SlideShare ist ein Scribd-Unternehmen logo
1 von 12
10
Notorious
Female
Hackers
Rizova Iaroslava
IS-52s
Structure
1. Introduction
2. Raven Adler
3. Adeanna Cooke
4. Gigabyte
5. Xiao Tian
6. Kristina Svechinskaya
7. Jude Milhon
8. Ying Cracker
9. Joanna Rutkowska
10.Susan Headley
Introduction
Hacking, the art of writing computer code, and manipulating computer
hardware has traditionally kept men at the top of the field, and that is why
many are surprised to hear that there are a handful of women that have
found a place in this world. It remains an evolving, multi-billion dollar
industry as some hackers are often blamed for causing irreparable damage
while others are simultaneously credited for some of the biggest
breakthroughs in technology. No matter what a hacker may be, they are
known for their resourcefulness and their knowledge of complex theory, so
here is a closer look at ten of the most notorious female hackers and the
impact that they have had on the world.
Raven Adler
Often recognized as one of the most gifted and intelligent
hackers in the world, Raven Adler graduated high school at just
14 and got her college degree at 18. As a frequent speaker at
hacking and software conferences, Adler was also the first
female to ever give a presentation at DefCon, one of the world’s
most prestigious gathering of hackers. When asked about her
appearance at DefCon, she often replies that she would like to
be known for her work, not for being a female in the field.
Currently, Adler specializes in securing data from end-to-end,
and this has made her invaluable to both private and public
organizations looking to protect sensitive information. She now
works as a senior security consultant for a number of
companies and continues to give lectures and regularly publish
her work in industry magazines. She also works closely
alongside a number of federal firms in an effort to secure their
online databases.
Adeanna Cooke
Most of the world recognizes Adeanna Cooke as an
international model regularly featured in Playboy, but her fans
are often surprised to hear that she is also a well-established
hacker and amateur computer programmer. With very little in
the way of training, Cooke taught herself the basics of hacking
and often uses it to further her modeling career. When her
images were illegally used to make money by her long-time
partner, Cooke took on the project of protecting her images and
hacked the website to remove all of the stolen property. After
this event Cooke was named “Hacker Fairy” and found her
calling within the hacking industry. She now helps professional
models and other women from being taken advantage of online.
Gigabyte
While many of the top female hackers are known for their legal
work within the security sector, Gigabyte is on the opposite end
of the spectrum. Her real name is Kim Vanvaeck and she was
born and raised in Belgium. She is believed to have been the
sole creator or primary creator of a number of high-end viruses
including Coconut-A, Sahay-A, and Sharp-A meant to target
hardware with sensitive information. Unlike many other viruses
that were meant to steal private information in order to make
money, these viruses were used to destroy the information
itself. Law enforcement agencies have tried to paint her as a
woman that is seeking notoriety in a field that is dominated by
men, and Gigabyte’s name was traced to hundreds of viruses
throughout the years. Recently, Vanvaeck was arrested just
outside of her hometown of Mechelon near Brussels but was
released within 24 hours on bail. She is currently accused of
stealing and destroying private data and is facing 3 years in
prison and over 100,000 Euros in fines.
Kristina Svechinskaya
Without question, Krisina Svechinskaya remains
one of the most well-known names in hacking. This
Russian hacker is also a top-notch New York
University student, but most will recognize her
from a string of high-end hacking jobs that have
potentially resulted in millions of dollars lost.
Specializing in the use of Trojan horses,
Svechinskaya attacked thousands of bank
accounts, most within the United States, and then
created a series of fake accounts through both
Bank of America and Wachovia. She then utilized
nine other people to create fake passports, but was
finally caught and is now under threat of multiple
charges. Overall, some authorities estimate that
she stole $3 million in as little as a few months.
Jude Milhon
Before passing away in 2003, Jude Milhon was a hacker and author best
known under the pseudonym St. Jude. She began her career as a computer
programmer in 1967 working with some of the earliest incarnations of the
internet. As time went on, she began her slow transition into the life of a
hacker and eventually started the hacking group Cypherpunks, not to be
confused with cyberpunks. Milhon was one of the primary activists that
stated hacking was nothing more than bringing out the potential of
software and continued to lobby against all those that believed hacking
was nothing more than a criminal act. Throughout her life she wrote book
after book as well as contributed to a number of magazines within both the
hacking industry and the computer programming industry.
Ying Cracker
When it comes to the world of female hackers, Ying Cracker
can be seen as the professor that gives students their first
taste of this unique field. Often referring to herself as an
educator, Ying Cracker is a resident of Shanghai and believes
that hacking is a useful skill that can be learned by anyone.
This is why she has released multiple publications that teach
introductory skills for hacking. Generally aimed at a younger
crowd, Cracker helps students with information such as how
to change one’s IP address or even scramble their personal
passwords. Originally noticed on a message board for her
looks, Ying Cracker has set out to convince the world that
female hackers can add quite a bit to this field. As her primary
form of income, she now offers free courses as well as tailor-
made software to private and public organizations that would
like to protect their sensitive data. She also offers paid courses
for those that would like to move beyond the basics of hacking
and get into high-end software development.
Joanna Rutkowska
Joanna Rutkowska is further proof that not all hackers are
bad, and few specialists have done more for operating system
security than this notorious hacker. Most widely regarded for
her work with Windows Vista, Rutkowska shocked the world
in the August 2006 Black Hat Briefing Convention in Las
Vegas. In front of a crowd, Rutkowska demonstrated two
simple methods for hacking into the Windows Vista beta. She
also revealed a Blue Pill technique that allowed her to transfer
a running operating system onto a virtual machine well before
the worldwide use of virtual machines and virtual servers
within the private sector. Named as one of the ‘Five Hackers
who Put a Mark on 2006,’ this Polish hacker now helps
customers with her international security firm. She continues
to give lectures at conferences and works closely with some of
the biggest software and hardware designers in the industry
including Windows.
Susan Headley
With her career stretching back decades, Susan Headley has
undergone her fair share of nicknames including both Susy
Thunder and Susan Thunder. Going all the way back to 1970s,
Headley was one of the first females to join one of the most
renowned hacking groups in history, Cyberpunks. Throughout
the 1970s and 80s, this organization continued to advance the
field of hacking and created some of the most common tactics
that are still used today. Over time, Headley created her own
offshoot organization known as the Roscoe Gang, but she
eventually gave up her hacking career to move to Las Vegas
and become a professional poker player. In a twist that very
few professional hackers undergo, Headley decided that she
was ready for public office, even in a minor position, and was
elected as the City Clerk in California City in 1994.
Thanks for watching!

