Hacking refers to activities aimed at compromising digital devices such as computers, smartphones, tablets and even whole networks. The term dates back to the 1970s in its current use. An article in Psychology Today in 1980 used the term “hacker” in its title: “The Hacker Papers,” which talked about the addictive nature of computer use. Then there’s the American science fiction movie Tron in 1982, in which the protagonist describes his intention to break into the computer system of a company as hacking into it. And while hacking may not always be for malicious purposes, today most references to hacking and hackers are characterized by cyber criminals as unlawful activity-motivated by financial gain, protest, a collection of information (spying) and even for the “fun” of the challenge.
Hacking is typically technical (such as creating malware that deposits malware in a drive-by attack that does not require user interaction). However, hackers can also use psychology to make the user click on a malicious attachment or provide personal data. These are called “social engineering.” In fact, hacking is an over-arching term for activity behind most, if not all, malware and malicious cyber attacks on the computer public, companies and governments. In fact, hacking is an over-arching term for activity behind most, if not all, malware and malicious cyber attacks on the computer public, companies and governments.
Hacks in Instagram are not a new event according to InstaPort. The service has become a major target for hackers of all stripes with more than 1 billion users. However, it is not clear whether the company’s policies to deal with these cases have scaled with the rest of the service. Instagram declined to share details about how long its remediation process usually takes but if the volume of angry tweets is an indication, these reports are not addressed quickly enough.