జీమెయిల్లో ఉన్న సమాచారాన్ని హ్యాక్ చేయగలమా? ఆండ్రాయిడ్ ఫోన్లలో సమాచారాన్ని దొంగిలించగలమా? - దాదాపు అసాధ్యమని కంపెనీలు పేర్కొంటూ ఉంటాయి. కానీ తాము జీమెయిల్ను 92 శాతం కచ్చితత్వంతో హ్యాక్ చేయగలిగామని కాలిఫోర్నియా విశ్వవిద్యాలయానికి చెందిన శాస్త్రవేత్తలు ప్రకటించారు. ఆండ్రాయిడ్, విండోస్ ఆపరేటింగ్ వ్యవస్థలలో ఉన్న కొన్ని లొసుగుల ఆధారంగా వారు వివిధ యాప్స్లోకి ప్రవేశించి సమాచారాన్ని సేకరించగలిగారు. జీమెయిల్, చేజ్ బ్యాంక్, హెచ్ఆర్ బ్లాక్ వంటి సుప్రసిద్ధ యాప్స్లో కూడా ఈ లొసుగులు ఉన్నాయి. ఒక యాప్లోకి ప్రవేశించి దాని నుంచి మరొక యాప్లోకి వెళ్లటం ద్వారా సమాచారాన్ని సులభంగా సేకరించవచ్చని శాస్త్రవేత్తలు పేర్కొంటున్నారు. ’’ ఒక అప్లికేషన్ నుంచి మరొక అప్లికేషన్కు వెళ్లలేమని చాలా మంది భావిస్తూ ఉంటారు. కానీ మా పరిశోధనల్లో ఒక అప్లికేషన్ను హ్యాక్ చేస్తే దాని ఆధారంగా మరొక అప్లికేషన్కు సంబంధించిన వివరాలను, దాని ఆధారంగా ఆ అప్లికేషన్ను ఉపయోగించే వారి సమాచారాన్ని సేకరించవచ్చు’’ అని ఈ పరిశోధనలో కీలకపాత్ర పోషించిన జుయాన్ క్వియాన్ అనే శాస్త్రవేత్త వివరించారు.
ENGLISH VERSION :
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the longstanding hacker definition controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers, whether computer criminal (black hats) or computer security expert (white hats), is more appropriately called a cracker instead.Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers".
History :
Further information: Timeline of computer security hacker history
Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.[citation needed] TAP was a phone phreaking newsletter that taught techniques for unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.[citation needed]
Classifications :
Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree.
Eric S. Raymond, author of The New Hacker's Dictionary, advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they emphasize a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity.
According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system". These subgroups may also be defined by the legal status of their activities.
White hat :
Main article: White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat :
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.
Grey hat :
Main article: Grey hat
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.
Elite hacker :
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
Script kiddie :
A script kiddie (also known as a skid or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept.
Neophyte :
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
Blue hat :
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Hacktivist :
A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message. Most hacktivism involves website defacement or denial-of-service attacks.
Nation state :
Intelligence agencies and cyberwarfare operatives of nation states.
Organized criminal gangs :
Groups of hackers that carry out organized criminal activities for profit.