Did you know that it has been said that hacking can feel thrilling-solving complex problems, but that rush can become addictive if it turns into obsession or harmful behavior?
Did You
Know?
***Purpose***
1. Teen Hackers and Addiction
According to
bbc.com/news a study suggests there are parallels between the way youngsters
turn into hackers and how youths become addicted to drugs and alcohol. They further added that reports show the teens’
goal was not for financial gain, but rather to boost their reputation among
other hackers to compensate for what might be a lack of self-esteem in the rest
of their lives.
2. Young Hacker Speaks Out
This young hacker
put at risk the security of 60 million children and 10 million teachers. He admitted that he feels he needs to go to
prison for what he did and that if they had not stopped him, he probably would
still be hacking. This is talked about
at abcnews.com. They further added that
15- and 16-year-olds are hacking; That there is a whole young generation who
are like free-range chickens with no guidance.
When you think about it 15- and 16-year-olds are not adults but are
starting crime at a very earl age and the internet makes it very possible for
them to do so. Crime has always existed,
but internet crime is new and different.
3. Who Are Cyber Criminals?
You might
ask, “Who are cyber criminals?” Cyber
criminals also known as hackers are extremely difficult to identify and the
growth of this global network poses a major threat to governments and
corporations. Online.norwich.edu further added that cyber criminals might
include identity thieves, internet stalkers, phishing scammers, and cyber
terrorists.
4. Psychological Profile of Cyber Criminals
Cyber criminals
have above-average intelligence, a lack of empathy, some are motivated by
narcissism, the internet’s anonymity and distance makes it more appealing to
participate in unlawful activity, the excitement of successfully breaking a
system can fuel the drive for more, and they frequently exhibit impulsiveness
and aggression.
This reminds
me of a movie I watched called “Queenpins.”. The lady was queen of couponing but became obsessed with making it
bigger and better. This was based on a
true story. The woman had made
couponing an illegal business by selling counterfeit coupons. She had become a multimillionaire owning
several vehicles and airplanes. It was seemingly
addictive for her and her accomplices that helped.
5. Conti
Have you
heard of Conti? Conti is one of the 10
Most Notorious Cybercrime Groups in 2026.
Their operation included performance reviews, salary structures,
internal chat logs, human resources disputes, and offering tech support to
affiliates and documented their attack playbooks better than some IT teams. Caniphish.com talks about this. They also added that this gang became known
for hitting governments, hospitals, and global businesses demanding tens of
millions in crypto. Note: One teen
hacker mentioned on the news he would demand crypto and then convert it to cash
and send it to his house. His mother
never knew. She thought he was getting
regular mail, and he was getting millions of dollars in the mail. Now who would have thought of something like
that?
6. State of Michigan
How does
your state rate in cybercrime? The
State of Michigan ranks 8th for cybercrimes with a reported 17th for
money lost per victim. Michigan laws
have adapted to address the evolving nature of cybercrime according to
bing.com.
7. The World Online
Do you know
when the world went online? It went
online in the 1990’s according to cybersecutiryventures.com. They further added that email became a
blessing and a curse as it opened new entry points for viruses. Now the next generation from 2010-2019
included Saudi hackers of credit cards online, malicious hackers into Yahoo,
and the forcing of New Zealand’s stock market to temporarily shut down.
8. Yahoo Cyber Threat
Yahoo experienced one of the largest data breaches in internet
history during 2013-2014. It affected 3 billion accounts
and according to bing.com allegedly Russian agent hackers stole usernames,
email, address, and passwords, enabling identity theft and cyber-espionage. The internet has it’s blessing and has its
curses.
9. Ethical Hacking?
Do you know
what ethical hacking is? Ethical hacking employs the same
methods as malicious hackers, but instead of exploiting vulnerabilities,
ethical hackers report them to organizations so preventive measures can be
implemented. Forbes.com talks about this. They further added that types of ethical
hacking might include penetration testing, system hacking, internal testing,
web application testing, and Network Hacking. Yes, there are benefits to Ethical
hacking. They allow an organization to
discover its weak spots before they can be exploited and they can save
organizations large sums of money, as well as protecting them from the loss of
a good reputation.
10. 5 Phases of Ethical Hacking
What are the
5 phases of ethical hacking? The 5
phases include Reconnaissance (Foot printing Phase), scanning, gaining access, maintaining
access, and covering tracks. According
to geeksforgeeks.org., once this step is completed it means the ethical hacker
has successfully gained access to the system or network, exploited
vulnerabilities, and exited without detection.
11. What is Money Laundering?
Are you familiar with the concept of money laundering? Money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them. Fincen.gov. talks about this. They further added money laundering provides the fuel for drug dealers, terrorists, arms dealers, and other criminals to operate and expand their criminal
Guest Blogging:
Guest bloggers welcome. Would you like to guest blog at
anointedtoday.blogspot.com?
Just contact
me at anointedtoday@gmail.com and let me know.
Guest
Blogging is another avenue for great exposure to your blog.
I look
forward to hearing from you soon.
Visit My Store at
More From
this Author. . . Just Click the
Link Below. . .
There is Power in a Father’s Word
Source:
Teen hackers study considers link to
addiction - BBC News
Who Are Cyber Criminals? | Norwich
University - Online
The 10 Most Notorious Cybercrime
Groups In 2026
Cybercrimes in Michigan - Search
The History Of Cybercrime And
Cybersecurity, 1940-2020
biggest cyber crimes in history -
Search
What Is
Ethical Hacking? Using Hacking Techniques For Good
5 Phases
of Hacking - GeeksforGeeks
What is money laundering? |
FinCEN.gov


No comments:
Post a Comment