Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Development
    • Networking

    Kevin Dark Dante Poulsen

    By
    Fahmida Y. Rashid
    -
    August 15, 2011
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Kevin Dark Dante Poulsen

      1

      Kevin Poulsen was known as “Dark Dante” within the hacker community. He was best known for hacking phone systems, particularly at radio stations to win various prizes. His biggest prize was the Porsche 944 S2 from Los Angeles KIIS FM in 1990. He is currently a senior editor at Wired News and edits the Threat Level blog.

      2Steve Jobs, Steve Wozniak

      2

      The iconic founders of Apple Computer spent their pre-Apple days building Blue Box devices that allowed users to illegally make free long distance calls and selling them to fellow students at the University of California, Berkeley.

      3Robert Tappan Morris

      3

      Robert Tappan Morris reputedly brought down a tenth of the Internet and caused $15 million worth of damage in 1998 with his “Morris” worm. Authorities caught him because he had publicly chatted about the work for months before actually releasing it. He is currently a tenured professor at the Massachusetts Institute of Technology.

      4George GeoHot Hotz

      4

      One of the first hackers to jailbreak the PlayStation 3, George “GeoHot” Hotz was sued by Sony for releasing and distributing his jailbreaking tool. Sony settled the lawsuit, and Hotz is no longer allowed to jailbreak Sony devices.

      5David Smith

      5

      David Smith’s Melissa virus mass-mails itself using Microsoft Outlook 97 or 98 and infects Microsoft Word and Excel 97 and 2000 documents. Created in 1999, the virus overloaded computer systems and servers around the world. To this day, Smith is the only person in the United States to go to federal prison for sending an email virus.

      6Kevin Mitnick

      6

      Once considered the most-wanted cyber-criminal in the United States, Kevin Mitnick is the “poster child” of computer hacking. He hacked multiple computer and phone networks over the years, prompting law enforcement to tell a judge he had the ability to “start a nuclear war by whistling into a pay phone.” Mitnick has been arrested and incarcerated several times.

      7Jonathan Joseph c0mrade James

      7

      Jonathan James specialized in hacking high-profile government systems such as NASA and the Department of Defense, and is reported to have stolen software worth over $1.7 million. He installed an unauthorized backdoor and a sniffer in a server that allowed him to intercept messages and login credentials. At 16, he was the first juvenile to be sent to jail for computer hacking.

      8Vladimir Levin

      8

      From his laptop in his St. Petersburg, Russia, apartment in 1994, Vladimir Levin transferred $10.7 million from Citibank clients to his own bank accounts. Authorities eventually recovered all but $400,000 of the stolen money.

      9Michael MafiaBoy Calce

      9

      “MafiaBoy” was arrested in February 2000 for launching denial-of-service attacks against some of the largest sites on the Internet, including Amazon, eBay, CNN, Dell and Yahoo, in the space of a week. Widely believed to be a “script kiddie” who used tools created by others, the Canadian teenager called his attacks against the sites “Rivolta,” the Italian word for riot.

      10Gary McKinnon

      10

      Gary McKinnon allegedly accessed 97 computers belonging to the United States Army, Air Force, Navy and NASA in 2002, causing $700,000 in damage. The attack is considered the largest ever on U.S. government networks. McKinnon claimed he was just searching for information on UFOs that the government was hiding on military computers.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×