| One may code a virus |
Universal |
20 Jul 2025 |
| Computer criminal, informally (6) |
|
|
| Cyber crim arrives by chopper (6) |
|
|
| Cyberwarrior, sometimes |
LA Times Daily |
21 Jun 2025 |
| One who gets a kick out of computers? (6) |
|
|
| Evil computer genius |
|
|
| Hatchet man in the computer world? (6) |
|
|
| Website invader |
Eugene Sheffer |
21 Jan 2025 |
| Chopper for one gaining unauthorised access perhaps |
The Times Quick Cryptic |
16 Dec 2024 |
| Poor golfer is a cybercriminal (6) |
|
|
| Computer network trespasser (6) |
Puzzler |
29 Oct 2024 |
| One who breaks into computer systems for kicks? |
|
|
| Computer pirate |
Puzzler Backwords |
23 Sep 2024 |
| Not-so-good golfer |
Newsday |
21 Sep 2024 |
| Cyberburglar (6) |
|
|
| User gaining unauthorised access to IT systems |
The Times Concise |
22 Aug 2024 |
| Person who illegally breaks into computers (6) |
|
|
| Person who uses computers to gain unauthorized access to data (6) |
|
|
| One cutting sort damaging another's files? (6) |
|
|
| Intruder into computer data |
|
|
| He's bad at tackling computer criminal (6) |
|
|
| Amateur computer enthusiast (6) |
|
|
| Unauthorized accessor |
|
|
| Computer operator's horse about to be brought up (6) |
|
|
| One imposing cuts a threat to security? |
The Sun Two Speed |
27 Mar 2024 |
| Information thief |
The Sun Two Speed |
27 Mar 2024 |
| Computer whiz who might help with a heist |
USA Today |
03 Mar 2024 |
| Computer intruder |
|
|
| Fish sandwiches about right for online troublemaker |
|
|
| Cyber criminal |
The Telegraph Quick |
05 Feb 2024 |
| Wild slasher and computer criminal |
The Sun Two Speed |
09 Dec 2023 |
| Information thief |
The Sun Two Speed |
09 Dec 2023 |
| Website invader |
Eugene Sheffer |
22 Sep 2022 |
| System infiltrator |
LA Times Daily |
04 Sep 2022 |
| Intruder with a very bad cough? |
|
|
| Computer criminal |
The Telegraph Quick |
20 Jun 2021 |
| Cuts a rough diamond perhaps and is investigated for online fraud |
Irish Times Crosaire |
22 Dec 2020 |
| One might circumvent a firewall |
Wall Street Journal |
21 Dec 2020 |
| Rihanna's character in 'Ocean's 8,' e.g |
USA Today |
27 Aug 2020 |
| Computer whiz |
USA Today |
14 May 2020 |
| Computer user who might say 'I'm in' |
USA Today |
27 Apr 2020 |
| Cyber-terrorist |
The Telegraph Quick |
01 Apr 2020 |
| One breaking into a computer system |
The Times Concise |
01 Apr 2020 |
| High-tech intruder |
USA Today |
19 Mar 2020 |
| Prime minister on television, one seeking to steal information |
|
|
| Cyber-criminal |
The Telegraph Quick |
01 Feb 2020 |
| One breaks into computer systems for nefarious purposes |
Irish Times Simplex |
13 Dec 2019 |
| Black hat |
The New Yorker |
09 Dec 2019 |
| One needing keys to break in |
Universal |
07 Aug 2019 |
| One imposing cuts potentially a threat to security |
|
|
| Online invader? |
|
|
| One needing keys to break in |
|
|
| Jim --, character played by Paul Eddington in the sitcom 'Yes, Minister' |
The Telegraph General Knowledge |
12 Nov 2018 |
| Creator of a Trojan horse, say |
The Chronicle of Higher Education |
09 Nov 2018 |
| Wild slasher and computer criminal |
The Sun Two Speed |
26 Sep 2018 |
| Information thief |
The Sun Two Speed |
26 Sep 2018 |
| Has the cut of a rough person investigated for online fraud |
Irish Times Crosaire |
30 Jan 2018 |
| Creator of a Trojan horse, say |
|
|
| Off-site infiltrator |
Wall Street Journal |
13 Dec 2017 |
| Novice golfer |
The Telegraph Quick |
28 Jun 2017 |
| Software whiz |
Newsday |
09 Jun 2017 |
| Website invader |
Eugene Sheffer |
17 Feb 2017 |
| Electronic invader |
Wall Street Journal |
29 Nov 2016 |
| PM on TV who bypasses security measures? |
The Times Cryptic |
29 Aug 2016 |
| Electronic snoop |
Newsday |
13 Apr 2016 |
| Poor golfer |
The Telegraph Quick |
01 Jul 2015 |
| Information thief |
Wall Street Journal |
02 Jan 2015 |
| Information thief |
|
|
| Computer nerd and he's hopeless at golf |
|
|
| User trying to get through a firewall |
|
|
| User trying to get through a firewall |
|
|
| Unauthorized user? |
|
|
| Virus carrier, maybe |
|
|
| System infiltrator |
|
|
| Cyber-nuisance |
|
|
| Computer troublemaker |
|
|
| Cyber-crook |
|
|
| Computer felon |
|
|
| Computer mischief-maker |
|
|
| On-line terrorist |
|
|
| Electronic snoop |
|
|