Hacker v. The New York Times". Wired. Retrieved August 25, 2013.
  18. Heiman, J.D. (March 1997). "Banned from the Internet". Swing Magazine. pp. 70–75. Archived from the original on 15 February 1998. Retrieved 4 April 2015.
  19. Williams, Sam (1 March 2002). Free as in Freedom: Richard Stallman's Crusade for Free Software. O'Reilly Media. ISBN   0-596-00287-4 via Free Software Foundation 2nd edition ("2.0") online copy. (PDF).{{cite book}}: External link in |via= (help) Retrieved 17 March 2015.
  20. Reed, Dan; Wilson, David L. (November 6, 1998). "Whiz-kid hacker caught". San Jose Mercury News. Archived from the original on October 7, 2000.
  21. Penenberg, Adam (7 Feb 2000). "Space Rogue". Forbes . USA. Retrieved 25 May 2018.
  22. Michelle Slatalla; Joshua Quittner (December 1994). "Gang War in Cyberspace". archive.wired.com. Wired Magazine. p. 5. Retrieved 28 March 2015.
  23. "Suing Wikipedia: How a Dead Hacker Shut Down Wikipedia Germany". Spiegel Online . 20 January 2006. Retrieved 28 March 2015.
  24. Fred Thompson (24 June 1998). "Prepared Statement of Senator Fred Thompson, Chairman Committee on Governmental Affairs" (PDF). U.S. Federal Government.
  25. Diane Frank; Paula Shaki Trimble (1999-12-22). "Feds leave doors open for hackers". CNN. Archived from the original on 2010-05-29. Retrieved 2015-03-21.
  26. Hacker Mudge Gets DARPA Job