Call us today! (866) 295-3106

Call us today! (866) 295-3106

7 White Hat Hackers and the Online Crimes they Help Prevent

In what is known as white hat hacking, experienced hackers work for the FBI and other legal organizations to help identify and stop many of the major hacking attempts. Corporations are constantly on the lookout for individuals experienced with hacking, as they have the knowledge to stop others. Getting your Bachelor's Degree in Cybersecurity or Master's Degree in Cybersecurity for Criminal Justice will prepare you for a successful career in a field with increasingly advanced technology and ever-changing attack techniques.

About Online Crimes

Online protection and security is more important now than ever before. As modern technology advances, so do hackers, leaving behind more danger for businesses that are dependent on technology. Luckily, businesses are getting smart and hiring experienced hackers to provide security knowledge to stop cyber crimes before they start. White hat hackers are highly intelligent and have a history of hacking into complex computer systems. The following popular white hat hackers are paving the way for cybercrime graduates looking to make a career out of preventing cyber crimes.

White Hat Hackers

Robert is the CEO and founder of Sectheory and is a highly experienced white hat hacker. He uses his advanced expertise to help corporations avoid some of the biggest cyber crimes around. He invented a tool called the
"Slowloris" which helped to prevent anti-Iranian protesters from attacking Iranian leadership websites. Robert is also known as "The Father of Xss" and has most recently released a video series explaining DNS rebinding hacking.

Greg is the founder and CEO of HbGary and has been investigating rootkits since 1998. He founded a rootkit website and authored books on the subject matter: Exploiting Software and Rootkits and Subverting the Windows Kernel. He also exposed vulnerabilities with the online game, World of Warcraft. Greg was also behind the hacktivist group Anonymous, who exposed the discredit of Wikileaks supporters by releasing sensitive emails.

Kaminsky is a security researcher and director of penetration testing for Loactive. Dan also worked for Avaya, IOActive, and Cisco. As a white hat hacker, he worked behind the scenes for various service and software providers to fix an issue with a 2008 DNS protocol. With most Internet-based applications dependent on DNS to locate peers, a wide range of attacks became feasible, including web site impersonation, email interception, and authentication bypass via the "Forgot My Password" feature on many popular websites. Had he not been there, the Internet could have experienced a mass disruption.

As senior security consultant for ISEC partners, Zane uses his experience to write tell-all books about avoiding hackers and exposing the world of hacking. These include: Hacking Exposed: Web 2.0, Mobile Application Security and Hacking VoIP. You can also see Zane Lackey on the BBC show, Watch Dog, where he once showed viewers how to create fake text messages to and from mobile devices.

As the chief security architect for FireEve by day, Marc is an experienced hacker who uses his many skills and talents to help fellow corporations. He was once the hacker known as "chameleon" and belonged to the hacking group "rhino9". He is now putting his advanced hacking skills to good, through protection of various Windows-based computers. He is able to find vulnerabilities for Windows and has been doing white hat hacking since the age of 17.

Moore is the chief security officer for Rapid7 and was chief architect of the Metasploit project. This project was a revolutionary, open-source penetration testing platform, used for white hat hacking. He is considered one of the most influential security hackers in the industry. HD Moore is well known for his work on AxMan and inWarVOX along with the Rogue Network Link Detection Tools.

Perhaps one of the greater known names, Charlie Miller is the principal analyst for Independent Security Evaluators. He was the first to hack into the 2007 iPhone and 2008 Android phone. He has co-authored a book titled, The Mac Hacker's Handbook, and now works as a white hat hacker. Miller recently showed how easy it is to hack into mobile device systems and make mobile payments with smart phones.

White hat hackers are paving the way for others interested in online security and fraud protection, to pursue a bachelor's or master's in cybersecurity, then go on to use their talents for the benefit of organizations.