The Hacking Matrix

We took 25 of the biggest hacking stories we've published and assessed them along two dimensions: innovation and impact

1 min read

Some hackers use software and hardware to express themselves creatively—either solving entirely novel technical challenges or finding new ways to skin the same old cats. Others are motivated by money, power, politics, or pure mischief. They steal identities, deface Web sites, and break into supposedly secure and certainly sensitive databases.

We at IEEE Spectrum have written dozens of stories about both—the Steampunkers and Arduino do-it-yourselfers, on the one hand, the Anonymous and Lulzsec ne’er-do-wells on the other. Inspired by New York Magazine’s Approval Matrix, we took 25 of the biggest and best stories and assessed them along two dimensions: innovation and impact. (Last updated 6 July 2011)

Infographic showing how hacks compareMark Montgomery & Josh Romero

Read all the stories:

Open Source Warfare

https://spectrum.ieee.org/telecom/security/opensource-warfare

LulzSec

https://spectrum.ieee.org/riskfactor/telecom/security/hacks-continue-nintendo-and-fbi-affiliate-breached-while-lockheed-confirms-securid-involvement

IMF Breach

https://spectrum.ieee.org/riskfactor/telecom/security/imf-hit-by-hackers-sometime-in-may

Facebook Hackathon

https://spectrum.ieee.org/at-work/innovation/facebook-philosophy-move-fast-and-break-things

The UFO Hacker

https://spectrum.ieee.org/telecom/internet/the-autistic-hacker

Epsilon's Data Breach

https://spectrum.ieee.org/riskfactor/telecom/internet/massive-data-breach-at-epsilon-how-many-times-was-your-email-taken

Sony PSN Data Breach

https://spectrum.ieee.org/riskfactor/telecom/internet/sony-playstation-breach-costs-estimated-to-be-171-million-

RSA Compromised

https://spectrum.ieee.org/podcast/telecom/security/comodo-and-rsa-who-shall-guard-the-guardians

Stuxnet

https://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-playbook

Greek Cellphone Caper

https://spectrum.ieee.org/telecom/security/the-athens-affair

Kinect-enabled Robots

https://spectrum.ieee.org/automaton/robotics/diy/top-10-robotic-kinect-hacks

Torturing Secure Chips

https://spectrum.ieee.org/telecom/security/too-big-to-hack

RFID Hacking

https://spectrum.ieee.org/computing/hardware/hands-on

Open Source GSM Hack

https://spectrum.ieee.org/telecom/wireless/open-source-effort-to-hack-gsm

Goldmining: Playing Dirty

https://spectrum.ieee.org/computing/software/playing-dirty

Steampunk Contraption Creators

https://spectrum.ieee.org/consumer-electronics/gadgets/the-steampunk-contraptors

Barbot

https://spectrum.ieee.org/geek-life/hands-on/barbot-the-automated-bartender

Canon Hacker Development Kit

https://spectrum.ieee.org/geek-life/hands-on/using-the-canon-hack-development-kit

Sony PS3 Jailbreak

https://spectrum.ieee.org/consumer-electronics/gaming/how-sonys-antipiracy-approach-made-it-a-hacker-target

Chiptunes

https://spectrum.ieee.org/slideshow/consumer-electronics/gaming/chiptunes-are-popping

Texas Instruments vs Calculator Hackers

https://spectrum.ieee.org/consumer-electronics/gadgets/for-texas-instruments-calculator-hackers-dont-add-up

MIT Student Hacks

https://spectrum.ieee.org/slideshow/geek-life/hands-on/mit-students-by-day-hackers-by-night

Valve Battles Cheaters

https://spectrum.ieee.org/consumer-electronics/gaming/steamed-valve-software-battles-videogame-cheaters

Hacking Honeybees

https://spectrum.ieee.org/geek-life/hands-on/beehackers

Palin's Emails Hacked

https://spectrum.ieee.org/tech-talk/telecom/security/hacking-sarah-palin

Anonymous DDoS

https://spectrum.ieee.org/tech-talk/telecom/security/unmasking-the-anonymous-hackers

{"imageShortcodeIds":["29502485"]}
The Conversation (0)

The Ultimate Transistor Timeline

The transistor’s amazing evolution from point contacts to quantum tunnels

1 min read
A chart showing the timeline of when a transistor was invented and when it was commercialized.
LightGreen

Even as the initial sales receipts for the first transistors to hit the market were being tallied up in 1948, the next generation of transistors had already been invented (see “The First Transistor and How it Worked.”) Since then, engineers have reinvented the transistor over and over again, raiding condensed-matter physics for anything that might offer even the possibility of turning a small signal into a larger one.

Keep Reading ↓Show less