{"id":2356,"date":"2011-02-08T15:00:42","date_gmt":"2011-02-08T22:00:42","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2356"},"modified":"2015-03-26T16:04:30","modified_gmt":"2015-03-26T23:04:30","slug":"who-are-the-real-hackers","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/","title":{"rendered":"Who Are the Real Hackers?"},"content":{"rendered":"<p>When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause havoc. While this was the case several years ago, security threats have ballooned and a broader number of culprits attempt to attack computers for a variety of reasons. Once the purview of script kiddies, malware is now used by professionals to make a hefty profit.<\/p>\n<p>An <a href=\"http:\/\/www.infoworld.com\/d\/security-central\/your-guide-the-seven-types-malicious-hackers-636\">Infoworld article<\/a> looks at the &#8220;seven types of malicious hackers,&#8221; and explains exactly what hackers are trying to do when they infiltrate your computer. There are the basic criminals, out to nab your credit card number or bank account information. There are spammers and adware spreaders, who set up botnets on infected computers to send spam to millions of others. But there are also those who are out to get information from businesses, and flip it to their victims&#8217; competitors.<\/p>\n<p>Hactivitists like to deface web sites to make statements, and cyber warriors may launch attacks against governments or industrial infrastructure.<\/p>\n<p>Finally, there are still some script kiddies, called, today, &#8220;rogue hackers.&#8221; &#8220;There are hundreds of thousands of hackers who simply want to prove their skills, brag to friends, and are thrilled to engage in unauthorized activities.&#8221;<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" class=\"alignnone size-full wp-image-2357\" title=\"serial-eradicator\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg\" alt=\"\" width=\"343\" height=\"288\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg 343w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator-300x251.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator-100x83.jpg 100w\" sizes=\"(max-width: 343px) 100vw, 343px\" \/><\/center>All this highlights the fact that only multi-pronged security solutions can protect Mac users from the many dangers of the Internet. While malware is one threat, many types of network attacks, web threats and other ways of getting into a Mac are actively exploited by cyber criminals around the world. And any business using Macs needs especially robust protection from those who try to steal corporate secrets and intellectual property. So keep your Mac safe with a <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">powerful security solution such as Intego VirusBarrier X6<\/a>, which protects from malware, network attacks, web threats, phishing and more.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"How Hackers Make Money Online\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/\" target=\"_blank\">How Hackers Make Money Online<\/a><\/li>\n<li><a title=\"Beyond Malware \u2013 Detecting Hack Tools\" href=\"https:\/\/www.intego.com\/mac-security-blog\/beyond-malware-detecting-hack-tools\/\" target=\"_blank\">Beyond Malware: Detecting Hack Tools<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause havoc. While this was the case several years ago, security threats have ballooned and a broader number of culprits attempt to attack computers for a variety of reasons. Once the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who Are the Real Hackers? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-08T22:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T23:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg\",\"width\":\"343\",\"height\":\"288\",\"caption\":\"Antivirus real-time scanning\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/\",\"name\":\"Who Are the Real Hackers? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage\"},\"datePublished\":\"2011-02-08T22:00:42+00:00\",\"dateModified\":\"2015-03-26T23:04:30+00:00\",\"description\":\"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who Are the Real Hackers?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Who Are the Real Hackers?\",\"datePublished\":\"2011-02-08T22:00:42+00:00\",\"dateModified\":\"2015-03-26T23:04:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage\"},\"wordCount\":320,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg\",\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Who Are the Real Hackers? - The Mac Security Blog","og_description":"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause","og_url":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-02-08T22:00:42+00:00","article_modified_time":"2015-03-26T23:04:30+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg","width":"343","height":"288","caption":"Antivirus real-time scanning"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/","name":"Who Are the Real Hackers? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage"},"datePublished":"2011-02-08T22:00:42+00:00","dateModified":"2015-03-26T23:04:30+00:00","description":"When most people think of computer security, they think of viruses: insidious programs that do evil things, such as delete files, corrupt data, and cause","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Who Are the Real Hackers?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Who Are the Real Hackers?","datePublished":"2011-02-08T22:00:42+00:00","dateModified":"2015-03-26T23:04:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#webpage"},"wordCount":320,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/02\/serial-eradicator.jpg","articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-C0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2356"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2356"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2356\/revisions"}],"predecessor-version":[{"id":39238,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2356\/revisions\/39238"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}