Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 9 Hacker Profiles You Need to Be Aware Of

Tip of the Week: 9 Hacker Profiles You Need to Be Aware Of

“Hacker” is a word that can bring up many powerful impressions in people. It may very well bring up images of a pale super genius hunched over a keyboard, awash in dim blue light, as it does for many people. However, this extremely specific image does little but pigeonhole the many hackers in the real world into this dramatized caricature.

In reality, there are many different kinds of hacker, each with a preferred target and reason for doing what they do. For your part, it helps to be familiar with the 10 types of hackers that are to be found in reality.


  • Script Kiddies: There’s a reason that this type of hacker is under the “amateur” heading. These are the hackers who are capable of little more than piggybacking onto larger efforts, or dabbling in the more basic forms of cybercrime. They are little more than nuisances, compared to their hacking compatriots.

The Good Guys

  • White Hats: These ethical hackers, usually security researchers, are those that help the average user by using their skills to keep threats at bay.

Political Players

  • Hacktivists: Using DDoS attacks and website vandalism to humiliate and hobble their targets, these actors are usually part of a larger group, working towards an ideologically driven common cause.
  • Nationalist Hackers: These actors are those that, thanks to their sympathies and patriotic motives, are often given a pass by law enforcement.
  • Nation State Agents: These actors typically  for a government body, usually in a military or intelligence capacity. They have access to great capital resources, but will not hesitate to use common tools as well.

The Criminals

  • Cyber Mercenaries: These are hackers-for-hire, who will be brought on to assist other cybercriminals for a share of whatever ill-gotten gains there are to be had.
  • Repeat Offenders: These hackers are skilled, yet disorganized, which keeps them from obtaining the profits that other varieties of hackers do.
  • Organized Crime: These are criminal organizations that focus on cybercrime, with a hierarchy that allows them to reap great profits from their schemes.
  • Malicious Insider: These are the criminals who sit inside your walls, actively working to sabotage your efforts and leak critical information to your competition, often for personal motivations.

These malicious insiders are easily the most dangerous threat to an SMB, but that doesn’t mean that the others don’t cause problems as well. In order to keep them all at bay, you will not only need to encourage diligence in the workplace, but also protect that workplace with comprehensive security solutions.

The experts at Indevtech are ready to assist you in securing your business assets against external influences. Call (808) 529-4605 to get started.

Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Malware Backup User Tips Network Security Mobile Devices Microsoft Software Internet Innovation Data Windows 10 Efficiency Productivity Email Smartphones Hardware Workplace Tips Business Browser Tech Term VoIP Computer communications Business Continuity Disaster Recovery Smartphone IT Services Productivity Ransomware Miscellaneous Business Management Android Data Backup Network Cybercrime Windows Cloud Computing Outsourced IT Office Chrome Automation Data Recovery Server Alert Telephone Systems Windows 10 Artificial Intelligence Managed IT Services Computers Save Money Managed IT Services Router Internet of Things Upgrade Communication Quick Tips Health IT Support Cybersecurity Virtualization Social Media Small Business Facebook Money Law Enforcement Collaboration Social Engineering Applications Operating System Wi-Fi Office 365 Password Office Tips Passwords How To Mobile Device App Spam Holiday Gadgets Gmail Mobile Device Management Settings Google Drive History BDR Remote Computing Encryption Private Cloud Word Phishing Two-factor Authentication Work/Life Balance Bandwidth Information Bring Your Own Device Flexibility Scam Microsoft Office Paperless Office Voice over Internet Protocol Managed Service Vulnerability Safety Data Protection Mobility Connectivity Apps Mouse Managed Service Provider Entertainment Keyboard Marketing Data Breach Networking Sports HaaS Data Security Data Management Application Hacking Recovery VPN Meetings Remote Monitoring Physical Security YouTube Windows 7 Managed IT Data storage CES Business Intelligence End of Support Identity Theft Training Infrastructure eWaste Unsupported Software Software as a Service Update Virtual Assistant The Internet of Things PDF OneNote Botnet Content Management Internet Exlporer Mobile Computing Machine Learning Big Data Best Practice Retail Telephone System Electronic Medical Records DDoS Redundancy Robot Legal Blockchain Fraud Charger Black Market User Error BYOD Battery Access Control Data Storage Save Time Avoiding Downtime Firewall Employer-Employee Relationship Social Wearable Technology Cleaning Comparison Budget IT Management Google Docs Government Hiring/Firing Augmented Reality Spam Blocking Human Resources Cryptocurrency Public Cloud Downtime IT Support Servers Patch Management Saving Money USB IT Plan Website Telephony Assessment Help Desk Data loss Scalability Shortcut Staff Safe Mode Two Factor Authentication webinar Business Technology Hybrid Cloud Social Networking Online Shopping Addiction Risk Management HVAC IT Consultant Running Cable Shadow IT Proactive IT Outlook Smart Tech Printer Fax Server Troubleshooting Supercomputer Hacker Apple IT solutions Hosted Computing Computer Accessories Streaming Media Wiring Skype Politics Television Screen Mirroring Instant Messaging Conferencing Biometric Security Flash Evernote Cache Administrator Monitor Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Internet exploMicrosoft Users Credit Cards Vendor Management Lithium-ion battery Password Manager Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory Bluetooth Unified Threat Management Solid State Drive Start Menu Wireless Internet Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Emails NarrowBand MSP Information Technology Wireless Charging Microchip Travel Reputation Maintenance Password Management Benefits Leadership ISP Excel Workforce Advertising Virtual Reality Devices Content Techology Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending Camera Audit Tools Cortana Wire Experience People Vendor WiFi Humor Accountants Distributed Denial of Service Wireless Technology File Sharing Sync Going Green Search Engine Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Telecommuting Worker Commute Amazon Thought Leadership Audiobook SaaS Programming Biometrics Recycling Emergency Knowledge Digital Signage Files Education Authentication Worker Computer Fan Google Apps Smart Office Music Automobile Mobile Office Display Search Chromecast Laptop Wireless Customer Relationship Management Notifications Bing Video Games Smart Technology Database Windows Server 2008 Amazon Web Services FENG Value Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Remote Work Nanotechnology Rootkit Warranty Customer Service Workers Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Thank You CrashOverride Company Culture Compliance Webinar Congratulations Managing Stress Printers Regulation IT solutions Twitter