

By 2003 Microsoft started offering money to hackers that could infiltrate Windows.Hackers quickly learned that they could monetize these skills.In 1986 Congress passed the Computer Fraud & Abuse Act.Hackers became more advanced with technology and continued to break into computers and networks. They connected through the phone network. During the 1980's people were buying their own personal computers for their homes.
Cereal whistle phone for free#
Steve Wozniak and Steve Jobs started selling these refined items called "blue boxes." Their function allowed for free calling. John Draper earned the title "Cap'n Crunch" due to his realization that a toy whistle given away in a cereal box delivered the perfect tone to hack the phone system. In 1971 hackers known as "phreakers" figured out how to gain access to AT&T's long distance system in order to make free long distance calls.Around 1969 MIT students challenged themselves to hack electric train tracks and switches in order to improve their performance.Developing a deeper understanding of these two critical pieces of information will help you better protect yourself and your business. Hackers' motives have changed over the years but so has the profile of a hacker. Unless you are part of an organization (like TechGuard) who employs certified, trained Cybersecurity Experts to perform services that detect gaps and vulnerabilities, odds are nowadays this is not the case.

You may recall a time when improvement/advancement of technology was the main motive for hacking. Consider how much has changed since hacking began. If you're reading our blogs, chances are you will recall us emphasizing the fact that hackers have evolved through the years making it increasingly challenging to stay ahead of threats.
