Thursday, June 2, 2011

Mfarhanonline:How 7 Black Hat Hackers Landed Legit Jobs

Fav Tag:

Mfarhanonline Social Media News: The Web Development Series is supported by Rackspace , the better way to do hosting. Learn more about Rackspace’s hosting solutions here . Everyone loves a bad-guy-gone-good story, and these black hat hackers who went from lives of crime to corporate nine-to-fives epitomize that genre. Let’s first make an important distinction: Hackers are not criminals . In fact, “hacker” is a term of high praise in the developer community. But when a hacker is dubbed a “black hat,” it means he or she has broken laws in the pursuit of hacking — perhaps even that he or she has done so for personal gain. However, many black hat hackers have gone legit in their more mature years. While it’s not uncommon to see former cybercriminals switching teams to work as IT security consultants, many of the more high-profile black hat hackers also find themselves writing books, doing journalism and even getting public speaking gigs in the cybersecurity world. So with that understanding, let’s turn our gaze upon these seven fascinating personalities who once hacked indiscriminately and are now employed respectably — some of them even by the companies they once hacked. Ashley Towns Towns created the first-ever iPhone worm , a rickrolling bit of code that only affected jailbroken iPhones. Mere weeks after the worm started spreading, Towns was hired by mogeneration , a company that develops iPhone apps, mostly for other clients such as TrueLocal, FoodWatch and Xumii. Call of Duty Hacker A 14-year-old Dublin schoolboy hacked into the Microsoft Xbox system this spring. In stark contrast to how Sony handled PlayStation hackers like geohot , Microsoft decided to work with the kid instead. The company hopes to teach the indubitably talented hacker to “use his skills for legitimate purposes.” Chri! stopher Tarnovsky Hardware hacker Christopher Tarnovsky began his journey repairing satellites for the U.S. Army. He started dabbling in illegal hacking in the late 1990s. However, he didn’t get into serious legal trouble until he was hired by Rupert Murdoch’s News Corp. to hack a rival company’s satellite TV chip. These days, Tarnovsky runs a hardware security firm and sticks to gray hat hacking, like proving Infineon’s “unhackable” chip was anything but in 2010. Jeff Moss Moss is the founder of the Black Hat and DEF CON computer hacker conferences. In the days before the Internet was a big thing, he ran BBSes for hacking and phreaking and provided a hub for a huge, underground network of hackers of all stripes, from the curious to the criminal. In 2009, he was was sworn into the U.S. Homeland Security Advisory Council. And in April 2011, Moss was named chief security officer for ICANN, the agency that oversees the Internet’s domain names. Michael Mooney Mooney is best known for creating the Twitter bug Mikeyy , a worm designed to showcase Twitter’s security vulnerabilities. While the exploit was more gray than black hat, the worm could have gotten Mooney into serious legal trouble. However, Twitter didn’t press charges, and the 17-year-old Mooney was offered jobs by two software development firms. The teen accepted a position at web app shop exqSoft Solutions. Owen Thor Walker Also known as “akill,” Walker was charged as (and admitted to) being the ringleader of an international hacking group that caused nearly $26 million of damage. In 2008 he was hired by TelstraClear, the New Zealand subsidiary of Australian telecommunications company Telstra, to work with its security division, DMZGlobal. Robert Tappan Morris Morris is best known for creating the first Internet worm, the Morris Worm, in 1988. Later, he co-founded an online store, Viaweb, with Paul Graham, who would later found startup incubator Y Combinator . Viaweb was one of the first web-! based co mputer applications. Now, Morris teaches computer science at MIT. Series Supported by Rackspace The Web Development Series is supported by Rackspace , the better way to do hosting. No more worrying about web hosting uptime. No more spending your time, energy and resources trying to stay on top of things like patching, updating, monitoring, backing up data and the like. Learn why. More Dev & Design Resources from Mfarhanonline: – How the WordPress SEO Plugin Can Help Your Blog INTERVIEW – Closed or Open Source: Which CMS is Right for Your Business? – A Look Back at Eight Years of WordPress – HOW TO: Get Started with the Less Framework – 4 Free Ways to Learn to Code Online image credits: iStockphoto , airportrait , Flickr/pikturz , Wikipedia , Wired , Flickr/ICANN More About: black hat , career , developers , hackers , jobs , web development series For more Dev & Design coverage: Follow Mfarhanonline Dev & Design on Twitter Become a Fan on Facebook Subscribe to the Dev & Design channel Download our free apps for Android , Mac , iPhone and iPad Social Media reviews series maintain by Mayya

Share and Enjoy: Print Digg Sphinn del.icio.us Facebook Mixx Google Bookmarks Blogplay Add to favorites BarraPunto Bitacoras.com BlinkList blogmarks Blogosphere News blogtercimlap connotea Current Design Float Diggita Diigo DotNetKicks DZone eKudos email Fark Faves Fleck FriendFeed FSDaily Global Grind Gwar HackerNews Haohao HealthRanker HelloTxt Hemidemi Hyves Identi.ca IndianPad Internetmedia Kirtsy laaik.it LaTafanera LinkaGoGo LinkArena LinkedIn Linkter Live Meneame MisterWong MisterWong.DE MOB MSN Reporter muti MyShare MySpace N4G Netvibes Netvouz NewsVine NuJIJ PDF Ping.fm Posterous Propeller QQ书签 Ratimarks Rec6 Reddit RSS Scoopeo Segnalo SheToldMe Simpy Slashdot Socialogs SphereIt StumbleUpon Suggest to Techmeme via Twitter Technorati ThisNext Tipd Tumblr Twitter Upnews viadeo FR Webnews.de Webride Wikio Wikio FR Wikio IT Wists Wykop Xerpi Yahoo! Bookmarks Yahoo! Buzz Yigg 豆瓣 豆瓣九点

http://www.mfarhanonline.com/2011060326302/how-7-black-hat-hackers-landed-legit-jobs/

0 comments :

Popular Posts