White hat hacker:
A white hat hacker is an ethical hacker who ethically oppose to the abuse of computer systems. A white hat generally focuses on securing IT systems, whereas a black hat (the opposite) would like to break into them. The term white hat hacker is also often used to describe those who attempt to break into systems or networks in order to help the owners of the system by making them aware of security flaws, or to perform some other altruistic activity. Many such people are employed by computer security companies; these professionals are sometimes called as sneakers. Groups of these people are often called as tiger teams.
Black hat hackers:
A black hat is a person who compromises the security of a computer system without the permission of authorized party, typically with malicious intent. The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country's laws is actually software cracking. The primary difference between white and black hat hackers is that a white hat hacker claims to observe ethical principles. Like black hats, white hats are often intimately familiar with the internal details of security systems, and can delve into obscure machine code when needed to find a solution to a tricky problem. Some use the term grey hat and fewer use brown hat to describe someone's activities that crosses between black and white.
Grey Hat Hackers:
A Grey Hat in the computer security community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or for malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
Internet Crime Hackers:
Internet crime hackers commit crime on the internet, using the Internet and by means of the Internet. Internet crime is a general term that includes crimes such as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography,kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. All such crimes are computer related and facilitate crimes. The different types of Internet crime vary in their design and easy accessibility to be committed. It can be separated into two different categories.
Blackmail is a long-established illegal act that has been given a new twist in the modern age. The blackmailer may threaten to release embarrassing or other harmful information via the Internet or a private network if the victim does not comply with the demands of the criminal. A cybercrime of this type may go as far as having the victim transfer funds to an untraceable bank account using some type of online payment program, thus making full use of modern technology to commit the crime Blackmail
i) Official government websites.
ii) On line credit card scam
iii) Work on cyber crime operations and they make money.