Psychological Profiling of Hacking Potential1

Total Page:16

File Type:pdf, Size:1020Kb

Psychological Profiling of Hacking Potential1 Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020 Psychological Profiling of Hacking Potential1 Joana Gaia Bina Ramamurthy G. Lawrence Sanders Department of Management Department of Computer Department of Management Science and Systems Science and Engineering Science and Systems University at Buffalo, SUNY University at Buffalo, SUNY University at Buffalo, SUNY Sean Patrick Sanders Shambhu Upadhyaya Xunyi Wang Department of Computer Department of Computer Department of Management Science and Engineering Science and Engineering Science and Systems University at Buffalo, SUNY University at Buffalo, SUNY University at Buffalo, SUNY Chul Woo Yoo Information Technology and Operations Management Florida Atlantic University Abstract Several suggestions will be made on what This paper investigates the psychological traits of organizations can do to address insider threats. individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon 1. Introduction entering the workforce. We examine the role of the Dark Triad, Opposition to Authority and Thrill- International Data Corporation (IDC) [1] estimates Seeking traits as regards the propensity of an that the amount of data stored will grow from 33 individual to be interested in White Hat, Black Hat, zettabytes to 175 zettabytes by 2025 (a zettabyte is a and Grey Hat hacking. A new set of scales were trillion gigabytes). The ongoing protection of this developed to assist in the delineation of the three hat batholith of organization and personal information is a categories. We also developed a scale to measure major challenge because a substantial amount of that each subject’s perception of the probability of being data has monetary and information value. The Privacy apprehended for violating privacy laws. Engaging in Rights Clearinghouse has been keeping a running tab criminal activity involves a choice where there are since 2005 on the number of data breaches. In 2005 consequences and opportunities, and individuals the number of data breaches made public was 8,804. perceive them differently, but they can be deterred if Now that number is approaching 11.6 billion [2] there is a likelihood of punishment, and the records. The eighteen largest breaches in 2018 punishment is severe. involved more than 10.3 million individuals [3]. The dark side of the abundance of personal The results suggest that individuals that are White information is that the information, even legally Hat, Grey Hat and Black Hat hackers score high on protected information can be compromised by trusted the Machiavellian and Psychopathy scales. We also insiders and by external hackers. A substantial portion found evidence that Grey Hatters oppose authority, of privacy violations including funds embezzlement, Black Hatters score high on the thrill-seeking pilfering of trade secrets, theft of customer dimension and White Hatters, the good guys, tend to information, theft of competitive information, and be Narcissists. Thrill-seeking was moderately related fraudulent activities can be traced to insiders important for White Hat hacking and Black hat [4]. The losses from insider attacks can be significant hacking. Opposition to Authority was important for [5]. The average cost of an insider attack is $8 million Grey Hat hacking. Narcissism was not statistically per year [6]. But the fallout from a breach can lead to significant in any of the models. The probability of long-term loss of customers, lawsuits and severely being apprehended had a negative effect on Grey Hat damaged reputations. Insiders can be current and and Black Hat hacking. former employees, contractors, and business partners 1 This material is based upon work supported by the NSF under grant No. DGE-1754085 URI: https://hdl.handle.net/10125/64014 978-0-9981331-3-3 Page 2230 (CC BY-NC-ND 4.0) that have access to an organization’s network, system, This paper is organized as follows: first, a literature or data. Insiders can engage in malicious or review on hacking motivation and dark triad is unintentional activity that negatively affects the provided, followed by the economics of crime confidentiality, integrity, and availability of an literature. Then, we propose core hypotheses for the organization’s information system [7]. empirical examination. Next, the research method However, despite the importance of insiders in employed for validating the instrument and data security management, an understanding of how their collection is discussed, followed by a test of the hacking intention is motivated and developed based on structural model using partial least squares (PLS)- personal traits is still lacking. Particularly, examining based structural equations. Our empirical findings are different hacking intentions as a white hat, a black hat, then summarized, and possible explanations are and a grey hat has not been attempted in the literature. provided. Lastly, in the final section, the theoretical This study addresses this gap in the literature by and practical implications of these results are bringing attention to Dark Triad, Opposition to examined, and recommendations for future research Authority and Thrill-Seeking traits regarding the directions are offered. propensity of an individual and examining their influence on the white hat, black hat, and grey hat 3. Prior Research on Hacking hacking intention. The current study seeks to address two research Motivation questions: 1. Are the Dark Triad personality traits Psychological profiling hackers has attracted consisting