The Youngest Hacker That Stole $15,000,000 In 60 seconds...




The Youngest Hacker That Stole $15,000,000 In 60 seconds... When most people think of hackers, they picture grizzled, bearded adults sitting in darkened rooms spotlit by the glow of multiple monitors. Or perhaps hardened foreign operatives covertly working for government agencies. If the movie “Wargames” has taught us anything, it’s that hacking takes all kinds. And the kids we shed light on today, go on to prove the same. Number 4. Kristoffer von Hassel Age: 5 Most kids this age enjoy singing, rhyming, imaginary play, and other silly, energetic pursuits older parents might call “horse play.” But back in 2014, a kindergarten student from San Diego named Kristoffer von Hassel shattered these traditional perceptions on youth when he tried to override the parental controls on his family’s Xbox One Live account and consequently discovered a major security hole in Microsoft’s system. Now known as the world’s youngest hacker, 5-year-old von Hassel had witnessed others playing video games on the family’s Xbox One, but when he tried to play himself, restrictions on the device made it impossible. Number 3. Betsy Davies Age: 7 Hacking into a stranger’s laptop has become so simple that even a primary school child can be taught how to do it, a new experiment has shown. Seven-year-old Betsy Davies was able to hack into a stranger’s laptop via an unsecured Wi-Fi network in just over ten minutes, following a simple set of procedures which could put many of us at risk. She was able to gain the knowledge necessary to carry out the hack by performing a simple Google search, which returned more than 11 million results along with almost 14,000 video tutorials showing up on YouTube. Number 2. CyFi Age: 10 CyFi is a child hacker who began her coding career at the tender age of 10. Dubbed a “white hat” hacker, CyFi is one of many millennials changing the face of the hacking world. Unlike criminal hackers à la Rihanna’s character in Ocean’s 8—who use computer penetration for, say, big-money heists—white hat hackers use their tech skills for good, often working with companies to pinpoint bugs in their security systems by breaking into their own protected networks. Call it ethical hacking. Number 1. Jonathan James Age: 15 In 1999, a 15-year-old north Floridian penetrated into Department of Defense and NASA computers, earning himself a spot in the hacker hall of fame. Jonathan James, who operated under the internet name “c0mrade,” was a trailblazer in several respects. Not only was he recognized for his high-profile hack at such a tender age; he also became the first juvenile hacker sentenced to serve prison time. The majority of James’ hacking exploits occurred between late August and October of 1999, when he breached various systems including telecommunications giant Bellsouth and the Miami-Dade school system. But what really put James on the map was his invasion of computers used by the Defense Threat Reduction Agency (DTRA), a division of the U.S. Department of Defense tasked with monitoring threats from nuclear, biological, chemical, conventional and special weapons. James later told the Justice Department he installed a backdoor into a computer server in Dulles, Virginia, through which he was able to intercept more than 3,300 email messages from DTRA employees and at least 19 user names and passwords. #hacker #hackerexposed #anonymous

Hello and welcome to the temple of cybersecurity. Now you are watching The Youngest Hacker That Stole $15,000,000 In 60 seconds... published at September 23, 2022 at 11:15AM.
For more hacking info and free hacking tutorials visit: https://ift.tt/Z6ElK8F
follow us on:

Youtube: https://www.youtube.com/channel/UCiu1SUqoBRbnClQ5Zh9-0hQ/
Whatsapp: https://ift.tt/J02WTQA
Reddit: https://ift.tt/gWs5qEY
Telegram: https://ift.tt/pImX9eU
NFT store: https://mintable.app/u/cha0smagick
Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/wKuknQA



Ignore tags:
#hacking,#infosec,#tutorial,#bugbounty,#threat,#hunting,#pentest,#hacked,#ethical,#hacker,#cyber,#learn,#security,#computer,#pc,#news

Comments