Weitere ähnliche Inhalte

Was ist angesagt?

Ransomware the clock is ticking
Ransomware the clock is tickingRansomware the clock is ticking
Ransomware the clock is tickingManoj Kumar Mishra
 
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLMalware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLCyphort
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Wanna-cry Ransome ware
Wanna-cry Ransome wareWanna-cry Ransome ware
Wanna-cry Ransome wareABHAY PATHAK
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedThomas Roccia
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatRobert Leong
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingIron Cove
 

Was ist angesagt? (13)

Ransomware the clock is ticking
Ransomware the clock is tickingRansomware the clock is ticking
Ransomware the clock is ticking
 
Hacking
HackingHacking
Hacking
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLMalware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Wanna-cry Ransome ware
Wanna-cry Ransome wareWanna-cry Ransome ware
Wanna-cry Ransome ware
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeat
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hacking
 

Ähnlich wie 10 notorious female hackers.pptx

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleFelipe Prado
 
Your money or your files
Your money or your filesYour money or your files
Your money or your filesRoel Palmaers
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
AnotherDay Vogue article - "Gone Phishing"
AnotherDay Vogue article - "Gone Phishing"AnotherDay Vogue article - "Gone Phishing"
AnotherDay Vogue article - "Gone Phishing"Jake Hernandez
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 

Ähnlich wie 10 notorious female hackers.pptx (20)

Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Hacking
HackingHacking
Hacking
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
AnotherDay Vogue article - "Gone Phishing"
AnotherDay Vogue article - "Gone Phishing"AnotherDay Vogue article - "Gone Phishing"
AnotherDay Vogue article - "Gone Phishing"
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Malwares
MalwaresMalwares
Malwares
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

