Hacker
What is Hacker?
HackerA person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware.
The term hacker originated in 1960s MIT computing culture to describe enthusiasts who explored systems beyond their intended use. In modern security usage it is a neutral umbrella term: hackers can be white hats employed for defensive work, black hats committing crime, grey hats operating in between, hacktivists pursuing political goals, or researchers building security tools and protocols. Mainstream media often conflates hacker with cybercriminal, but professional communities prefer fine-grained labels like ethical hacker, threat actor, or red teamer. Legality depends entirely on authorization, jurisdiction, and intent, not on skill or toolset.
● Examples
- 01
A hacker reverse-engineering a smart-lock firmware to publish a coordinated-disclosure advisory.
- 02
A self-taught hacker discovering an authentication bypass in an open-source library.
● Frequently asked questions
What is Hacker?
A person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware. It belongs to the Defense & Operations category of cybersecurity.
What does Hacker mean?
A person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware.
How does Hacker work?
The term hacker originated in 1960s MIT computing culture to describe enthusiasts who explored systems beyond their intended use. In modern security usage it is a neutral umbrella term: hackers can be white hats employed for defensive work, black hats committing crime, grey hats operating in between, hacktivists pursuing political goals, or researchers building security tools and protocols. Mainstream media often conflates hacker with cybercriminal, but professional communities prefer fine-grained labels like ethical hacker, threat actor, or red teamer. Legality depends entirely on authorization, jurisdiction, and intent, not on skill or toolset.
How do you defend against Hacker?
Defences for Hacker typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Hacker?
Common alternative names include: Computer hacker, Security researcher.
● Related terms
- defense-ops№ 390
Ethical Hacker
A security professional authorized to use offensive techniques against systems to identify weaknesses and help owners remediate them before adversaries exploit them.
- defense-ops№ 1234
White Hat Hacker
A security professional who uses offensive skills only with explicit authorization, to find and report vulnerabilities so defenders can fix them.
- defense-ops№ 098
Black Hat Hacker
A malicious threat actor who breaks into systems without authorization for personal gain, ideology, or harm, in violation of computer-crime laws.
- defense-ops№ 451
Grey Hat Hacker
A hacker who operates between ethical and unethical extremes, often probing systems without explicit authorization but typically with the intent to disclose, not harm.
- defense-ops№ 1145
Threat Actor
An individual or group that intentionally causes or attempts to cause harm to information systems, organisations, or people through cyber operations.
- defense-ops№ 458
Hacktivist
A threat actor who carries out cyber attacks to advance a political, social, or ideological cause rather than for financial gain or state intelligence objectives.