{"id":39880,"date":"2021-03-05T11:00:05","date_gmt":"2021-03-05T11:00:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/"},"modified":"2021-03-05T11:00:05","modified_gmt":"2021-03-05T11:00:05","slug":"while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/","title":{"rendered":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity"},"content":{"rendered":"<p><span data-label=\"reader debate\">Reader debate<\/span> <i>Welcome to the latest Register Debate in which writers discuss technology topics, and you \u2013 the reader \u2013 choose the winning argument. The format is simple: a motion was proposed this week, the argument for the motion was published on Wednesday, and the argument against is published today.<\/i><\/p>\n<p> <i>During the week you can cast your vote using the embedded poll, choosing whether you&#8217;re in favor or against the motion. The final score will be announced next Tuesday, revealing whether the for or against argument was most popular. It&#8217;s up to our writers to convince you to vote for their side.<\/i>\n<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",button,mpu,\" data-sm=\",button,mpu,\" data-md=\",button,banner_plus,mpu\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p><i>This week&#8217;s motion is: <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/Debates\/2021\/03\/03\/hacking_not_crime\/\" rel=\"noopener noreferrer\">Hacking is not a crime<\/a>, and the media should stop using &#8216;hacker&#8217; as a pejorative.<\/i> On Wednesday, we <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/03\/03\/debate_hackers_for\/\" rel=\"noopener noreferrer\">published<\/a> an argument for the motion.<\/p>\n<p> <i>And now, today, arguing AGAINST the motion is IAIN THOMSON&#8230;<\/i>\n<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",button,mpu_plusplus,\" data-sm=\",button,mpu_plusplus,\" data-md=\",button,mpu_plusplus,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>First of all, full disclosure: I sympathize with those in favor of the &#8216;for&#8217; argument. I know how you feel from personal experience: pretty much every journalist has been called &#8220;a hack&#8221; in a pejorative sense at some point in their lives.<\/p>\n<p>Since the 18th century, authors have used the word &#8216;hack&#8217; to refer to a scribe who could write to order, the term evolving to mean someone willing to knock out sub-standard work for a fast buck. It was used to tar whole professions, from journalists to novelists. The word is a shortened version of hackney, a breed of horse used by carriages-for-hire. Though it&#8217;s not quite parallel with the history of &#8216;hacker&#8217; and &#8216;hacking&#8217;, us journos are aware of what it&#8217;s like to be smeared with a hijacked word.<\/p>\n<blockquote class=\"pullquote\" readability=\"7\">\n<p>For the wider population, hacking has become synonymous with nefarious activities because \u2013 for the vast majority of people who experience it \u2013 it&#8217;s in a criminal context<\/p>\n<\/blockquote>\n<p>Regular <i>Register<\/i> readers can differentiate between criminal hackers who break the law and ruin people&#8217;s lives, and hardware and software hackers who ingeniously lash together systems and perform miracles to get things running. But for the wider population, hacking has become synonymous with nefarious activities because \u2013 for the vast majority of people who experience it \u2013 it&#8217;s in a criminal context.<\/p>\n<p>It&#8217;s a matter of some frustration, and we do what we can. But expecting the mainstream media to differentiate between a cracker, hacker, skimmer or script kiddie is asking a lot of education in the small sound bites their viewers depend on.<\/p>\n<p>The words &#8216;hack&#8217; and &#8216;hacker&#8217; are today linked to wrongdoing in advertising, government and corporate messaging, cinema, writing, theater, songs&#8230; it&#8217;s usually cringeworthy from a technical standpoint but the trope is out there.<\/p>\n<p>Sad to say, someone developing a particularly elegant hack, in the ethical sense, often won&#8217;t get the widespread respect they deserve. But criminal coders, and the tools they create, can definitely impact millions of people in a way that guarantees an unsavory reputation and hours and pages of coverage. And, let&#8217;s face it, criminal scumbags they may be but there are a tiny percentage of genuinely elegant criminal pieces of code out there.<\/p>\n<p>Tablet, cloud, catfish, tag, sandbox, text, furniture. All these words and more have changed meaning over time and use. Any living language evolves. It&#8217;s possible for hack, hacker, and hacking to sustain multiple meanings.<\/p>\n<p>If the last dozen years covering IT security in the US have confirmed anything to me, it&#8217;s that the vast majority of hackers in the original sense of the word, in the context of computing, are ethical, decent folks who love finding interesting ways to make code better, stronger, and much more useful. But for the non-technical audience, hackers remains a term loaded with suspicion.<\/p>\n<p>Having said that, I&#8217;ve lost count of the number of people in the industry who were inspired to get into infosec by what they saw in books, TV, and movies. People have embraced the term regardless of its connotations: plenty of conferences still describe themselves as hacker events, referring to cyber-security or hardware fiddling, and that&#8217;s the goal ahead \u2013 reclaiming the term.<\/p>\n<p>We&#8217;ll do what we can to clarify in our coverage that a hacker breaking the law is a criminal, and a hacker with a brilliant algorithm is law-abiding and admirable, but trying to override today&#8217;s language in the short term is impossible: it&#8217;s something for the long haul. \u00ae<\/p>\n<p> <i>Cast your vote below. We&#8217;ll close the poll on Monday night and publish the final result on Tuesday. You can track the debate&#8217;s progress <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/Debates\/2021\/03\/03\/hacking_not_crime\/\" rel=\"noopener noreferrer\">here<\/a>.<\/i>\n<\/p>\n<p> <noscript readability=\"2\"> <\/p>\n<p><h3>JavaScript Disabled<\/h3>\n<p> Please Enable JavaScript to use this feature. <\/p>\n<p><\/noscript> <\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",button,dbutton,mpu_plus,dmpu,\" data-sm=\",button,dbutton,mpu_plus,dmpu,\" data-md=\",button,dbutton,mpu_plus,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p> <i><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/iainthomson\">Iain Thomson<\/a> is The Register&#8217;s US news editor based in San Francisco and has spent the last 25 years covering technology online and in print.<\/i>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/03\/05\/debate_hackers_against\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our vulture Iain argues against this week&#8217;s motion Reader debate\u00a0 Welcome to the latest Register Debate in which writers discuss technology topics, and you \u2013 the reader \u2013 choose the winning argument. The format is simple: a motion was proposed this week, the argument for the motion was published on Wednesday, and the argument against is published today.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-39880","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-05T11:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity\",\"datePublished\":\"2021-03-05T11:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\"},\"wordCount\":814,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\",\"name\":\"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-03-05T11:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage\",\"url\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/","og_locale":"en_US","og_type":"article","og_title":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-05T11:00:05+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity","datePublished":"2021-03-05T11:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/"},"wordCount":814,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/","url":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/","name":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-03-05T11:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YEPtsSdBEWTwSBQzptAj4QAAAIs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/while-reg-readers-know-the-difference-between-a-true-hacker-and-cyber-crook-for-everyone-else-hacking-means-illegal-activity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"While Reg readers know the difference between a true hacker and cyber-crook, for everyone else, hacking means illegal activity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39880"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39880\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}