View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 16, 2018updated 17 Jan 2018 4:35pm

Top 5 ethical hackers you should doff your white hat to

Have you got the skills to be an ethical hacker? They are highly valued by major organisations across the globe.

By Tom Ball

Ethical hackers are extremely valuable today as organisations face an unprecedented level of danger as they take on an increasingly treacherous threat landscape. New attack surfaces have opened up as data and services are used and created differently.

Sophisticated hackers are leveraging the new vulnerabilities and innovating at a fast pace, meaning that at present no one can guarantee impregnable cybersecurity. This situation means that penetration testing provides more valuable insights than ever, giving organisations understanding of what they have to do to plug major and unexpected gaps.

CBR has compiled a list of some of the greatest names in ethical hacking, including individuals who have been on the dark side of cyber and subsequently served their time for the crimes they have committed before using their incredible skills for good. This list may serve to inspire skilled individuals to use their capabilities for good, providing services that are quickly becoming priceless as the skills gap widens.


Kevin Mitnick

Kevin Mitnick has become one of, if not the most, famous ethical hackers to have ever lived, and perhaps his skills and insight come from the fact that his hat has not always been white.

In 1995 the law caught up with Mitnick in what became a high-profile arrest; he had been pursued and tracked down due to a two and a half year spree of criminal cyber activity. His black hat escapades included breaching the security of the Digital Equipment Corporation, where once inside he copied the software he found.

For this crime he received jail time in 1988 that was followed by a stint of supervised release. Before he had completed his punishment Mitnick was hacking again, gaining entry to Pacific Bell voice mail computers. It is thought that he breached a number of other networks and used tactics including the interception of passwords.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Mitnick ended up receiving 46 months with an added 22 for violating his period of supervised release in 1989, an event that marked the conclusion to his time on the dark side.

Having proven his skills to the world, in the year 2000 Mitnick donned the white hat instead, becoming a paid consultant. Not only did Fortune 500 companies and the FBI itself want to leverage his talents, many have flocked over the years to learn from his experience, knowledge and ideas, making him a popular author and public speaker.

He has also taught his skills directly, having led social engineering classes; vital skills that world is crying out for today. Acting as a true ethical hacker, Mitnick also conducts penetration testing for some of the world’s biggest organisations.


Joanna Rutkowska

Joanna Rutkowska is a cybersecurity researcher; she is originally from Poland and is the founder of the desktop operating system Qubes OS, a system created with a focus on security.

A key area of Rutkowska’s expertise is stealth malware, perhaps better known as rootkits. A rootkit is a set of malicious software that is capable of disguising or hiding itself. This form of attack tends to be used to exploit a vulnerability exposed by a phishing attack, for example.

Top 5 ethical hackers you should doff your white hat toRutkowska became well known for her ethical hacking capabilities in 2006 when presenting at the Black Hat Briefings conference. In the demonstration she highlighted vulnerabilities in the Vista kernel.

The following year her fame as a white hat hacker grew when she exposed weaknesses in the process of some hardware-based memory acquisitions. In 2009 she presented another attack targeting Intel systems including the Trusted Execution Technology.

An indication of her skills and influence is gained by the invitations she has received to feature in some of the industry’s most prominent conferences. Included in the list are the RSA conference, RISK, Black Hat and the Gartner IT Security Summit, badges of honour among ethical hackers.


Charlie Miller

Charlie Miller is also a computer security researcher, and in terms of his work he is best known for exposing vulnerabilities in Apple products. His most high-profile white hat achievement was secured at the Pwn2Own contest in Vancouver in 2008, where he was the first to locate a critical MacBook Air bug. For this achievement the American pocketed a $10,000 prize. This achievment alone makes him one of the most formidable ethical hackers the world has ever known.

Safari also fell to Miller’s white hat capabilities, beating the browser’s security and again coming away wealthier from the experience, this time winning $5,000 in 2009.

In 2011 Miller continued to prove his specialism in tracking down flaws in the famed security of Apple devices, discovering a weak point in both the iPhone and iPad. Throughout his ethical hacking career Miller has presented numerous other attacks to display dangerous vulnerabilities.

Now he is working as a computer security researcher for Cruise Automation, an American company working on driverless cars, an space that is currently an ongoing top tech trend around the world.


Greg Hoglund

Greg Hoglund is a specialist in computer forensics who has gifted a great deal to the world in its mission to combat malicious threat actors. Hoglund is a crucial feature in our list of ethical hackers.

Some of the areas he is best known for working in include physical memory forensics, attribution of hackers and malware detection. His skill in ethical hacking really comes to light when his creative genius is considered.

Hoglund has patented methods for fault injection, these are used for software testing, a valuable creation for white hat purposes. Like others on this list, Hoglund has also worked with the U.S. Government and the Intelligence Community, providing his skills to the pursuit of justice. Exploit material and rootkits have been the primary area he has worked on in this capacity.

He has also founded a number of companies, including HBGary, a company centred on technology security. In 2008 the company joined the McAfee Security Innovation Alliance. In its time the company has been involved in conferences including RSA Conference, where it has provided presentations.


Tsutomu Shimomura

Standing out among ethical hackers, not only is Tsutomu Shimomura a brilliant cybersecurity expert and physicist, his place in our list provides a cyclical effect because he was heavily involved in tracking down Kevin Mitnick, another prominent member of our list.

Shimomura’s genius may have been expected by some as he is son to the 2008 Nobel Prize Winner in Chemistry, Osamu Shimomura. His abilities in physics led him to be taught by the great physicist, Richard Feynman.

BlackBerry brings driverless car cybersecurity to the showroom
700 MILLION cyberattacks beaten by digital business in 2017
Automation: The GDPR silver bullet?

In 1989 at the University of California he became a computational physics research scientist, a path that led him to work for the National Security Agency. By testifying in Congress he raised awareness to the lacking security and privacy of cellular phones.

His activity in bringing Kevin Mitnick to justice has been the most high-profile action in terms of using his security skills for ethical purposes. The event led to a feature film called Track Down, inspired by the book Takedown written by Shimomura and journalist, John Markoff.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.