Mfarhanonline Social Media News: The Web Development Series is supported by Rackspace , the better way to do hosting. Learn more about Rackspace’s hosting solutions here . Everyone loves a bad-guy-gone-good story, and these black hat hackers who went from lives of crime to corporate nine-to-fives epitomize that genre. Let’s first make an important distinction: Hackers are not criminals . In fact, “hacker” is a term of high praise in the developer community. But when a hacker is dubbed a “black hat,” it means he or she has broken laws in the pursuit of hacking — perhaps even that he or she has done so for personal gain. However, many black hat hackers have gone legit in their more mature years. While it’s not uncommon to see former cybercriminals switching teams to work as IT security consultants, many of the more high-profile black hat hackers also find themselves writing books, doing journalism and even getting public speaking gigs in the cybersecurity world. So with that understanding, let’s turn our gaze upon these seven fascinating personalities who once hacked indiscriminately and are now employed respectably — some of them even by the companies they once hacked. Ashley Towns Towns created the first-ever iPhone worm , a rickrolling bit of code that only affected jailbroken iPhones. Mere weeks after the worm started spreading, Towns was hired by mogeneration , a company that develops iPhone apps, mostly for other clients such as TrueLocal, FoodWatch and Xumii. Call of Duty Hacker A 14-year-old Dublin schoolboy hacked into the Microsoft Xbox system this spring. In stark contrast to how Sony handled PlayStation hackers like geohot , Microsoft decided to work with the kid instead. The company hopes to teach the indubitably talented hacker to “use his skills for legitimate purposes.” Chri! stopher Tarnovsky Hardware hacker Christopher Tarnovsky began his journey repairing satellites for the U.S. Army. He started dabbling in illegal hacking in the late 1990s. However, he didn’t get into serious legal trouble until he was hired by Rupert Murdoch’s News Corp. to hack a rival company’s satellite TV chip. These days, Tarnovsky runs a hardware security firm and sticks to gray hat hacking, like proving Infineon’s “unhackable” chip was anything but in 2010. Jeff Moss Moss is the founder of the Black Hat and DEF CON computer hacker conferences. In the days before the Internet was a big thing, he ran BBSes for hacking and phreaking and provided a hub for a huge, underground network of hackers of all stripes, from the curious to the criminal. In 2009, he was was sworn into the U.S. Homeland Security Advisory Council. And in April 2011, Moss was named chief security officer for ICANN, the agency that oversees the Internet’s domain names. Michael Mooney Mooney is best known for creating the Twitter bug Mikeyy , a worm designed to showcase Twitter’s security vulnerabilities. While the exploit was more gray than black hat, the worm could have gotten Mooney into serious legal trouble. However, Twitter didn’t press charges, and the 17-year-old Mooney was offered jobs by two software development firms. The teen accepted a position at web app shop exqSoft Solutions. Owen Thor Walker Also known as “akill,” Walker was charged as (and admitted to) being the ringleader of an international hacking group that caused nearly $26 million of damage. In 2008 he was hired by TelstraClear, the New Zealand subsidiary of Australian telecommunications company Telstra, to work with its security division, DMZGlobal. Robert Tappan Morris Morris is best known for creating the first Internet worm, the Morris Worm, in 1988. Later, he co-founded an online store, Viaweb, with Paul Graham, who would later found startup incubator Y Combinator . Viaweb was one of the first web-! based co mputer applications. Now, Morris teaches computer science at MIT. Series Supported by Rackspace The Web Development Series is supported by Rackspace , the better way to do hosting. No more worrying about web hosting uptime. No more spending your time, energy and resources trying to stay on top of things like patching, updating, monitoring, backing up data and the like. Learn why. More Dev & Design Resources from Mfarhanonline: – How the WordPress SEO Plugin Can Help Your Blog INTERVIEW – Closed or Open Source: Which CMS is Right for Your Business? – A Look Back at Eight Years of WordPress – HOW TO: Get Started with the Less Framework – 4 Free Ways to Learn to Code Online image credits: iStockphoto , airportrait , Flickr/pikturz , Wikipedia , Wired , Flickr/ICANN More About: black hat , career , developers , hackers , jobs , web development series For more Dev & Design coverage: Follow Mfarhanonline Dev & Design on Twitter Become a Fan on Facebook Subscribe to the Dev & Design channel Download our free apps for Android , Mac , iPhone and iPad Social Media reviews series maintain by Mayya
Thursday, June 2, 2011
Mfarhanonline:How 7 Black Hat Hackers Landed Legit Jobs
Posted by
Unknown
at
11:15 PM
Fav Tag:
http://www.mfarhanonline.com/2011060326302/how-7-black-hat-hackers-landed-legit-jobs/
Subscribe to:
Post Comments
(
Atom
)
Popular Posts
-
Here are the videos of Atif Aslam’s concert held in Carlton Hotel Karachi on 18th April 2010 for those who have missed it, It was very diff...
-
Here are the videos of Atif Aslam’s concert held in Carlton Hotel Karachi on 18th April 2010 for those who have missed it, It was very diff...
-
Position Type:Part-time / full time Experience:5 - 8 Type:Online Marketing Type:SEO SEO Company In Pakistan , SEO services in cheap...
-
Hire SEO specialist from Hostrings for increasing traffic to your websites by organic SEO or by natural link building process and ranking in...
-
Here are the videos of Atif Aslam’s concert held in Carlton Hotel Karachi on 18th April 2010 for those who have missed it, It was very dif...
-
GEO 436 USA: AP – President Barack Obama’s administration on Monday asked a federal judge in Virginia to dismiss the state’s lawsuit alleg...
-
Geo436 ISLAMABAD: Prime Minister Syed Yusuf Raza Gilani has strongly condemned the suicide attack in Peshawar on Wednesday in which FC Comma...
-
Geo436 ISLAMABAD: Terrorists may exploit the chaos and misery caused by the floods in Pakistan to gain new recruits, President Asif Ali Zard...
-
Best Software House "Hostrings Technologies" Providing Best Services like Web Designing Web Development Web Applicati...
0 comments :
Post a Comment