时间:2025-10-31 09:07:16 来源:网络整理编辑:知識
Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they loo
Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they look like. I mean, come on. We've all seen the pictures.
They are a shady-looking individuals often found lurking in darkened rooms illuminated by nothing but the glow of menacing green binary code. Hackers are faceless creepers hidden by the invincible cloak of a hoodie, almost always typing on their keyboards.
Duh. Everyone knows that, because this stereotypical hacker image shows up in essentially every article ever written about hacking or cybersecurity attacks -- from iCloud breaches and DDoS attacks to the recent WannaCrypt ransomware attack.
SEE ALSO:How Hacking Worked Before ComputersWe too have fallen victim to using stock photos of keyboards in dark rooms to accompany stories about Russian hacks or cybersecurity attacks. But, man, if you saw some what we're choosing from, you'd realize that we have very little wiggle room here.
We get it, it's hard to properly illustrate something when you don't know the full story and have little information about the people involved, so artists have achieved a standard visual by combining the obvious presence of a computer with a mysterious-seeming person.
It works great for the sake of getting the message across, but the images are laughable. And as you can see by this beautiful selection of hacking photos, they lead to an incredibly stereotypical definition of a hacker.
Judging from these visual gems, here's what we know about hackers for sure:
 Hacker using laptop. Lots of digits on the computer screen.; Shutterstock ID 172084607Credit: Shutterstock / REDPIXEL.PL
Hacker using laptop. Lots of digits on the computer screen.; Shutterstock ID 172084607Credit: Shutterstock / REDPIXEL.PLHackers use their powerfully dangerous fingers to type. This we know to be true.
 Credit: Shutterstock / welcomia
Credit: Shutterstock / welcomiaGloves are a key part of the hacker aesthetic. You can take the gloves off the hacker, but you can never take the hacker out of the gloves.
 Single solitary computer hacker works in the dark committing crime; Shutterstock ID 280469939Credit: Shutterstock / John Williams RUS
Single solitary computer hacker works in the dark committing crime; Shutterstock ID 280469939Credit: Shutterstock / John Williams RUSAside from being intelligent computer geniuses and not sucking blood, hackers aren't all that different from vampires.
 faceless computer hackerCredit: Bill Hinton/ Getty Images
faceless computer hackerCredit: Bill Hinton/ Getty Images Faceless Computer HackerCredit: Bill Hinton/ Getty Images
Faceless Computer HackerCredit: Bill Hinton/ Getty ImagesEvery computer hacker is just A, the notorious villain from Pretty Little Liars.
 A from 'Pretty Little Liars,' an expert villain and hacker.Credit: abc family
A from 'Pretty Little Liars,' an expert villain and hacker.Credit: abc family Hacker using laptop. Hacking the Internet.; Shutterstock ID 503150188Credit: Shutterstock / REDPIXEL.PL
Hacker using laptop. Hacking the Internet.; Shutterstock ID 503150188Credit: Shutterstock / REDPIXEL.PLEven when a computer shines its light directly upon a hacker, he still has no face. Magic.
 Anonymous teenager in mask on internet at nightCredit: Peter Dazeley/Getty Images
Anonymous teenager in mask on internet at nightCredit: Peter Dazeley/Getty Images Credit: Peter Dazeley/Getty Images
Credit: Peter Dazeley/Getty ImagesIt's the RULES, okay?!
Even the FBI -- an organization that should have access to real images of hackers -- has disseminated similar images. According to the FBI, the male hacker also wears a dark hoodie and has eyes invisible to the rest of the world though he does, in fact, have a face.
Tweet may have been deleted
Tweet may have been deleted
Some hackers out there are surely sitting at their laptops surrounded by multiple half-empty coffee cups, some snacks, a to-do list -- heck, they're probably bingeing Netflix on their second monitor with their Facebook account open in a separate tab as they torture themselves by checking in on their exes.
Show us THAT hacker next time, O.K., stock photo companies? Show us a realhacker. Oh, and let's all just agree to put a moratorium on the stereotype and stop using the same damn photo.
TopicsCybersecurity
Darth Vader is back. Why do we still care?2025-10-31 09:05
武磊製作視頻祝福妻子生日快樂 :小仙女一直閃亮2025-10-31 08:52
吳曦分享12強賽西亞見聞:不辜負能為國征戰的每一天2025-10-31 08:38
李鐵信任一直跟他的球員 國足還有哪些“生力軍”可用?2025-10-31 08:38
Fiji wins first2025-10-31 08:35
巴西前瞻 :內馬爾追梅西貝利紀錄 法爾考威脅防線2025-10-31 08:26
FIFA國家隊積分排名:比利時位居榜首 意大利第五2025-10-31 08:25
國足有望全員參加沙特首訓 重點攻堅抑製對手速度優勢2025-10-31 08:22
'The Flying Bum' aircraft crashes during second test flight2025-10-31 07:47
津媒:國足挑戰沙特準備時間不足 做好對爭議判罰的準備2025-10-31 06:23
This app is giving streaming TV news a second try2025-10-31 08:52
意媒曝西乙隊有意邀卡納瓦羅 該球隊老板正是大羅2025-10-31 08:46
FIFA國家隊積分排名 :比利時位居榜首 意大利第五2025-10-31 08:26
中沙三線PK:國足全麵被動還善變 沙特鋒將愛虐菜2025-10-31 08:10
Katy Perry talks 'Rise,' her next batch of songs, and how to survive Twitter2025-10-31 08:10
格德斯回歸巴甲就拿月度最佳 4場轟3球送1助攻2025-10-31 07:14
武磊透露進球戰術:是2013年徐導帶我們第一年踢中超的套路2025-10-31 07:09
梅西 :本已下定決心在巴薩退役 別無選擇隻能離開2025-10-31 06:43
Wikipedia co2025-10-31 06:34
金球獎30人候選名單 :梅西萊萬C羅領銜 克亞爾入圍2025-10-31 06:31