2010, the Year of the Hacker

If the WikiLeaks dump, and the subsequent cyberattacks, have made anything clear it’s this: 2010 belongs to hackers.

The Internet was originally intended for thousands of researchers, not billions of users who did not know and trust one another. The designers placed a higher priority on decentralization than on security. They never dreamed the Internet could be used for commercial purposes or that it would eventually control critical systems and undergird the world of finance. So it is not surprising that the Internet creators were comfortable with a network of networks rather than separate networks for government, finance and other sectors.

Hacking, the practice of getting your hands on computer tools, systems and documents – especially when it’s unauthorized – is nothing new: from MIT students in the 1950s to “phreakers” who manipulated telecom systems around the globe. But their impact has suddenly skyrocketed. Over the past decade, the digital medium in which hackers operate has become the single most important driver of cultural, commercial and geopolitical change in the world. And online, the limbs of everything from credit card companies to national security agencies lay far more unguarded than their real-world counterparts.

From easily obtainable cyberwarfare tools to being glorified in Stieg Larsson novels to jailbroken iPhones, hacker culture is also cycling from the underground to the mainstream.

“Hackers used to break into networks and pull classified data, but back in the day this information was kept amongst the community,” says Michael Calce, who, under the pseudonym Mafiaboy, became one of the most famous computer criminals in the world a decade ago when he managed to temporarily bring down the websites of several major companies, including Yahoo and CNN.

“Now that information is on a global pedestal. WikiLeaks is just an example, there’s going to be a lot more of this to come.”

Read More:
2010 may go down in history as the year of the hacker
The first global cyber war has begun
History of Hacking


This entry was posted in Internet and tagged , , .
Bookmark the permalink.

Related Posts:

  • Reviews of Security Suites for 2011September 30, 2010 Reviews of Security Suites for 2011 Here at RackNine we can never stress it enough how important it is to protect your computer from insidious attacks. Our technical […]
  • Potential Risks of Cloud ComputingJanuary 14, 2011 Potential Risks of Cloud Computing Even though Cloud Computing can greatly benefit both small and medium sized businesses by making accessible and affordable the kind of […]
  • Phishing Attacks on the riseOctober 2, 2010 Phishing Attacks on the rise A Phishing attack attempts to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a […]
  • Twitter Weekly Updates for 2010-08-01August 1, 2010 Twitter Weekly Updates for 2010-08-01 Search Analysis with Google Analytics: http://sixrevisions.com/productivity/10-reasons-you-shouldnt-be-a-designer/ # Rich Internet […]
  • How to set up CloudFlare with RackNineAugust 5, 2014 How to set up CloudFlare with RackNine CloudFlare is a global Content Delivery Network (CDN) and distributed Domain Name Server (DNS) provider, that acts as a reverse proxy for […]
  • Choosing a Reliable Web Host is the Key to SuccessFebruary 16, 2011 Choosing a Reliable Web Host is the Key to Success As far as the Internet is concerned, websites are the front display for anything that involves internet businesses, entertainment and […]

One thought on “2010, the Year of the Hacker

Leave a Reply