of Machiavellianism, substantial recent research interest [5, 9-13]. Narcissism, and Psychopathy, along with Motivations for participating in hacking behavior the Opposition to Authority and Thrill- include seeking revenge, ideology, fun, thrills, Seeking constructs related to behavioral survival, notoriety, recreation, and profit [5, 14, 15]. intentions to engage in White Hat, Black Madarie conducted a study on what motivates Hat, and Grey Hat hacking? hackers using Schwartz’s theory of motivation types 2. Does the perception of being caught and found that many hackers are motivated by what engaging in illegal violations of privacy they don’t like, rather than what they like [16]. Of laws moderate the relationship, and is it particular note, was the discrepancy between what the inversely related to hacking propensity? “experts” suggest is the motivating factor behind To answer these questions, we conducted a survey hackers, and what actually motivates hackers. Madarie with 439 individuals that will soon enter the postulates that the discrepancy in the literature reflects workforce. a cultural and background bias. That is, hackers may This research note makes a twofold contribution to report to experts what they have heard that motivates the security literature. The first major distinguishing them, rather than what actually motivates them. contribution of our study is that we developed a set of Madarie’s study found that hacking is a social activity, dependent variable scales to measure behavioral where the hacking frequency is driven by peer intentions to engage in legal White Hat, illegal Black recognition, respect and by the opportunity to engage Hat, and hacktivist Grey Hat hacking. They are the in team-play and not by the intellectual challenge of White Hat, Black Hat, and Grey Hat hacking personas. the activity, by curiosity and even to seek justice. We also used a short form of the Dark Triad called the Maasberg et al. proposed a research model that Dirty Dozen, and we incorporated thrill-seeking and integrated the Dark Triad and the Capability, Motive, opposition to authority constructs. and Opportunity (CMO) framework [17]. The CMO The second major contribution of our study is that framework is one of the classical models used to we also integrated the economics of crime and rational understand insiders and how cyber-attacks occur. In choice theory frameworks with the psychological the CMO model, the potential perpetrator needs to profile of the subjects. Engaging in criminal activity have the Capability to commit the attack, the Motive involves a choice where there are consequences and for attacking, and the Opportunity to carry out the opportunities, and individuals perceive them breach [18]. differently, and individuals can be deterred when there The Dark Triad refers to a group of three generally, is a likelihood of punishment, and the punishment is socially undesirable personality traits, including severe [8]. We also included a construct to determine Machiavellianism (manipulative, deceitful and if the propensity to engage in one of the hacking exploitive), Narcissism (self-centered and attention- activities is moderated by the probability of being seeking) and psychopathy (lack of remorse, cynical apprehended. Page 2231 and insensitive) [19-21]. These measures are related, 3. The Genesis of White Hat, Black Hat, but they are nevertheless, distinct constructs [19, 22]. and Grey Hat Hacking Many of the Dark Triad personality traits are used by the press and by security experts to describe criminal activity by insiders, but as noted by Maasberg The White Hat, Black Hat, and Grey Hat hacker there are few studies involving insider threat behavior typology has been around for several years, and these [17]. We could only find one. terms have also been popular with the hacking A recent study investigated the relationship communities [24], the academic communities [25-27], between computer abuse, Narcissism, Psychopathy,
Recommended publications
  • “Hackers and Hacking Attacks”- Magician and Their Magic Wand For
    ISSN XXXX XXXX © 2019 IJESC Research Article Volume 9 Issue No. 5 “Hackers and Hacking Attacks”- Magician and Their Magic Wand for Security Breech Manish JitendrabhaiVankani Department of SOE – MCA RK University, Rajkot, Gujarat, India Abstract: In Modern era, each and every data is available online. Any person across the world can access that data very easily. Some people use this data to gain the information while other people use this data to fulfil their malicious intent. There are lots of methods used for protection of data but the hacker is far more intelligent to hack the security. There are main two types of hackers that are different from each other on the basis of their purpose. The one who tries to break the computer system’s security with malicious intention is known as bad hacker or cracker. The other one who has good purpose is known as ethical hacker because he uses his skills to provide security to sensitive data of big firms.In this paper I describe the types of Hackers,Ethical hacking,typesof Hacking attacks and Hacking tools. Keywords: Ethical hackers, Hacking, cracker. I. INTRODUCTION: hardware as well as software. Hacker is a computer dedicated and expert in a programming language, security, and networks. As the computer technology enhances, it has its darker side He is kind of person who loves to gain knowledge ofdifferent also. In modern era the need of the internet is growing rapidly. technologies, details of the computer system and enhances his Enormous amount of data is moving online, therefore, data capability and skills.
