Why you can trust ZDNet ZDNet independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission. Our process

'ZDNet Recommends': What exactly does it mean?

ZDNet's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.

When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNet nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.

ZDNet's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.


Best last-minute gifts for hackers: Cybersecurity presents, secured

From hobbyist hackers and programmers to professionals, people will love our picks for tech gifts this holiday season.
Written by Charlie Osborne, Contributing Writer on

While hackers are often associated with criminal acts, the difference between white hat and black hat activities is important to remember. These days, with cyberattacks increasing in scope and complexity, we need professional, ethical hackers to help protect the day-to-day services we all use. And we especially need to encourage younger people who already have an interest in this field.

If you're looking for holiday gifts that will appeal to someone interested in cybersecurity or programming, the hunt can be a challenge. We've rounded up our picks for the top gift options, including books for study or entertainment, fun stocking stuffers, high-tech kits, and more for your loved one to enjoy. 

Here are interesting, fun, and useful gift options for the hacker in your life throughout the 2021 holiday season.

Barnes and Noble

This Is How They Tell Me the World Ends by Nicole Perlroth should be on the bookshelves of those interested in cybersecurity. Perlroth, a cybersecurity reporter, explores the role of the United States in the digital arms race and includes tales of zero-day exploitation, hacker-for-hire mercenaries, and even how the country's own specialists were duped into working against them.

Barnes and Noble currently has an expedited shipping option available for the book, but the delivery range can span till next Monday. For the fastest and most convenient way to snag a copy, I'd suggest picking it up at your local store.


The Freenove starter kit is a great beginning point for learning the basics of computing programming. The kit includes over 223 components, including sensors, stepper motors, an LCD, buttons, switches, and more, with over 70 code-powered projects to learn, build, and play form.

Learn more: 


VPNs, or virtual private networks, play an integral role for all cyber activities. Just ask any hacker. So while your recipient may or may not be subscribed to a membership, it doesn't hurt to cover a couple of months -- or years -- for them as a gift. ExpressVPN remains at the top of our best VPNs list and for good reason. It supports a generous number of platforms, including Windows, Linux, iOS, and Android, has over 160 server locations in 94 countries, and never logs your IP addresses, browsing history, or DNS queries. Learn more about the company's logging policy here.


Kevin Mitnick's The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data is a classic book that anyone interested in cybersecurity would appreciate. Mitnick, once on the FBI's Most Wanted list, explores modern surveillance and how we can limited its impact on our privacy and security.

Hacker Boxers

For a slightly different option, check out HackerBoxes, a monthly subscription box full of interesting gadgets and tools for those interested in programming, DIY electronics, and hacking. Past boxes have included Capture the Flag projects, radio-over-internet kit, novelty items, and proximity detection gadgets. 


An interesting gift for researchers and pen testers, the Shark Jack is a portable tool for network reconnaissance and wired network auditing. The kit comes with a rapid nmap payload and both attack/arm switches. Payloads can also be developed in bash and by using Linux tools. 


Social Engineering: The Science of Human Hacking by Christopher Hadnagy is an older but still valuable guide on how social engineering is used to phish, impersonate others, obtain their data, secure access to restricted buildings and services, and more. If you know someone interested in security and psychology, this could the perfect gift this holiday season. 


The ALFA wireless extender is a useful accessory for those learning about wireless networks. Powered by USB and suitable for Linux and Windows machines, the extender can be used to enhance your range when using network sniffing tools, such as those on Kali Linux. Monitor mode is supported.

Also: Best Wi-Fi extender in 2021: Boost your Wi-Fi range


Bash Bunny is another option from Hak5. The latest version, Mark II, is a payload deployer over USB and can go from "plug to pwn in 7 seconds" claims the company. Bash Bunny has been improved to be quicker and now supports wireless geofencing and microSD.


Wi-Fi Pineapple, Mark VII, is kit designed for wireless security assessments and auditing. Among its features is a dashboard for active and passive monitoring, a rogue access point facility for conducting Man-in-The-Middle (MiTM) attacks, and report generation.

This device is available in basic Mark VII all the way up to enterprise specifications. 

How did we choose these products?

It can be a challenge to find specialist gifts -- whether the field you're interested in is cybersecurity or otherwise -- so we examined products that would appeal to the widest customer base available. Or, at least products that will keep the hackers in your life busy and out of mischief. 

Need more gift ideas?

Check out our ZDNet Recommends directory or Holiday Gifts hub for some more inspiration. 


Hackers are finding ways around multi-factor authentication. Here's what to watch for

Hackers are finding ways around multi-factor authentication. Here's what to watch for

The 6 best laptops for college in 2022

The 6 best laptops for college in 2022

The 5 best cameras for beginners in 2022
Placeholder product image alt text

The 5 best cameras for beginners in 2022

Home & Office