{"id":2958,"date":"2021-09-09T14:44:00","date_gmt":"2021-09-09T12:44:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=2958"},"modified":"2026-04-04T00:03:53","modified_gmt":"2026-04-03T22:03:53","slug":"hackers-who-are-they","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/hackers-who-are-they\/","title":{"rendered":"Hackers \u2013 who are they?"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns2958_f27fcb-97\"><a class=\"kb-button kt-button button kb-btn2958_7d534a-73 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading2958_f0d8f8-a9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_f0d8f8-a9\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading2958_db5ce1-4c animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_db5ce1-4c\">Hackers \u2013 who are they?<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tSep 09, 2021\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading2958_340cd5-77 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading2958_340cd5-77\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">3 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2958_d38ab3-8b size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1-1024x683.jpg\" alt=\"Businessman working on laptop. Protection network security computer and safe your data concept.\" class=\"kb-img wp-image-51372\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1-1024x683.jpg 1024w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1-300x200.jpg 300w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1-768x512.jpg 768w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1-18x12.jpg 18w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/businessman-working-laptop-protection-network-security-computer-safe-your-data-concept-digital-crime-by-anonymous-hacker-1.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-lghpeg is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2958_e6c420-4f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_e6c420-4f\">What Is a Hacker?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2958_143e05-16 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_143e05-16\">For the past several years, hackers have been a hot topic in the media. They appear not only in news reports but also as central characters in movies and entertainment. Often, the \u201chacker antagonist\u201d is portrayed as someone who can break into any system with ease.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-6ol68v is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_c08999-5c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_c08999-5c\">But what is a hacker really?<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_9930ad-0f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_9930ad-0f\">In reality, hackers are individuals with varying skills, motivations, and ethical standards. Within cyber security, they are often categorized into different groups. One of the most common ways to classify hackers is the \u201ccolored hat\u201d model, inspired by old western movies.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-jleb54 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2958_a1aa7d-2e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_a1aa7d-2e\">White Hat Hackers<\/h2>\n\n\n\n<p class=\"kt-adv-heading2958_6dfb19-64 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_6dfb19-64\">White hat hackers are considered the \u201cgood guys.\u201d They are ethical hackers who use their skills to help organizations improve security. Typically, they identify vulnerabilities and report them responsibly, along with recommendations on how to fix them.<\/p>\n\n\n\n<p class=\"kt-adv-heading2958_024a49-c4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_024a49-c4\">Cyber security consultants often fall into this category (sometimes also referred to as blue hats). They assist organizations by:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-3zhvwm has-manrope-font-family\">\n<li>Identifying vulnerabilities<\/li>\n\n\n\n<li>Improving security systems<\/li>\n\n\n\n<li>Ensuring compliance with regulations<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2958_872a46-8a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_872a46-8a\">Unlike malicious hackers, white hats operate with permission and are usually paid for their work.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-z2xr3u is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2958_05e4d2-8d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_05e4d2-8d\">Grey Hat Hackers<\/h2>\n\n\n\n<p class=\"kt-adv-heading2958_5fd5c8-af wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_5fd5c8-af\">Grey hat hackers operate in a moral \u201cgray zone\u201d between good and bad. They may hack systems without permission but do not necessarily have malicious intent. For example, they might discover a vulnerability and then demand payment to disclose it\u2014or offer their services to fix it.<\/p>\n\n\n\n<p class=\"kt-adv-heading2958_6e28c2-04 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_6e28c2-04\">Hacktivists are often included in this category. These individuals or groups hack organizations or governments based on ideological beliefs. One of the most well-known hacktivist groups is <em>Anonymous<\/em>, famous for using Guy Fawkes masks and conducting politically motivated cyber operations.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-oo3cyg is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2958_04b7af-6d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_04b7af-6d\">Black Hat Hackers<\/h2>\n\n\n\n<p class=\"kt-adv-heading2958_56eb26-89 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_56eb26-89\">Black hat hackers are the malicious actors in cyber security. Their activities are illegal and often harmful, driven by profit, power, or disruption.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-6ol68v is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_9de0db-17 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_9de0db-17\">Script Kiddies<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_36bf6b-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_36bf6b-15\">These are inexperienced individuals who use pre-made tools created by others. They typically lack deep technical knowledge and are often not taken seriously within the hacker community.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1qlo1yo is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_f5889c-42 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_f5889c-42\">Organized Crime Hackers<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_a51f6d-41 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_a51f6d-41\">These hackers operate as part of criminal organizations. Their main goal is financial gain, often through:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-3zhvwm has-manrope-font-family\">\n<li>Stealing credit card data<\/li>\n\n\n\n<li>Committing fraud or blackmail<\/li>\n\n\n\n<li>Manipulating financial systems<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1hrq86h is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_7d4c05-53 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_7d4c05-53\">Social Engineers (Con Artists)<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_08e456-a2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_08e456-a2\">Not all hacking is technical. Social engineers manipulate people instead of systems. They use psychological tactics such as: <\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-3zhvwm has-manrope-font-family\">\n<li>Phishing emails<\/li>\n\n\n\n<li>Fake websites (spoofing)<\/li>\n\n\n\n<li>Impersonation<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading2958_fc2075-60 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_fc2075-60\">Their goal is to trick individuals into revealing sensitive information like passwords or credit card details.