    [Show full text]
  • Black Hat Hacker White Hat Hacker Gray Hat Hacker
    Crackers or Malicious Hackers: System crackers attempt to access computing facilities for which they have not been authorized. Cracking a computer's defenses is seen as the ultimate victimless crime. The perception is that nobody is hurt or even endangered by a little stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see whether it can be done. Most crackers can do their harm without confronting anybody, not even making a sound. In the absence of explicit warnings not to trespass in a system, crackers infer that access is permitted. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no common profile or motivation for these attackers. Classification of Hackers: Hackers can be classified broadly into three different categories: 1. Black Hat Hacker 2. White Hat Hacker 3. Grey Hat Hacker Black Hat Hacker Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as well. Black hat hacking is illegal. White Hat Hacker White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Ethical Hacking Terminology
    Ethical Hacking Terminology Table of Contents Terminology .................................................................................................................................... 2 Terminology -1 ................................................................................................................................ 3 Terminology -2 ................................................................................................................................ 5 Defense in Depth ............................................................................................................................ 6 Confidentiality, Integrity and Availability ....................................................................................... 8 The "Ease of Use" Triangle ............................................................................................................ 11 Types of Hackers – Black Hats ....................................................................................................... 13 Types of Hackers – Gray Hats ....................................................................................................... 15 Types of Hackers – White Hats ..................................................................................................... 17 Hacktivism ..................................................................................................................................... 18 Required Ethical Hacking Skills ....................................................................................................
    [Show full text]
  • Identity Theft Glossary
    Identity Theft Glossary •Account takeover: An account takeover is when a fraudster uses personal information to ​ ​ obtain products and services. Credit card fraud is the most rampant, but skimming and phishing are also common types of account takeovers. •Anti-virus: Anti-virus software runs continuously in the background of a computer and ​ ​ scans for viruses, worms and malware every time the user accesses a website or downloads anything. •Bait and switch: A bait and switch attack is when a hacker buys advertising space on a ​ ​ webpage and then links the advertisement to a page infected with malware. •Black hat hacker: All hackers are capable of compromising computer systems and creating ​ ​ malware, but black hat hackers use these skills to commit cybercrimes. •Blockchain: A blockchain is a string of time-stamped digital records shared between ​ ​ multiple computers. If the data in one block changes, all subsequent blocks in the blockchain reflect the alteration and become invalid. Blockchains help prevent identity theft and fraud by making it difficult to tamper with the data in a block. •Bot: Short for “robot,” a bot is an autonomous program that interacts with computer ​ ​ systems in a way that appears or attempts to appear human. Hackers can use bots to mine for usernames and passwords used to commit identity fraud. •Cookie theft: Cookie theft is when a cybercriminal makes copies of unencrypted session ​ ​ data and then uses that data to impersonate someone else. •Credential cracking: Credential cracking describes the various methods — word lists, ​ ​ guessing and brute-force — cybercriminals use to obtain passwords. Credential cracking threats are why it’s important to create varied and complicated passwords for all accounts.
    [Show full text]
  • Attackers and Their Tools Who Is Attacking Our Network? in This Presentation We Will Investigate Threat, Vulnerability, and Risk
    Principles of Cyber Security Attackers and Their Tools Who is Attacking Our Network? In this presentation we will investigate Threat, Vulnerability, and Risk . Threat • Is a potential danger to an asset such as data or the network. Vulnerability and Attack Surface • A vulnerability is a weakness in a system or its design that could be exploited by a threat. • Attack surface describes different points where an attacker could get into a system and could get to the data (Example – operating system without security patches) . Exploit • Is a mechanism used to leverage a vulnerability to compromise an asset. • A Remote exploit works over the network. • A Local exploit is when a threat actor has user or administrative access to the end system. Risk • Likelihood that a threat will exploit a vulnerability of an asset and result in an undesirable consequence. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Who is Attacking Our Network? What exactly are Hackers? Hacker vs. Threat Actor . White Hat Hackers • Ethical hackers who use their programming skills for good, ethical, and legal purposes. • Perform penetration tests to discover vulnerabilities and work with developers to address cyber issues . Grey Hat Hackers • Commit crimes and do unethical things but not for personal gain or to cause damage. Black Hat Hackers • Unethical criminals who violate security for personal gain, or for malicious reasons, such as attacking networks. It is important to note: Threat actors is a term used to describe grey and black hat hackers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Who is Attacking Our Network? Evolution of Threat Actors .
    [Show full text]
  • Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
    Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members.
