【】

Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they look like. I mean, come on. We've all seen the pictures.
They are a shady-looking individuals often found lurking in darkened rooms illuminated by nothing but the glow of menacing green binary code. Hackers are faceless creepers hidden by the invincible cloak of a hoodie, almost always typing on their keyboards.
Duh. Everyone knows that, because this stereotypical hacker image shows up in essentially every article ever written about hacking or cybersecurity attacks -- from iCloud breaches and DDoS attacks to the recent WannaCrypt ransomware attack.
SEE ALSO:How Hacking Worked Before ComputersWe too have fallen victim to using stock photos of keyboards in dark rooms to accompany stories about Russian hacks or cybersecurity attacks. But, man, if you saw some what we're choosing from, you'd realize that we have very little wiggle room here.
We get it, it's hard to properly illustrate something when you don't know the full story and have little information about the people involved, so artists have achieved a standard visual by combining the obvious presence of a computer with a mysterious-seeming person.
It works great for the sake of getting the message across, but the images are laughable. And as you can see by this beautiful selection of hacking photos, they lead to an incredibly stereotypical definition of a hacker.
Judging from these visual gems, here's what we know about hackers for sure:
They have hands, which they make significant use of in order to successfully hack

Hackers use their powerfully dangerous fingers to type. This we know to be true.
Sometimes they wear gloves on those hands to make themselves appear even more mysterious

Gloves are a key part of the hacker aesthetic. You can take the gloves off the hacker, but you can never take the hacker out of the gloves.
Hackers hate sunlight. They hack only by the glow of their screens

Aside from being intelligent computer geniuses and not sucking blood, hackers aren't all that different from vampires.
Seriously -- no sunlight just code light. And do not forget your hoodie


Every computer hacker is just A, the notorious villain from Pretty Little Liars.

Hackers don't have faces

Even when a computer shines its light directly upon a hacker, he still has no face. Magic.
If for some reason a black hoodie is not available, you are only permitted to hack if you have access to a creepy white mask


It's the RULES, okay?!
Even the FBI -- an organization that should have access to real images of hackers -- has disseminated similar images. According to the FBI, the male hacker also wears a dark hoodie and has eyes invisible to the rest of the world though he does, in fact, have a face.
Tweet may have been deleted
Tweet may have been deleted
Some hackers out there are surely sitting at their laptops surrounded by multiple half-empty coffee cups, some snacks, a to-do list -- heck, they're probably bingeing Netflix on their second monitor with their Facebook account open in a separate tab as they torture themselves by checking in on their exes.
Show us THAT hacker next time, O.K., stock photo companies? Show us a realhacker. Oh, and let's all just agree to put a moratorium on the stereotype and stop using the same damn photo.
Featured Video For You
Transform any surface into a touchscreen computer with this projector
TopicsCybersecurity
相关文章
Xiaomi accused of copying again, this time by Jawbone
Imitation is not always the best form of flattery.。 SEE ALSO:Xiaomi's MacBook Air clone is called, w2025-02-28Instagram users are losing millions of followers due to a bug
Several Instagram users on Wednesday woke up to find their follower counts significantly decreased.2025-02-28Elon Musk is serious about making the Tesla roadster fly
Gather round, for Elon Musk has made a new Twitter declaration.The Tesla CEO informed Twitter follow2025-02-28Super Bowl LIII disappointed, but the game still set new streaming records
While Super Bowl LIII may have been a disappointment for some (bored viewers, Rams fans, Saints fans2025-02-28Tributes flow after death of former Singapore president S.R. Nathan
The Singaporean government has announced that former president, 92-year-old Sellapan Ramanathan (wid2025-02-28A virtual reality 'Doctor Who' film is coming to a headset near you
If you've always wanted know what it's like to travel through space and time, then this is for you.2025-02-28
最新评论