A short history of hacks, worms and cyberterror
Phreakers and phishers, cybercrooks and criminals have strutted their stuff over the Internet.
Due to an editing error, the initial version of this timeline incorrectly stated who was responsible for the Solar Sunrise attacks. While the hacking group L0pht was in the news at the time discussing those attacks, it did not design or implement those attacks.
AT&T begins crackdown on "phreakers," who use tone generators to make free phone calls. By 1970, it has achieved 200 convictions.
Engineers at Xerox Palo Alto Research Center design a computer worm, a short program that searches a network for underused processors. Though built to improve computer efficiency, it is the genesis of the destructive, modern worm.
The FBI busts young hackers known as the 414s, who use an Apple II+ and a modem to break into 60 computer systems, including one at Los Alamos National Laboratory.
"The Brain," one of the first PC viruses, is released in Pakistan.
30-year-old Russian Vladimir Levin leads a group of hackers who break into Citibank's systems and steal millions of dollars. Levin is later sentenced to three years in prison.
Hackers alter Web sites of the U.S. Department of Justice in August, the CIA in October and the U.S. Air Force in December. The GAO reports that hackers attempted to break into Defense Department computer files 250,000 times in 1995 alone. About 65% of the attempts were successful, according to the report.
The Solar Sunrise attacks exploit well-known vulnerabilities in Sun's Solaris operating system to implant sniffer programs in more than 500 military, government and private-sector computer systems. Investigators originally suspect operatives in Iraq, but later learn that two California teenagers were responsible.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers
- Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services
- Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud
- This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America
- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts