Skip to content
  • Facebook
  • X
  • Linkedin
  • WhatsApp
  • Associate Journalism
  • About Us
  • Privacy Policy
  • 033-46046046
  • editor@artifex.news
Artifex.News

Artifex.News

Stay Connected. Stay Informed.

  • Breaking News
  • World
  • Nation
  • Sports
  • Business
  • Science
  • Entertainment
  • Lifestyle
  • Toggle search form
  • Access Denied Sports
  • Earthquake That Hit Telangana Today Was Second Strongest In 55 Years
    Earthquake That Hit Telangana Today Was Second Strongest In 55 Years Nation
  • New Zealand’s Predicted XI vs South Africa Cricket World Cup 2023: Will Kane Williamson Return?
    New Zealand’s Predicted XI vs South Africa Cricket World Cup 2023: Will Kane Williamson Return? Sports
  • War crimes escalating in Myanmar: U.N. investigators
    War crimes escalating in Myanmar: U.N. investigators World
  • Access Denied
    Access Denied Nation
  • Meta Leans On Improved Ad Business To Fuel Massive AI Spending Business
  • In Beijing, Schumer urges China to support Israel after Hamas attacks
    In Beijing, Schumer urges China to support Israel after Hamas attacks World
  • India vs Pakistan Asia Cup 2023: Babar Azam And Co. Reveal Playing XI Ahead Of Mega Super 4 Clash
    India vs Pakistan Asia Cup 2023: Babar Azam And Co. Reveal Playing XI Ahead Of Mega Super 4 Clash Sports
What is ethical hacking? – The Hindu

What is ethical hacking? – The Hindu

Posted on April 3, 2026 By admin


Representative image.
| Photo Credit: Getty Images/iStockphoto

You must have heard of hacking and how social media accounts, devices and even security systems often get hacked. But did you know there is an ethical side to hacking which helps us all in ways we do not often realise? 

Ethical hacking or white-hat hacking is a legal cybersecurity practice where experts try to imitate cyberattacks to find and fix weaknesses in systems before anybody can exploit them. This practice, vital for modern digital security, helps strengthen systems against real threats like black hat hackers.

Black, white or grey hat!

Hackers are of multiple types, and the main ones are black-hat, white-hat and grey-hat hackers. Do you know why such arose, though? Back in the 1950s, western movies often portrayed the “bad guys” or villains as wearing black hats while the “good guys” or heroes wore white hats. 

The same analogy was picked up while categorising hackers back in the day, leading to white hat and black hat hackers, and later grey, blue, and even red hat hackers as well.

The white hat saviours

Ethical hacking emerged around the 1990s when businesses and organisations recognised a need for proactive security measures to protect their systems amidst rising cyber threats. 

Unlike black-hat hackers who act illegally for personal gain, ethical hackers work with explicit permission and follow strict rules to mirror malicious techniques. Since the aim is to protect rather than harm, it often follows with detailed reports with remediation steps on how to solve the problems. 

How does it work?

Ethical hacking mostly follows a structured five-phase methodology: reconnaissance, scanning, gaining access, maintaining access, and covering tracks — though ethical hackers skip the last two to avoid real damage. 

zIn reconnaissance, hackers gather public data via various tools to profile targets without direct interaction. 

2. Then they scan to detect open ports, services, and vulnerabilities like unpatched software. 

3. After locking a target, they try to gain access through steps like password cracking, privilege escalation, or man-in-the-middle attacks.

4. Finally, they analyse the findings and recommend fixes, ensuring systems are hardened. 

When is it used?

Ethical hacking is used in various industries like finance, healthcare and e-commerce, to even the government services and facilities. Companies often hire or have in-house tech experts who help with ensuring their security system is safe. 

Cyber threats often cost trillions annually, and ethical hacking helps in mitigating this by identifying flaws beforehand. It saves organisations millions in breach recovery while building trust with customers by ensuring their data is safe. Through ethical hacking, all findings remain confidential, and the safety of the system and data is ensured — one of the main differences between white-hats, grey-hats (semi-legal) and black-hats (malicious) hackers.

