When speaking in cyber security terms, the differences in hacker ‘hats’ refers to the intention of the hacker. For example: White hat: Breaches the network to gain sensitive information with the owner’s consent&making it completely legal. This method is usually employed to test infrastructure vulnerabilities. Black hat: Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.
« Back to Glossary Index