Saturday, April 18, 2026

The Hidden Pull of the Digital World

Did you know that it has been said that hacking can feel thrilling-solving complex problems, but that rush can become addictive if it turns into obsession or harmful behavior?


Did You Know?





***Purpose***


     1.  Teen Hackers and Addiction

According to bbc.com/news a study suggests there are parallels between the way youngsters turn into hackers and how youths become addicted to drugs and alcohol.  They further added that reports show the teens’ goal was not for financial gain, but rather to boost their reputation among other hackers to compensate for what might be a lack of self-esteem in the rest of their lives.



    2.   Young Hacker Speaks Out

This young hacker put at risk the security of 60 million children and 10 million teachers.  He admitted that he feels he needs to go to prison for what he did and that if they had not stopped him, he probably would still be hacking.   This is talked about at abcnews.com.   They further added that 15- and 16-year-olds are hacking; That there is a whole young generation who are like free-range chickens with no guidance.  When you think about it 15- and 16-year-olds are not adults but are starting crime at a very earl age and the internet makes it very possible for them to do so.  Crime has always existed, but internet crime is new and different. 

    3. Who Are Cyber Criminals?

You might ask, “Who are cyber criminals?”  Cyber criminals also known as hackers are extremely difficult to identify and the growth of this global network poses a major threat to governments and corporations. Online.norwich.edu further added that cyber criminals might include identity thieves, internet stalkers, phishing scammers, and cyber terrorists.

   4. Psychological Profile of Cyber Criminals

Cyber criminals have above-average intelligence, a lack of empathy, some are motivated by narcissism, the internet’s anonymity and distance makes it more appealing to participate in unlawful activity, the excitement of successfully breaking a system can fuel the drive for more, and they frequently exhibit impulsiveness and aggression. 

This reminds me of a movie I watched called “Queenpins.”.  The lady was queen of couponing but became obsessed with making it bigger and better.  This was based on a true story.   The woman had made couponing an illegal business by selling counterfeit coupons.  She had become a multimillionaire owning several vehicles and airplanes.   It was seemingly addictive for her and her accomplices that helped.

   5. Conti

Have you heard of Conti?  Conti is one of the 10 Most Notorious Cybercrime Groups in 2026.  Their operation included performance reviews, salary structures, internal chat logs, human resources disputes, and offering tech support to affiliates and documented their attack playbooks better than some IT teams.  Caniphish.com talks about this.  They also added that this gang became known for hitting governments, hospitals, and global businesses demanding tens of millions in crypto.  Note: One teen hacker mentioned on the news he would demand crypto and then convert it to cash and send it to his house.  His mother never knew.  She thought he was getting regular mail, and he was getting millions of dollars in the mail.  Now who would have thought of something like that?

   6. State of Michigan

How does your state rate in cybercrime?   The State of Michigan ranks 8th for cybercrimes with a reported 17th for money lost per victim.  Michigan laws have adapted to address the evolving nature of cybercrime according to bing.com.

  7. The World Online

Do you know when the world went online?   It went online in the 1990’s according to cybersecutiryventures.com.   They further added that email became a blessing and a curse as it opened new entry points for viruses.   Now the next generation from 2010-2019 included Saudi hackers of credit cards online, malicious hackers into Yahoo, and the forcing of New Zealand’s stock market to temporarily shut down.

  8.  Yahoo Cyber Threat

Yahoo experienced one of the largest data breaches in internet history during 2013-2014.   It affected 3 billion accounts and according to bing.com allegedly Russian agent hackers stole usernames, email, address, and passwords, enabling identity theft and cyber-espionage.  The internet has it’s blessing and has its curses.

  9.  Ethical Hacking?

Do you know what ethical hacking is?   Ethical hacking employs the same methods as malicious hackers, but instead of exploiting vulnerabilities, ethical hackers report them to organizations so preventive measures can be implemented.    Forbes.com talks about this.  They further added that types of ethical hacking might include penetration testing, system hacking, internal testing, web application testing, and Network Hacking.  Yes, there are benefits to Ethical hacking.  They allow an organization to discover its weak spots before they can be exploited and they can save organizations large sums of money, as well as protecting them from the loss of a good reputation.

  10. 5 Phases of Ethical Hacking

What are the 5 phases of ethical hacking?  The 5 phases include Reconnaissance (Foot printing Phase), scanning, gaining access, maintaining access, and covering tracks.  According to geeksforgeeks.org., once this step is completed it means the ethical hacker has successfully gained access to the system or network, exploited vulnerabilities, and exited without detection.

  11. What is Money Laundering?

Are you familiar with the concept of money laundering? Money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them.  Fincen.gov. talks about this.   They further added money laundering provides the fuel for drug dealers, terrorists, arms dealers, and other criminals to operate and expand their criminal

 Guest Blogging:

Guest bloggers welcome.  Would you like to guest blog at

               anointedtoday.blogspot.com?

Just contact me at anointedtoday@gmail.com and let me know.

Guest Blogging is another avenue for great exposure to your blog.

I look forward to hearing from you soon.

 

  Visit My Store at 

Anointedtoday/ Redbubble


More From this Author. . .         Just Click the Link Below. . .

How to Overcome Burnout

 Do You Believe in Miracles?

 There is Power in a Father’s Word

 

Source:

Teen hackers study considers link to addiction - BBC News

'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison - ABC News

Who Are Cyber Criminals? | Norwich University - Online

The Psychology of Cybercriminals: Understanding the Enemy - CyberInfoBlog: what is cyber security, for all levels

The 10 Most Notorious Cybercrime Groups In 2026

Cybercrimes in Michigan - Search

The History Of Cybercrime And Cybersecurity, 1940-2020

biggest cyber crimes in history - Search

What Is Ethical Hacking? Using Hacking Techniques For Good

5 Phases of Hacking - GeeksforGeeks

What is money laundering? | FinCEN.gov

 

 

No comments:

Post a Comment