Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

One of the sillier stock photos you'll come across when you search for the term 'hacker'. Shutterstock/Sergey Mironov

Explainer: What exactly is hacking anyway?

Clue: it’s not what’s happening in the picture.

WHENEVER A BREACH or attack happens to a site or service, you can almost guarantee that the work ‘hack’ will be used in some form.

It’s a catch-all term for any security breach that may occur even though the term itself isn’t a negative one.

So what is hacking?

From a computer networking perspective, hacking is when you modify or change the normal purpose of a programme or system to do something else.

Hacking isn’t necessarily a bad thing. Some computer engineers and programmers engage in it to find weaknesses and flaws, or to create new uses for existing services.

Yet for many, it’s a word associated with attacking services online or gaining unauthorised access to computer networks, which isn’t really fair to those who hack for ethical reasons (White Hat hackers) or want to improve a service.

Is there a better term to use?

Some prefer to use the term ‘cracking’ to describe those who attack and break into a computer network. But if you do use the term hacking, it’s better to say what type it is.

There are a number of different terms to use, but these are the three main types.

White Hat – These are experts who hack for good or ethical reasons like testing their own security or working with a company to help identify problem areas.

Black Hat – The exact opposite of a White Hat hacker. They attack and break security for personal gain or for other malicious reasons. Any major hacking incident that is reported in the news is done by Black Hat hackers.

Grey Hat - As you may have guessed, this is a mixture of the two. They don’t necessarily attack or compromise a system for personal gain but they do it without permission.

They may disclose their actions publicly or tell the company involved directly. Sometimes they may offer to fix it for a price.

And what are the different types of attacks?

Again, there’s quite a number of them, but the ones that crop up regularly include:

Brute force attacks – This is an attempt to log into a service repeatedly and guess the right username and password through automation.

This usually succeeds when poor passwords or usernames are used. Most sites bypass this by only allowing you to enter a password or username a certain number of times before it locks you out.

This is what is believed to have happened when photos from a number of celebrities were taken from iCloud and published online back in September.

DDoS - Distributed Denial of Service, this is when you overwhelm servers with a flood of fake traffic, causing sites to go down. This is what happened when both Playstation 4 and Xbox One servers went down during Christmas

Man-in-the-middle attack – This is when someone is able to monitor and modify any data passing between you and the person/organisation/service you’re communicating with.

The Superfish bug, which was found on a number of Lenovo computers, had a flaw which would allow this to happen.

So what can I do to prevent this from ever happening?

Well, there’s no surefire way to keep things 100% safe, but you can make things as difficult as possible for them. Here are some precautions you can take.

- Use password managers to create complex passwords.
- Use two-factor authentication where possible.
- Don’t save any sensitive information on the cloud.
- Don’t use default passwords or usernames.
- If you have to enter in sensitive information on a site, always make sure the URL has HTTPS in it.

Read: If you’re using one of these passwords, you’re in serious trouble >

Read: This is why you should be using a password manager >

Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article. Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.

Close
12 Comments
    Install the app to use these features.
    Mute Stephen Doyle
    Favourite Stephen Doyle
    Report
    Mar 22nd 2015, 11:12 AM

    You mean there’s no Nigerian princess?

    82
    Install the app to use these features.
    Mute Fergus O'Neill
    Favourite Fergus O'Neill
    Report
    Mar 22nd 2015, 11:30 AM

    DDoS is Distributed Denial of Service. It’s when a server is overloaded with traffic from many (distributed) sources, which are usually compromised. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the attacker in the distributed attack.

    70
    Install the app to use these features.
    Mute Glen
    Favourite Glen
    Report
    Mar 22nd 2015, 11:11 AM

    Hacking is also something that will be used as a reason to censor the Internet making it harder for people to access alternative news sites which are known for speaking out about government corruption, spying and Orwellian ideals.

    36
    Install the app to use these features.
    Mute Barry O'Brien
    Favourite Barry O'Brien
    Report
    Mar 22nd 2015, 12:27 PM

    The one thing that most people don’t realise is how damn easy it is. You don’t have to be some genius like in the movies.

    24
    Install the app to use these features.
    Mute peace
    Favourite peace
    Report
    Mar 22nd 2015, 11:02 AM

    Thanks Quinton for the clue ;-)

    20
    Install the app to use these features.
    Mute Damien
    Favourite Damien
    Report
    Mar 22nd 2015, 3:13 PM

    Lucrative hobby. A guy walked away yesterday with $250,000 for finding bugs in Google Chrome, Internet Explorer and Firefox.

    Most tech companies will pay a bounty to hackers that expose bugs or security concerns in their platforms.

    18
    Install the app to use these features.
    Mute Seán O'Ceallaghan
    Favourite Seán O'Ceallaghan
    Report
    Mar 22nd 2015, 12:16 PM

    Is this not actually cracking… Hackers would be offended.

    13
    Install the app to use these features.
    Mute Seán O'Ceallaghan
    Favourite Seán O'Ceallaghan
    Report
    Mar 22nd 2015, 12:17 PM

    Media tends to purpotrate hacking as evil , the appropriate term should be cracking

    9
    Install the app to use these features.
    Mute Gerard Magill
    Favourite Gerard Magill
    Report
    Mar 22nd 2015, 2:37 PM

    I always get hackers leaving messages on my computer offering to update it…as if I was born yesterday, If I want to update it I’ll go to the computer shop

    5
    Install the app to use these features.
    Mute Tom Colgan
    Favourite Tom Colgan
    Report
    Mar 22nd 2015, 7:35 PM

    when you say update it, do you mean upgrade the hardware or the software?
    god its like pulling teeth with some people, be more specific!

    7
    Install the app to use these features.
    Mute Gerard Magill
    Favourite Gerard Magill
    Report
    Mar 22nd 2015, 2:39 PM

    I always get messaged on my computer from hackers offering to update it….as if I was born in the last shower, If I want to update it I’ll make the trip to the computer shop

    3
    Install the app to use these features.
    Mute The Tec Dr
    Favourite The Tec Dr
    Report
    Mar 22nd 2015, 12:05 PM

    You can find more info on tecdr.net

    1
Submit a report
Please help us understand how this comment violates our community guidelines.
Thank you for the feedback
Your feedback has been sent to our team for review.
JournalTv
News in 60 seconds