Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 457

Hacker

What is Hacker?

HackerA person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware.


The term hacker originated in 1960s MIT computing culture to describe enthusiasts who explored systems beyond their intended use. In modern security usage it is a neutral umbrella term: hackers can be white hats employed for defensive work, black hats committing crime, grey hats operating in between, hacktivists pursuing political goals, or researchers building security tools and protocols. Mainstream media often conflates hacker with cybercriminal, but professional communities prefer fine-grained labels like ethical hacker, threat actor, or red teamer. Legality depends entirely on authorization, jurisdiction, and intent, not on skill or toolset.

Examples

  1. 01

    A hacker reverse-engineering a smart-lock firmware to publish a coordinated-disclosure advisory.

  2. 02

    A self-taught hacker discovering an authentication bypass in an open-source library.

Frequently asked questions

What is Hacker?

A person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware. It belongs to the Defense & Operations category of cybersecurity.

What does Hacker mean?

A person with deep technical curiosity who uses creative problem-solving to understand, modify, or break systems, software, networks, or hardware.

How does Hacker work?

The term hacker originated in 1960s MIT computing culture to describe enthusiasts who explored systems beyond their intended use. In modern security usage it is a neutral umbrella term: hackers can be white hats employed for defensive work, black hats committing crime, grey hats operating in between, hacktivists pursuing political goals, or researchers building security tools and protocols. Mainstream media often conflates hacker with cybercriminal, but professional communities prefer fine-grained labels like ethical hacker, threat actor, or red teamer. Legality depends entirely on authorization, jurisdiction, and intent, not on skill or toolset.

How do you defend against Hacker?

Defences for Hacker typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Hacker?

Common alternative names include: Computer hacker, Security researcher.

Related terms