In our first Rogues Gallery
, we looked at ten infamous social engineers
-- con men who exploited human weaknesses rather than technical vulnerabilities
. But there have been computer and network hacks for, well, pretty much as long as we've had computers and networks. The motives behind these intrusions have ranged from curiosity to paranoia (see McKinnon, Gary
), through today --when most high-profile hacks are driven by either greed or some form of ideology.