Published – April 03, 2026 03:46 pm IST



Source link

Science Tags:cyber security national business system, data safety law, ethical hacking technology safety online, virus malware scam

Post navigation

Previous Post: Access Denied
Next Post: Pakistan raises petrol prices amid U.S.-Iran war

Related Posts

  • Are antibiotics responsible for inflammatory bowel diseases?
    Are antibiotics responsible for inflammatory bowel diseases? Science
  • To boost ethanol production, Centre moots dedicated enzyme manufacturing
    To boost ethanol production, Centre moots dedicated enzyme manufacturing Science
  • The trouble with a Nobel for mRNA COVID vaccines
    The trouble with a Nobel for mRNA COVID vaccines Science
  • Thanks to two special genes, a single atom can change the colour of a bird
    Thanks to two special genes, a single atom can change the colour of a bird Science
  • Study reveals history and oceanic voyages of remarkable baobab tree
    Study reveals history and oceanic voyages of remarkable baobab tree Science
  • NASA shifts UFO debate from sensationalism to science | Data
    NASA shifts UFO debate from sensationalism to science | Data Science

More Related Articles

New science awards, old political project New science awards, old political project Science
ISRO’s ‘zero orbital debris’ milestone & the space debris crisis | Explained ISRO’s ‘zero orbital debris’ milestone & the space debris crisis | Explained Science
Evolution can change how an ecosystem collapses, study finds Evolution can change how an ecosystem collapses, study finds Science
Dogs understand more than they let on, create mental images of known words: Study Dogs understand more than they let on, create mental images of known words: Study Science
SpaceX launches two lunar landers toward moon for U.S., Japanese companies SpaceX launches two lunar landers toward moon for U.S., Japanese companies Science
Researchers uncover remains of Ice Age mastodons in Peru  Researchers uncover remains of Ice Age mastodons in Peru  Science
SiteLock

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022

Categories

  • Business
  • Nation
  • Science
  • Sports
  • World

Recent Posts

  • Access Denied
  • Pakistan raises petrol prices amid U.S.-Iran war
  • What is ethical hacking? – The Hindu
  • Access Denied
  • Access Denied

Recent Comments

  1. AnthonyNek on UP Teacher Who Asked Students To Slap Muslim Classmate
  2. Robertrap on UP Teacher Who Asked Students To Slap Muslim Classmate
  3. ThomasAmink on UP Teacher Who Asked Students To Slap Muslim Classmate
  4. AnthonyMaype on UP Teacher Who Asked Students To Slap Muslim Classmate
  5. Frankslete on UP Teacher Who Asked Students To Slap Muslim Classmate
  • Access Denied
    Access Denied Nation
  • Access Denied Sports
  • Moon was formed around 4.51 billion years ago: study
    Moon was formed around 4.51 billion years ago: study Science
  • Rajkot Game Zone Fire That Killed 27 Is Man-Made Disaster: Gujarat High Court
    Rajkot Game Zone Fire That Killed 27 Is Man-Made Disaster: Gujarat High Court Nation
  • Access Denied Sports
  • Access Denied Business
  • Israel Army Says Killed Hamas Commander In Lebanon Air Strike
    Israel Army Says Killed Hamas Commander In Lebanon Air Strike World
  • Jay Shah front-runner to take over as ICC chairman
    Jay Shah front-runner to take over as ICC chairman Sports

Editor-in-Chief:
Mohammad Ariff,
MSW, MAJMC, BSW, DTL, CTS, CNM, CCR, CAL, RSL, ASOC.
editor@artifex.news

Associate Editors:
1. Zenellis R. Tuba,
zenelis@artifex.news
2. Haris Daniyel
daniyel@artifex.news

Photograher:
Rohan Das
rohan@artifex.news

Artifex.News offers Online Paid Internships to college students from India and Abroad. Interns will get a PRESS CARD and other online offers.
Send your CV (Subjectline: Paid Internship) to internship@artifex.news

Links:
Associate Journalism
About Us
Privacy Policy

News Links:
Breaking News
World
Nation
Sports
Business
Entertainment
Lifestyle

Registered Office:
72/A, Elliot Road, Kolkata - 700016
Tel: 033-22277777, 033-22172217
Email: office@artifex.news

Editorial Office / News Desk:
No. 13, Mezzanine Floor, Esplanade Metro Rail Station,
12 J. L. Nehru Road, Kolkata - 700069.
(Entry from Gate No. 5)
Tel: 033-46011099, 033-46046046
Email: editor@artifex.news

Copyright © 2023 Artifex.News Newsportal designed by Artifex Infotech.