Instructions

Read the following descriptions and decide whether they are examples of white hat, gray hat or black hat behavior.

Close

Hacker Hats

A security researcher found a major flaw in a smartphone OS and reported it to the manufacturer, and it was quickly fixed.