We need to talk about all these absurd stock photos of hackers

Black hoodie? Hands? Mystery? ✔️ ✔️ ✔️
By Nicole Gallucci  on 
We need to talk about all these absurd stock photos of hackers
Beautiful stock photo of hooded man reaching to steal your password. Credit: Shutterstock / Brian A Jackson

Hackers make it their life's mission to remain anonymous, but we allllllll know exactly what they look like. I mean, come on. We've all seen the pictures.

They are a shady-looking individuals often found lurking in darkened rooms illuminated by nothing but the glow of menacing green binary code. Hackers are faceless creepers hidden by the invincible cloak of a hoodie, almost always typing on their keyboards.

Duh. Everyone knows that, because this stereotypical hacker image shows up in essentially every article ever written about hacking or cybersecurity attacks -- from iCloud breaches and DDoS attacks to the recent WannaCrypt ransomware attack.

We too have fallen victim to using stock photos of keyboards in dark rooms to accompany stories about Russian hacks or cybersecurity attacks. But, man, if you saw some what we're choosing from, you'd realize that we have very little wiggle room here.

We get it, it's hard to properly illustrate something when you don't know the full story and have little information about the people involved, so artists have achieved a standard visual by combining the obvious presence of a computer with a mysterious-seeming person.

It works great for the sake of getting the message across, but the images are laughable. And as you can see by this beautiful selection of hacking photos, they lead to an incredibly stereotypical definition of a hacker.

Judging from these visual gems, here's what we know about hackers for sure:

Mashable Light Speed
Want more out-of-this world tech, space and science stories?
Sign up for Mashable's weekly Light Speed newsletter.
By signing up you agree to our Terms of Use and Privacy Policy.
Thanks for signing up!

They have hands, which they make significant use of in order to successfully hack

Mashable Image
Hacker using laptop. Lots of digits on the computer screen.; Shutterstock ID 172084607 Credit: Shutterstock / REDPIXEL.PL

Hackers use their powerfully dangerous fingers to type. This we know to be true.

Sometimes they wear gloves on those hands to make themselves appear even more mysterious

Mashable Image
Credit: Shutterstock / welcomia

Gloves are a key part of the hacker aesthetic. You can take the gloves off the hacker, but you can never take the hacker out of the gloves.

Hackers hate sunlight. They hack only by the glow of their screens

Mashable Image
Single solitary computer hacker works in the dark committing crime; Shutterstock ID 280469939 Credit: Shutterstock / John Williams RUS

Aside from being intelligent computer geniuses and not sucking blood, hackers aren't all that different from vampires.

Seriously -- no sunlight just code light. And do not forget your hoodie

Mashable Image
faceless computer hacker Credit: Bill Hinton/ Getty Images
Mashable Image
Faceless Computer Hacker Credit: Bill Hinton/ Getty Images

Every computer hacker is just A, the notorious villain from Pretty Little Liars.

Mashable Image
A from 'Pretty Little Liars,' an expert villain and hacker. Credit: abc family

Hackers don't have faces

Mashable Image
Hacker using laptop. Hacking the Internet.; Shutterstock ID 503150188 Credit: Shutterstock / REDPIXEL.PL

Even when a computer shines its light directly upon a hacker, he still has no face. Magic.

If for some reason a black hoodie is not available, you are only permitted to hack if you have access to a creepy white mask

Mashable Image
Anonymous teenager in mask on internet at night Credit: Peter Dazeley/Getty Images
Mashable Image
Credit: Peter Dazeley/Getty Images

It's the RULES, okay?!

Even the FBI -- an organization that should have access to real images of hackers -- has disseminated similar images. According to the FBI, the male hacker also wears a dark hoodie and has eyes invisible to the rest of the world though he does, in fact, have a face.

Some hackers out there are surely sitting at their laptops surrounded by multiple half-empty coffee cups, some snacks, a to-do list -- heck, they're probably bingeing Netflix on their second monitor with their Facebook account open in a separate tab as they torture themselves by checking in on their exes.

Show us THAT hacker next time, O.K., stock photo companies? Show us a real hacker. Oh, and let's all just agree to put a moratorium on the stereotype and stop using the same damn photo.

Topics Cybersecurity

Mashable Image
Nicole Gallucci

Nicole is a Senior Editor at Mashable. She primarily covers entertainment and digital culture trends, and in her free time she can be found watching TV, sending voice notes, or going viral on Twitter for admiring knitwear. You can follow her on Twitter @nicolemichele5.


Recommended For You
The best Robin Williams movies available to watch now
By Kimber Myers
Robin Williams in "Good Will Hunting," "Good Morning, Vietnam," and "Mrs. Doubtfire."

The best movies on Prime Video right now
By Kimber Myers
An Asian woman holds a sword; a boy rides a dragon; a Black man in a suit faces forward

'The Fall Guy' review: Ryan Gosling and Emily Blunt make movie magic
Ryan Gosling plays a stuntman in trouble in "The Fall Guy."

'7 Days in Hell' is the perfect post-'Challengers' watch
A tennis player in a white shirt hits a ball.

'Evil Does Not Exist' review: Ryusuke Hamaguchi weaves a captivating cautionary tale
A young girl in bright winter clothing faces the camera, shielding her eyes from the sun.

Trending on Mashable
NYT Connections today: See hints and answers for May 6
A phone displaying the New York Times game 'Connections.'

'Wordle' today: Here's the answer hints for May 6
a phone displaying Wordle

NYT Connections today: See hints and answers for May 5
A phone displaying the New York Times game 'Connections.'

'Wordle' today: Here's the answer hints for May 5
a phone displaying Wordle

NYT Connections today: See hints and answers for May 4
A phone displaying the New York Times game 'Connections.'
The biggest stories of the day delivered to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
Thanks for signing up. See you at your inbox!