    [Show full text]
  • Cassie Wardlow CST 300L December 4, 2012 Remember, Remember the 5Th of November
    Wardlow 1 Cassie Wardlow CST 300L December 4, 2012 Remember, Remember the 5th of November Hackers have been around for many centuries. It wasn’t until recently that they started to have a huge impact on society. Of course what they do has changed over the years, but they still all have the same idea. They don’t agree with government and they make sure their opinion is heard. Before the digital age, hackers weren’t really seen as a threat. Now that they can get into highly protected systems, the government is starting to worry. The history of how hackers came about is an interesting, especially how they have formed large groups today, like the famous Anonymous. Big important businesses and corporations may not enjoy hackers, but they are good for society. Hackers want the public to know that certain business are doing something wrong. Hacktivism is described as “the nonviolent use of legal and/or illegal digital tools in pursuit of political ends” (Skelton, 2012). In October of 1989, the first ever hack was done by a group called W.A.N.K. The stance of W.A.N.K was to bring awareness against the nuclear armament. They hacked into government computers, including NASA, and used a worm to change to login screens. This is what appeared on their screens: Image 1 Wardlow 2 Hackers were still around before computers but just doing things a little bit differently. In the 1600s, Guy Fawkes was in protest against religious intolerance. Guy Fawkes and a group of provincial English Catholics planned to assassinate King James I of England and VI of Scotland.
    [Show full text]
  • The Rise of China's Hacking Culture: Defining Chinese Hackers
    California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of aduateGr Studies 6-2016 The Rise of China's Hacking Culture: Defining Chinese Hackers William Howlett IV California State University - San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd Part of the Asian Studies Commons, Criminology and Criminal Justice Commons, International Relations Commons, Politics and Social Change Commons, and the Science and Technology Studies Commons Recommended Citation Howlett, William IV, "The Rise of China's Hacking Culture: Defining Chinese Hackers" (2016). Electronic Theses, Projects, and Dissertations. 383. https://scholarworks.lib.csusb.edu/etd/383 This Thesis is brought to you for free and open access by the Office of aduateGr Studies at CSUSB ScholarWorks. It has been accepted for inclusion in Electronic Theses, Projects, and Dissertations by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Arts in Social Sciences and Globalization by William Sedgwick Howlett June 2016 THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino by William Sedgwick Howlett June 2016 Approved by: Cherstin Lyon, Committee Chair, Social Sciences and Globalization Jeremy Murray, Committee Member, History Jose Munoz, Committee Member, Sociology © 2016 William Sedgwick Howlett ABSTRACT China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade.
    [Show full text]
  • A Survey on Ethical Hacking: Issues and Challenges
    ASURVEY ON ETHICAL HACKING:ISSUES AND CHALLENGES APREPRINT Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon March 30, 2021 ABSTRACT Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of penetration tests. The objective of penetration tests is to make existing systems and their corresponding data more secure, efficient and resilient. In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. In fact, any identified exploitable vulnerability will be used to conduct attacks on systems, devices, or personnel. This growing problem should be solved and mitigated to reach better resistance against these attacks. Moreover, the advantages and limitations of penetration tests are also listed. The main issue of penetration tests that it is efficient to detect known vulnerabilities. Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. This can also be done by reinforcing the anomaly detection of intrusion detection/prevention system. In fact, security is increased by designing an efficient cooperation between the different security elements and penetration tests.
    [Show full text]
  • WHY HACKERS HACK It’S Your Business to Care!
    WHY HACKERS HACK It’s Your Business to Care! Webroot.com/LockdownLessons INTRODUCTION As cybersecurity grows more complex, criminals around the world are evolving along with it. Their methods leave you vulnerable and many organizations are at risk. Staying informed on this ever-changing landscape is vital. In this educational eBook, we explore the minds of hackers and open the window into their world. Learn why it’s important to debunk the common stereotypes, get informed on their methods and motives, and find out who they target the most. IT security experts ylerT Moffitt, Kelvin Murray, and Grayson Milbourne offer help as you navigate today’s uncertain waters and lend tips on how to lock down your business and protect your customers from ongoing threats. The Stereotype 3 What does a hacker look like? Stereotypes teach us to think of hackers only as nefarious individuals who will stop at nothing to wreak unstoppable havoc, but this is far from reality. Discover the truth behind the stereotypes and why you should care. The Profile 5 What are hackers after? Hackers typically fall into three distinct categories: black hat, white hat, and grey hat. Their methods and motives vary, from financial gain to disruption, and some even hack for the fun of it. Learn why it matters for your business. Behind The Hoodie 7 Who do hackers target? Understanding why hackers are after your business and what methods they use to break into your systems can help you stop attacks before they happen. THE STEREOTYPE When you think of a hacker, do you envision an anti-social, young hoodie-wearing man in a dark basement? Popularized by Hollywood and mainstream media, this is the image many of us see, although it’s not entirely accurate.
    [Show full text]