ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web»
  • Viruses, Spyware & Internet Security

Hackers' World - Why Teens Make the Best Hackers

Updated on November 21, 2017

Teens Make The Proud Majority Of Hackers' World

Hacking is normally considered a criminal offense. But do the hackers think the same too? Probably not.

Study reveals that the majority of hacking population consists of the teenagers. Wouldn’t it be interesting to find out the facts hidden behind it? Let’s take a quick look at what the surveys reveal.

A survey conducted on 1000 New York city teenagers revealed that 50% of kids admitted to having hacked Facebook/email accounts, and a stunning 39% thought it was ‘cool’ thing to do! A disturbing 7% of the young hackers did so for generating income and a 6% thought it was a potential career path.

Kids Hackers

What just gets them to commit this act?

Why do the teenagers find hacking intriguing enough? The answer probably lies in the ‘power of thrill’. The internet has plethora of loopholes and backdoors that the teens are, or develop themselves to be, adept at breaking in to them.

Since internet is a daily routine to almost any business and even the household mums, teenagers are probably motivated and driven by the fact that people take easy control of what internet has in store. once reported that most teenagers commit computer hacking and software piracy crimes out of excitement and a hunger for inquisitiveness. In a nutshell, the major contributing factor to this offense is in seek of fun.

Most Popular Tricks By Tech-savvy kids

Most teens are content on using their personal or family computers for hacking. No matter what controls the parents try to impose on restricting their access to potential crimes, the tech-savvy kids find an alternative to accomplish their tasks. The most popular trickeries employed by the teenagers are discussed below:

Spotting access vulnerabilities

A savvy hacker would write a scanning tool that is run 24 x7 to detect and filter all IP addresses that are vulnerable to hacking. The hacker depending on the vulnerability of the machine, creates a privileged or non-privileged account, exploits the network system the subject computer shares information with or is networked with.

Spotting OS vulnerabilities

In succession to the above, hackers then look for OS (Operating System) vulnerability, and the scanning tools in support of the same. This part is quite known to the public itself, with security sites like SecurityFocus and CERT disclosing full information about the same, and the hackers that take easy and full advantage of.

Share Your Views and Experiences about Hacking

    0 of 8192 characters used
    Post Comment

    • LensMan999 profile image

      LensMan999 4 years ago from Trans-Neptunian region

      Hi merchantdoctor and movingfinger,

      I agree with both of you. Thanks for your comments.

    • profile image

      movingfinger 6 years ago

      Now a days with so many tools like Backtrack available for free, Hacking is not as difficult as it used to be. For a teenager, the thrill of getting into someone's computer is just too cool to resists (bragging rights). With the computer curriculum becoming increasingly advanced in younger classes (Networking and IP addressing is being taught in grade 7)and hackers in movies like MI , kids have all the time and knowledge in the world to try it out and there are enough people around the world who keep their machines unsecured and online 24x7. Recipe for disaster..I say :)

    • merchantdoctor profile image

      merchantdoctor 6 years ago from Reno

      Wow. That is a bit scary isn't it! To think that not too long ago the cool kids on the block had an Atari! Thanks.