【】

  发布时间:2025-12-15 08:04:10   作者:玩站小弟   我要评论
Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they loo 。

Hackers make it their life's mission to remain anonymous, but we allllllllknow exactly what they look like. I mean, come on. We've all seen the pictures.

They are a shady-looking individuals often found lurking in darkened rooms illuminated by nothing but the glow of menacing green binary code. Hackers are faceless creepers hidden by the invincible cloak of a hoodie, almost always typing on their keyboards.

Duh. Everyone knows that, because this stereotypical hacker image shows up in essentially every article ever written about hacking or cybersecurity attacks -- from iCloud breaches and DDoS attacks to the recent WannaCrypt ransomware attack.

SEE ALSO:How Hacking Worked Before Computers

We too have fallen victim to using stock photos of keyboards in dark rooms to accompany stories about Russian hacks or cybersecurity attacks. But, man, if you saw some what we're choosing from, you'd realize that we have very little wiggle room here.

We get it, it's hard to properly illustrate something when you don't know the full story and have little information about the people involved, so artists have achieved a standard visual by combining the obvious presence of a computer with a mysterious-seeming person.

It works great for the sake of getting the message across, but the images are laughable. And as you can see by this beautiful selection of hacking photos, they lead to an incredibly stereotypical definition of a hacker.

Judging from these visual gems, here's what we know about hackers for sure:

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

They have hands, which they make significant use of in order to successfully hack

Mashable ImageHacker using laptop. Lots of digits on the computer screen.; Shutterstock ID 172084607Credit: Shutterstock / REDPIXEL.PL

Hackers use their powerfully dangerous fingers to type. This we know to be true.

Sometimes they wear gloves on those hands to make themselves appear even more mysterious

Mashable ImageCredit: Shutterstock / welcomia

Gloves are a key part of the hacker aesthetic. You can take the gloves off the hacker, but you can never take the hacker out of the gloves.

Hackers hate sunlight. They hack only by the glow of their screens

Mashable ImageSingle solitary computer hacker works in the dark committing crime; Shutterstock ID 280469939Credit: Shutterstock / John Williams RUS

Aside from being intelligent computer geniuses and not sucking blood, hackers aren't all that different from vampires.

Seriously -- no sunlight just code light. And do not forget your hoodie

Mashable Imagefaceless computer hackerCredit: Bill Hinton/ Getty ImagesMashable ImageFaceless Computer HackerCredit: Bill Hinton/ Getty Images

Every computer hacker is just A, the notorious villain from Pretty Little Liars.

Mashable ImageA from 'Pretty Little Liars,' an expert villain and hacker.Credit: abc family

Hackers don't have faces

Mashable ImageHacker using laptop. Hacking the Internet.; Shutterstock ID 503150188Credit: Shutterstock / REDPIXEL.PL

Even when a computer shines its light directly upon a hacker, he still has no face. Magic.

If for some reason a black hoodie is not available, you are only permitted to hack if you have access to a creepy white mask

Mashable ImageAnonymous teenager in mask on internet at nightCredit: Peter Dazeley/Getty ImagesMashable ImageCredit: Peter Dazeley/Getty Images

It's the RULES, okay?!

Even the FBI -- an organization that should have access to real images of hackers -- has disseminated similar images. According to the FBI, the male hacker also wears a dark hoodie and has eyes invisible to the rest of the world though he does, in fact, have a face.

Some hackers out there are surely sitting at their laptops surrounded by multiple half-empty coffee cups, some snacks, a to-do list -- heck, they're probably bingeing Netflix on their second monitor with their Facebook account open in a separate tab as they torture themselves by checking in on their exes.

Show us THAT hacker next time, O.K., stock photo companies? Show us a realhacker. Oh, and let's all just agree to put a moratorium on the stereotype and stop using the same damn photo.


Featured Video For You
Transform any surface into a touchscreen computer with this projector

TopicsCybersecurity

  • Tag:

相关文章

  • Katy Perry talks 'Rise,' her next batch of songs, and how to survive Twitter

    Katy Perry recently surpassed 90 million followers on Twitter, making her the person with the most f
    2025-12-15
  • 嬰兒鼻塞但是沒有鼻涕

    家長要在孩子嬰兒時期時進行細心的照料 ,發生的任何問題都應及時解決,當嬰兒鼻塞但是沒有鼻涕的現象時 ,這也有可能是發生感冒 ,這時候可選擇推拿的方式 ,在嬰兒背部上下搓,然後可揉一下嬰兒的耳朵,這樣做的目的是
    2025-12-15
  • 煙台特產能帶走的幹貨

    可能許多朋友沒有去過煙台,但是會經常聽到煙台蘋果這樣的名詞  ,因為煙台的蘋果都是比較有名的。去到煙台的旅遊,其實還是有許多的美食可以品嚐的 。如果想要帶一些禮物回去送給朋友,那麽可以選擇一些方便攜帶的幹貨
    2025-12-15
  • 孕晚期還需要吃葉酸嗎

    葉酸是一種對於人體而言,有著極其重要的作用的物質 ,尤其是對於孕婦而言,更是需要及時補充葉酸 ,這樣才能夠避免胎兒出現畸形發育的情況 。當然了,在備孕期間以及懷孕前三個月的時候,是需要補充一定量的葉酸的。那
    2025-12-15
  • Airbnb activates disaster response site for Louisiana flooding

    Airbnb has activated its disaster response page following the record-breaking flooding in Louisiana.
    2025-12-15
  • 牛奶能用微波爐加熱嗎

    微波爐也基本上成為了大多數家庭都會存在的一種家用電器 ,而微波爐主要是利用電磁波原理對飯菜起到加熱作用 。因此在寒冷的東西 ,微波爐就成為了必不可少的一種電器 。更重要的是微波爐自身還具有一定的殺菌效果,在冬
    2025-12-15

最新评论