PT - JOURNAL ARTICLE AU - Cekerevac, Zoran AU - Dvorak, Zdenek AU - Prigoda, Ludmila AU - Cekerevac, Petar TI - Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking DP - 2018 Jun 30 TA - Communications - Scientific Letters of the University of Zilina PG - 83--87 VI - 20 IP - 2 AID - 10.26552/com.C.2018.2.83-87 IS - 13354205 AB - Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.