Black-Hat and White-Hat are terms used to describe different types of computer security practices. Black-hats and White-hats are, in turn, the people (hackers) and organisations (and governments) who carry out those practices. Black-hats participate in unethical or illegal activities: Black Hats often use techniques such as social engineering, phishing, and exploiting vulnerabilities to gain unauthorised […]