EFY Times  
Thursday, October 02, 2014

 
GO
 
 

5 Hottest Female Hackers Ever!
 
Home >> Infotech >> Features
 
5 Hottest Female Hackers Ever!  
 
You thought hacking is strictly for males? Here's a list of 5 female hackers who are super-hot!   
Rate this news:  (34 Votes)
Friday, November 08, 2013 Many says beauty with brains is a myth, but think again, we bring to you 5 astonishingly intelligent female hackers!

hacker, hacking, black hat hacking, female hackers, hot female hackers, Adeanna Cooke, Anna Chapman, Kristina Svechinskaya, Joanna Rutkowska, Ying Cracker




1. Adeanna Cooke



When a friend of former Playboy model Adeanna Cooke, used her images on internet to make money and to show her in bad light, instead of going to the cyber crime authorities, she hacked the website to retain her dignity. She not only cleared all of her photos but also helped many other girls to come out of similar kind of situations.

2. Anna Chapman



Russian national, Anna Vasil'yevna Chapmanis was staying in New York City when she was arrested with nine others under the charge of working for the Illegals Program spy ring under the Russian Federation's external intelligence agency.

Chapman gained celebrity status right after her arrest by the FBI. Her pictures and videos went viral on the web. Chapman again earned a lot of media attention on 3 July 2013 when she asked Edward Snowden to marry her. For you to recall, Edward Snowden is an American computer specialist and former CIA employee and NSA contractor who disclosed classified details of several top secret United States, Israeli, and British government mass surveillance programs to the press.

3. Kristina Svechinskaya



The New York University student, Kristina Vladimirovna Svechinskaya, is one of the most common names in the world of hacking. She was accused to defraud several British and U.S. banks of sizeable sums and usage of false passports. As the reports says, Svechinskaya attacked thousands of bank accounts and managed to open at least five accounts in Bank of America and Wachovia via Zeus trojan horse. Out of this, she received $35,000 (£22,000) of money theft. As per the estimates, Svechinskaya with nine other people skimmed $3 million.

4. Joanna Rutkowska



Ethical hacker and a polished computer security researcher, Joanna Rutkowska, is particularly famous for her researches on low-level security and stealth malware. She gained a lot of popularity after the Black Hat Briefings conference in Las Vegas which was held in August 2006. Rutkowska here presented an attack against Vista kernel protection mechanism, and another technique dubbed as Blue Pill. Blue pill used hardware virtualization in order to turn a running OS into a virtual machine. Later she was mentioned amongst Five Hackers who put a Mark on 2006 by eWeek Magazine.

Rutkowska also gained some headlines when she sent an open advice to Microsoft's Vice President of Security Technology Unit to further tighten security on Windows Vista system. An elite hacker and entrepreneur, Rutkowska, launched her own security services startup Invisible Things Lab in Warsaw, Poland.

5. Ying Cracker



Popular as one of the most beautiful hackers, Ying Cracker is an educator from Shanghai, China. The hacker is known for teaching people the basics of hacking which include things like changing IP address and wiping office passwords.

It an online forum called 'Chinese Hottie Hackers' that got Cracker the said popularity. The forum pulled a huge fan base for Cracker. She is an expert in hacker software writing and charges good fee for courses on simple hacking tools. She also helps other people to crack software and charges 500-5000 RMB in the process, which is why she got the last name 'Cracker!'

Atithya Amaresh, EFYTIMES News Network


Print Email Post Comment  (2)
(Total Views: 81400)
 
Share

 
 

2 Comments

Lev Lafayette   327 days ago

Seriously Judging female hackers by their appearance rather than their hacking abilitiesSeems that sexism is alive and well on this site.
Reply  
mk   288 days ago

astonishingly intelligent female hackers I request a title change to something more appropriate like well groomed well hung females with some knowledge in computing. I dont see anything remarkable and obviously they werent alone...
Reply  
 
Infotech News
   
Arbor Networks Announces Multi-Terabit Mitigation Capacity Expansion For Arbor CloudSM DDoS Protection Service
Pebble Smartwatches Receives Price Cut, Along With Firmware Update
Mirriad Partners With Universal Music Group And Havas For Native In-Video Advertising
Karbonn Titanium S20 Available On Amazon India For Rs. 4,999
LG G3 Stylus Available At Rs 21,500 On LG India Website!
 
