Hey there, human — the robots need you! Vote for IEEE’s Robots Guide in the Webby Awards.

Close bar

The Hacking Matrix

We took 25 of the biggest hacking stories we've published and assessed them along two dimensions: innovation and impact

1 min read

Some hackers use software and hardware to express themselves creatively—either solving entirely novel technical challenges or finding new ways to skin the same old cats. Others are motivated by money, power, politics, or pure mischief. They steal identities, deface Web sites, and break into supposedly secure and certainly sensitive databases.

We at IEEE Spectrum have written dozens of stories about both—the Steampunkers and Arduino do-it-yourselfers, on the one hand, the Anonymous and Lulzsec ne’er-do-wells on the other. Inspired by New York Magazine’s Approval Matrix, we took 25 of the biggest and best stories and assessed them along two dimensions: innovation and impact. (Last updated 6 July 2011)

Infographic showing how hacks compareMark Montgomery & Josh Romero

Read all the stories:

Open Source Warfare

https://spectrum.ieee.org/telecom/security/opensource-warfare

LulzSec

https://spectrum.ieee.org/riskfactor/telecom/security/hacks-continue-nintendo-and-fbi-affiliate-breached-while-lockheed-confirms-securid-involvement

IMF Breach

https://spectrum.ieee.org/riskfactor/telecom/security/imf-hit-by-hackers-sometime-in-may

Facebook Hackathon

https://spectrum.ieee.org/at-work/innovation/facebook-philosophy-move-fast-and-break-things

The UFO Hacker

https://spectrum.ieee.org/telecom/internet/the-autistic-hacker

Epsilon's Data Breach

https://spectrum.ieee.org/riskfactor/telecom/internet/massive-data-breach-at-epsilon-how-many-times-was-your-email-taken

Sony PSN Data Breach

https://spectrum.ieee.org/riskfactor/telecom/internet/sony-playstation-breach-costs-estimated-to-be-171-million-

RSA Compromised

https://spectrum.ieee.org/podcast/telecom/security/comodo-and-rsa-who-shall-guard-the-guardians

Stuxnet

https://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-playbook

Greek Cellphone Caper

https://spectrum.ieee.org/telecom/security/the-athens-affair

Kinect-enabled Robots

https://spectrum.ieee.org/automaton/robotics/diy/top-10-robotic-kinect-hacks

Torturing Secure Chips

https://spectrum.ieee.org/telecom/security/too-big-to-hack

RFID Hacking

https://spectrum.ieee.org/computing/hardware/hands-on

Open Source GSM Hack

https://spectrum.ieee.org/telecom/wireless/open-source-effort-to-hack-gsm

Goldmining: Playing Dirty

https://spectrum.ieee.org/computing/software/playing-dirty

Steampunk Contraption Creators

https://spectrum.ieee.org/consumer-electronics/gadgets/the-steampunk-contraptors

Barbot

https://spectrum.ieee.org/geek-life/hands-on/barbot-the-automated-bartender

Canon Hacker Development Kit

https://spectrum.ieee.org/geek-life/hands-on/using-the-canon-hack-development-kit

Sony PS3 Jailbreak

https://spectrum.ieee.org/consumer-electronics/gaming/how-sonys-antipiracy-approach-made-it-a-hacker-target

Chiptunes

https://spectrum.ieee.org/slideshow/consumer-electronics/gaming/chiptunes-are-popping

Texas Instruments vs Calculator Hackers

https://spectrum.ieee.org/consumer-electronics/gadgets/for-texas-instruments-calculator-hackers-dont-add-up

MIT Student Hacks

https://spectrum.ieee.org/slideshow/geek-life/hands-on/mit-students-by-day-hackers-by-night

Valve Battles Cheaters

https://spectrum.ieee.org/consumer-electronics/gaming/steamed-valve-software-battles-videogame-cheaters

Hacking Honeybees

https://spectrum.ieee.org/geek-life/hands-on/beehackers

Palin's Emails Hacked

https://spectrum.ieee.org/tech-talk/telecom/security/hacking-sarah-palin

Anonymous DDoS

https://spectrum.ieee.org/tech-talk/telecom/security/unmasking-the-anonymous-hackers

{"imageShortcodeIds":["29502485"]}
The Conversation (0)