If you’re an internet user, for sure you’re. That’s why you’re able to read my article. But jokes apart, every person related to tech and the internet knows about hackers and the term Hacking. But most of the times we misunderstand the term hacking.

For instance, I’m a student of computer engineering. So my friends who don’t exactly know much about computers will be like; Hack a Facebook account for us. Help me my twitter account is blocked and many things like that.

This is mostly due to lack of tech knowledge. In this article, I’m going to discuss some funny myths about Hackers people commonly relate to. So let’s have a look:

When Cybersecurity is misunderstood:

Cybersecurity is protecting a system, network or a web application from being compromised. And Hacking is vice versa. But it is a skill which is later after being qualified, chosen as a profession. Same as being a doctor, engineer, singer, writer.

  • Hacking is a skill, not a trick:

This is my personal experience, I don’t know how many people agree with me. Hacking is not a trick or doing something not in a normal way. There is a difference between compromising a computer and doing pranks or tricks. A hacker is someone who uses vulnerabilities to exploit a system. Not a trick master, who can perform interesting computer tricks.

  • All Programmers are Hackers:

This one makes me laugh all the time. And one of the most common misconception. For being a hacker you need to have knowledge about finding vulnerabilities and how to exploit them to compromise your target. A good hacker can improve his skills by learning programming languages and make his own scripts and tools for his ease. But it doesn’t mean that every programmer is a hacker himself.

  • All Hackers are criminals:

Hacking is illegal when you try to get unauthorized access to someone’s privacy. There are cybercrime laws that define a clear difference between a cybercriminal and a security penetration tester. But many people think that every person who’s related to offensive security or penetration testing is doing illegal activity. But it’s not true, to prevent cybercriminals to perform attacks, companies hire penetration testers and cybersecurity professionals to secure their systems. They are doing a legal job.

Hacking and Cyber security
Hacking and Cybersecurity
  • Hacking is logic, not magic:

Movies have performed an important role in misleading the people about the concept of Hacking. Now a guy who’s not closely related to tech thinks that just like enchanting magic spells, Hackers have some special software where they put the name and address of the target and the target gets hacked.

Now a question will raise there are much software used for hacking. But let me just ask, Social Engineering is also a technique to hack. But the best tool for social engineering is the human mind. The software can make the work easy but there is no magic tool that hacks on just instructions by the person with no skills.

  • The Anonymous:

If you have an interest in cybersecurity, you must know about the famous hacktivist team The Anonymous. This is not so common now, but a couple of years ago it was highly misunderstood that hacking means joining anonymous. I encountered such scammers many times in the early days of my learning time. Thank God now people have started realizing the facts.

So these were some misunderstandings. There are many more you’ll find around you. But I’ll say that before believing anything, first do some research on it. Many people get hacked because they don’t know what’s going. You can be an easy victim of social engineering if you don’t know about information security much.

This article was my personal experience based on the time I spend on Socializing. All the points are gathered after interacting with people on social media. Because there you can find people from every part of the world.

  1. Good story. I’ve worked in the computer/communications arena for 30 years. Most people used to think “hackers” were so brilliant because they could intercept or steal information on the network. What they didn’t realize was that the whole process of communications is “standardized” and therefore available in the public domain. Anyone can read the “how it works” if they wanted to get into a network. As security became more sophisticated the “how” changed by forcing the bad guys to use trojan horses and other means of infecting someone’s computer. Ask the DNC how it feels! All that took was one person downloading an innocent looking file to a connected computer. Now the “playing field” is shifting to other network equipment. Security cameras attached to networks, printers and even routers are targets for attack. There are a lot of things that could use tightening up on the internet but that’s another story.

Please enter your comment!
Please enter your name here