About 122,000 results
Open links in new tab
  1. Hackers (1995) - IMDb

    Hackers: Directed by Iain Softley. With Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard. Teenage hackers discover a criminal conspiracy with plans to use a computer virus that will capsize …

  2. Hacker - Wikipedia

    Hackers who work to keep data safe from other hackers by finding system vulnerabilities that can be mitigated.

  3. What Is a Hacker? - Cisco

    A hacker breaks into computer systems. There are hackers who exploit weak security for malicious intent, and ethical hackers who help find vulnerabilities.

  4. Who are hackers? All you need to know about hacking

    Hackers break into computer systems, while refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.

  5. Hackers and its Types - GeeksforGeeks

    Sep 18, 2025 · Most hackers are proficient programmers who study operating systems, networks, and programming languages in depth. Using this knowledge, they identify and sometimes exploit …

  6. What is a hacker? | Definition from TechTarget

    Mar 31, 2025 · What is a hacker? A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also refers to anyone who uses such abilities to …

  7. What Is Hacking? Types of Hacking & More | Fortinet

    Learn about the types of hackers, vulnerable devices to hacking, and hack prevention tips. A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized …

  8. What Is a Hacker? - Computer Hope

    Jun 1, 2025 · In reality, most hackers are curious about how computers, hardware, networks, or programs work. When they hack, they are experimenting, innovating, learning, and developing new …

  9. Hacker | Definition, Types, & Word Origin | Britannica

    hacker, information technology professionals or enthusiasts who compromise (or “hack”) the security of computers.

  10. The Hacker News | #1 Trusted Source for Cybersecurity News

    Attackers reuse existing systems instead of building new ones. They move faster than most organizations can patch or respond. From quiet code flaws to malware that changes while it runs, …