 
 
     
     
     
     
     
     
Most popular
 

Daily

Weekly

80+ Cheat Sheets And Infographics For Programmers!
MapR Extends Lead In Operational Hadoop Capabilities With Latest Release
Google's Top 16 Doodles Of All Time!
10 Best Social Media Monitoring And Analytics Tools
FDI Means 'First Develop India', For PM Narendra Modi
Companies Are The Actors, SIP’s Nanopolis Builds The Theaters
Top 4 JavaScript Projects To Boost CSS3 Animations
15 Best Books To Learn FreeBSD
Infosys VPs Get A Sharp Salary Hike!
5 Best Free Anti-Virus Software For Linux Ubuntu System
Top 10 Open Source Network Monitoring Tools
Xiaomi To Release Redmi Note Successor Soon, Report Says
Best Linux Programming Tutorials For Linux Beginners
Learn How To Become A Free Software Hacker With Simple Programming Skills!
40 Important Open Source Tools For Your Daily Use
7 Reasons Why Orkut Will Be Missed!
 
   

Overall

Agility Systems Deals in:

Document Management System for law firms
Features
8 Steps To Follow To Prevent Hacking!
Your blogs, social networking sites, emails and online bank accounts can be accessed by the hackers through stolen passwords. But there are some steps...
Top 10 Tools To Make Coding Simpler With Java
These tools make developers and programmers' life easier and simpler while programming with Java....
Inductors: 10 Parameters You Need To Know!
There are some parameters and specifications of inductors which we need to introduce while talking about this electrical component....
7 Best eBooks on Fedora Linux
Linux users using Fedora desktop can benefit a lot from the ebooks available on Fedora to enhance their experience....
Ubuntu 14.10: Key Changes To Look Out For!
Let's check out what are those biggest changes and new features which you can expect in Ubuntu 14.10....
10 Required Qualities To Grab A Job At Google!
If you are an aspiring student, to make it big at Google, you need to know what are those qualities which Google is looking for and Google’s senior v...
10 Traits To Become An Effective Programmer!
Here are the 10 traits which may define you as one of the most reliable programmers around....
Top 5 Python IDEs For Project Developers
An IDE makes life easier for a developer as it helps in coding, syntaxing, making templates and more. Here we'll check out the best 5 Python IDEs for ...
9 Common Myths And Misconceptions About Computer Malware
Here we'll talk about 9 most common myths about malware and debunk them. ...
7 Reasons Why Orkut Will Be Missed!
Before we bid a heartbreaking farewell to the witness to our so many precious memories, let's recall why we used to love Orkut so much....
Top 10 Security Vulnerabilities And Their Prevention Measures
Here we have picked top ten security vulnerabilities and how security programmers make sure that they prevent all kind of exploitations....
Top 9 BitTorrent Clients For Linux Users
If file-sharing is a regular part of your job, then there may not be any better option for you than having an excellent BitTorrent client....
10 Useful Tips For Writing Clean Bash Scripts
Here we have some suggestions for you which may help you in keeping your Bash scripts neat and clean....
10 Best PDF Tools For Linux Users
Here we have listed the 10 best free Linux PDF related software which manage PDF documents....
Best Linux Programming Tutorials For Linux Beginners
Prestigious institutes like University of California - Davis, the University of Surrey and the Universitat Oberta de Catalunya offer self-study tutori...
 
  View All
Dialogue
 
10 Questions That Google Never Asks While Hiring!
Here is a list of 10 questions that Google just banned from their interviews....
For Enjay, Open Source Technology Is A Way Of Life
An entirely open source-based company, Enjay IT Solutions, has built itself a reputation in the OSS domain....
Switching To Tizen Doesn’t Mean We Are Abandoning Android: Samsung
The company has worked to build Tizen up from scratch and has now introduced it to developers and the general public with its latest range of wearable...
Venturing Into The Cloud? Develop A Customised Cloud Strategy First!
Diksha P Gupta speaks to Rushikesh Jadhav, cloud evangelist, ESDS Software Solution Pvt Ltd, on how the cloud has changed the way compan...
HTC Is Strong And There Are No Plans Of Sale Now Or In Future, Says HTC's Senior Director-Marketing
Atithya Amaresh from EFYTimes had an exclusive chat with Sirpa H. Ikola, senior director, Marketing, South Asia, HTC about its devices and its plans w...
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
IFA 2014
 
IFA 2014: LG Launches 34-Inches Curved Monitor
The company is yet to confirm price and availability of the device....
IFA 2014: Intel Launches First Core M Range Of Processors
This range of processors is tailor-made for 2-in-1 devices which include a tablet and a laptop....
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
electronicsforu.com
efytimes.com
opensourceforu.com
electronicsb2b.com
Electronics Annual Guide
EFY EXPO INDIA
EFY EXPO WEST
ELECTRONICS ROCKS
EFY Awards
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter

Educational Kits
Kitsnspares.com  
 
 
© Copyright 2014 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions