A short history of hacks, worms and cyberterror
Phreakers and phishers, cybercrooks and criminals have strutted their stuff over the Internet.
Due to an editing error, the initial version of this timeline incorrectly stated who was responsible for the Solar Sunrise attacks. While the hacking group L0pht was in the news at the time discussing those attacks, it did not design or implement those attacks.
AT&T begins crackdown on "phreakers," who use tone generators to make free phone calls. By 1970, it has achieved 200 convictions.
Engineers at Xerox Palo Alto Research Center design a computer worm, a short program that searches a network for underused processors. Though built to improve computer efficiency, it is the genesis of the destructive, modern worm.
The FBI busts young hackers known as the 414s, who use an Apple II+ and a modem to break into 60 computer systems, including one at Los Alamos National Laboratory.
"The Brain," one of the first PC viruses, is released in Pakistan.
30-year-old Russian Vladimir Levin leads a group of hackers who break into Citibank's systems and steal millions of dollars. Levin is later sentenced to three years in prison.
Hackers alter Web sites of the U.S. Department of Justice in August, the CIA in October and the U.S. Air Force in December. The GAO reports that hackers attempted to break into Defense Department computer files 250,000 times in 1995 alone. About 65% of the attempts were successful, according to the report.
The Solar Sunrise attacks exploit well-known vulnerabilities in Sun's Solaris operating system to implant sniffer programs in more than 500 military, government and private-sector computer systems. Investigators originally suspect operatives in Iraq, but later learn that two California teenagers were responsible.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Considerations For Effective Software License Management
- For many reasons, software license management has become a critical issue for many IT organizations and enterprise's alike. With many licensing options, hurdles...
- eBay uses 100% OpenSource WSO2 ESB to process more than 1Billion transactions a day
- Along with eBay's success comes a huge demand to ensure reliable, 24x7 availability of the services that enable these transactions. For eBay, that...
- A Reference Architecture for the Internet of Things
- The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- REST easy: API Design, Evolution and Connection
- RESTful design increases API performance, reduces development effort, and minimizes operational support burden. By following a few best practices and selecting RESTful tooling,... All Government IT White Papers
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator...
- The Foundation You Need to Build a Better Storage Infrastructure Watch this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage...
- Building Tomorrow's Data Center with Converged Technologies A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few.
- Technology for Everyone A Kansas school district modernizes teaching and learning and paves the way to a one-to-one program with a comprehensive upgrade of its wireless...
- All Government IT Webcasts