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1vzy4ki is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_d3ba14-36 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_d3ba14-36\">Insiders<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_9b8a66-7d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_9b8a66-7d\">Insiders are employees or individuals within an organization who misuse their access. Because they already have legitimate access to systems, they can be especially dangerous. This highlights the importance of:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1xg1zvo has-manrope-font-family\">\n<li>Access control<\/li>\n\n\n\n<li>Logging and monitoring<\/li>\n\n\n\n<li>Separation of duties<\/li>\n\n\n\n<li>Removing access when employees leave<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-143gtt is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_3e210e-39 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_3e210e-39\">Government-Sponsored Hackers<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_f01cd2-5b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_f01cd2-5b\">Some hackers work for governments, conducting cyber operations to gain intelligence or strategic advantages. These activities can target both allies and adversaries.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-143gtt is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2958_355467-c2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_355467-c2\">Hackers \u201cfor the Lulz\u201d<\/h3>\n\n\n\n<p class=\"kt-adv-heading2958_965413-ee wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2958_965413-ee\">Some hackers are motivated purely by entertainment. They hack systems to cause disruption, gain attention, or simply for amusement. For them, hacking can feel like a game or competition, where status is gained through notoriety.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\t\t\t\t\t\tFor the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.<\/p>","protected":false},"author":2,"featured_media":59832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":3,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,159,165],"class_list":["post-2958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-cyber-security","tag-hacker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers \u2013 who are they? - Complior<\/title>\n<meta name=\"description\" content=\"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/hackers-who-are-they\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers \u2013 who are they? - Complior\" \/>\n<meta property=\"og:description\" content=\"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/hackers-who-are-they\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T12:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T22:03:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Hackers \u2013 who are they?\",\"datePublished\":\"2021-09-09T12:44:00+00:00\",\"dateModified\":\"2026-04-03T22:03:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp\",\"keywords\":[\"Blog\",\"Cyber security\",\"Hacker\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/\",\"name\":\"Hackers \u2013 who are they? - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp\",\"datePublished\":\"2021-09-09T12:44:00+00:00\",\"dateModified\":\"2026-04-03T22:03:53+00:00\",\"description\":\"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp\",\"width\":1500,\"height\":1000,\"caption\":\"Businessman working on laptop. Protection network security computer and safe your data concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/hackers-who-are-they\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers \u2013 who are they?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers \u2013 who are they? - Complior","description":"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/hackers-who-are-they\/","og_locale":"en_GB","og_type":"article","og_title":"Hackers \u2013 who are they? - Complior","og_description":"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.","og_url":"https:\/\/complior.se\/en\/hackers-who-are-they\/","og_site_name":"Complior","article_published_time":"2021-09-09T12:44:00+00:00","article_modified_time":"2026-04-03T22:03:53+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp","type":"image\/webp"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/hackers-who-are-they\/#article","isPartOf":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Hackers \u2013 who are they?","datePublished":"2021-09-09T12:44:00+00:00","dateModified":"2026-04-03T22:03:53+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/"},"wordCount":518,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp","keywords":["Blog","Cyber security","Hacker"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/hackers-who-are-they\/","url":"https:\/\/complior.se\/hackers-who-are-they\/","name":"Hackers \u2013 who are they? - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp","datePublished":"2021-09-09T12:44:00+00:00","dateModified":"2026-04-03T22:03:53+00:00","description":"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.","breadcrumb":{"@id":"https:\/\/complior.se\/hackers-who-are-they\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/hackers-who-are-they\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/hackers-who-are-they\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp","width":1500,"height":1000,"caption":"Businessman working on laptop. Protection network security computer and safe your data concept."},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/hackers-who-are-they\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Hackers \u2013 who are they?"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp",1500,1000,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept-150x150.webp",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept-300x200.webp",300,200,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept-768x512.webp",768,512,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept-1024x683.webp",1024,683,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp",1500,1000,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept.webp",1500,1000,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2024\/05\/Businessman-working-on-laptop.-Protection-network-security-computer-and-safe-your-data-concept-18x12.webp",18,12,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":7,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"predecessor-version":[{"id":80303,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2958\/revisions\/80303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/59832"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}