10 notorious female hackers.pptx

  • 2. Structure 1. Introduction 2. Raven Adler 3. Adeanna Cooke 4. Gigabyte 5. Xiao Tian 6. Kristina Svechinskaya 7. Jude Milhon 8. Ying Cracker 9. Joanna Rutkowska 10.Susan Headley
  • 3. Introduction Hacking, the art of writing computer code, and manipulating computer hardware has traditionally kept men at the top of the field, and that is why many are surprised to hear that there are a handful of women that have found a place in this world. It remains an evolving, multi-billion dollar industry as some hackers are often blamed for causing irreparable damage while others are simultaneously credited for some of the biggest breakthroughs in technology. No matter what a hacker may be, they are known for their resourcefulness and their knowledge of complex theory, so here is a closer look at ten of the most notorious female hackers and the impact that they have had on the world.
  • 4. Raven Adler Often recognized as one of the most gifted and intelligent hackers in the world, Raven Adler graduated high school at just 14 and got her college degree at 18. As a frequent speaker at hacking and software conferences, Adler was also the first female to ever give a presentation at DefCon, one of the world’s most prestigious gathering of hackers. When asked about her appearance at DefCon, she often replies that she would like to be known for her work, not for being a female in the field. Currently, Adler specializes in securing data from end-to-end, and this has made her invaluable to both private and public organizations looking to protect sensitive information. She now works as a senior security consultant for a number of companies and continues to give lectures and regularly publish her work in industry magazines. She also works closely alongside a number of federal firms in an effort to secure their online databases.
  • 5. Adeanna Cooke Most of the world recognizes Adeanna Cooke as an international model regularly featured in Playboy, but her fans are often surprised to hear that she is also a well-established hacker and amateur computer programmer. With very little in the way of training, Cooke taught herself the basics of hacking and often uses it to further her modeling career. When her images were illegally used to make money by her long-time partner, Cooke took on the project of protecting her images and hacked the website to remove all of the stolen property. After this event Cooke was named “Hacker Fairy” and found her calling within the hacking industry. She now helps professional models and other women from being taken advantage of online.
  • 6. Gigabyte While many of the top female hackers are known for their legal work within the security sector, Gigabyte is on the opposite end of the spectrum. Her real name is Kim Vanvaeck and she was born and raised in Belgium. She is believed to have been the sole creator or primary creator of a number of high-end viruses including Coconut-A, Sahay-A, and Sharp-A meant to target hardware with sensitive information. Unlike many other viruses that were meant to steal private information in order to make money, these viruses were used to destroy the information itself. Law enforcement agencies have tried to paint her as a woman that is seeking notoriety in a field that is dominated by men, and Gigabyte’s name was traced to hundreds of viruses throughout the years. Recently, Vanvaeck was arrested just outside of her hometown of Mechelon near Brussels but was released within 24 hours on bail. She is currently accused of stealing and destroying private data and is facing 3 years in prison and over 100,000 Euros in fines.
  • 7. Kristina Svechinskaya Without question, Krisina Svechinskaya remains one of the most well-known names in hacking. This Russian hacker is also a top-notch New York University student, but most will recognize her from a string of high-end hacking jobs that have potentially resulted in millions of dollars lost. Specializing in the use of Trojan horses, Svechinskaya attacked thousands of bank accounts, most within the United States, and then created a series of fake accounts through both Bank of America and Wachovia. She then utilized nine other people to create fake passports, but was finally caught and is now under threat of multiple charges. Overall, some authorities estimate that she stole $3 million in as little as a few months.
  • 8. Jude Milhon Before passing away in 2003, Jude Milhon was a hacker and author best known under the pseudonym St. Jude. She began her career as a computer programmer in 1967 working with some of the earliest incarnations of the internet. As time went on, she began her slow transition into the life of a hacker and eventually started the hacking group Cypherpunks, not to be confused with cyberpunks. Milhon was one of the primary activists that stated hacking was nothing more than bringing out the potential of software and continued to lobby against all those that believed hacking was nothing more than a criminal act. Throughout her life she wrote book after book as well as contributed to a number of magazines within both the hacking industry and the computer programming industry.
  • 9. Ying Cracker When it comes to the world of female hackers, Ying Cracker can be seen as the professor that gives students their first taste of this unique field. Often referring to herself as an educator, Ying Cracker is a resident of Shanghai and believes that hacking is a useful skill that can be learned by anyone. This is why she has released multiple publications that teach introductory skills for hacking. Generally aimed at a younger crowd, Cracker helps students with information such as how to change one’s IP address or even scramble their personal passwords. Originally noticed on a message board for her looks, Ying Cracker has set out to convince the world that female hackers can add quite a bit to this field. As her primary form of income, she now offers free courses as well as tailor- made software to private and public organizations that would like to protect their sensitive data. She also offers paid courses for those that would like to move beyond the basics of hacking and get into high-end software development.
  • 10. Joanna Rutkowska Joanna Rutkowska is further proof that not all hackers are bad, and few specialists have done more for operating system security than this notorious hacker. Most widely regarded for her work with Windows Vista, Rutkowska shocked the world in the August 2006 Black Hat Briefing Convention in Las Vegas. In front of a crowd, Rutkowska demonstrated two simple methods for hacking into the Windows Vista beta. She also revealed a Blue Pill technique that allowed her to transfer a running operating system onto a virtual machine well before the worldwide use of virtual machines and virtual servers within the private sector. Named as one of the ‘Five Hackers who Put a Mark on 2006,’ this Polish hacker now helps customers with her international security firm. She continues to give lectures at conferences and works closely with some of the biggest software and hardware designers in the industry including Windows.
  • 11. Susan Headley With her career stretching back decades, Susan Headley has undergone her fair share of nicknames including both Susy Thunder and Susan Thunder. Going all the way back to 1970s, Headley was one of the first females to join one of the most renowned hacking groups in history, Cyberpunks. Throughout the 1970s and 80s, this organization continued to advance the field of hacking and created some of the most common tactics that are still used today. Over time, Headley created her own offshoot organization known as the Roscoe Gang, but she eventually gave up her hacking career to move to Las Vegas and become a professional poker player. In a twist that very few professional hackers undergo, Headley decided that she was ready for public office, even in a minor position, and was elected as the City Clerk in California City in 1994.