Click me
Transcribed

Hacking History: A Timeline of Hack Tactics

ERROR! HACKING HISTORY A TIMELINE OF HACK TACTICS ERROR! 19605 INTRODUCTION Hackers have always fascinated the public. Films, books, and video games have all attempted to explore the hacker psyche - but just who are these mysterious figures? Hardened criminals, set on wrecking software and stealing money? Or revolutionary heroes, seeking to expose government wrongdoing? 1960 Hacking begins in the 60s, mostly at MIT. These early hacks are simply shortcuts developed to bypass or improve the operation of systems. MIT Take a look at this timeline of hacking history, from phone phreaking to corporate theft. Hackers - innovative or immoral? You decide. Massachusetts Institute of Technology ERROR! 19705 1971 John Draper (Captain Crunch) invents the 'blue box' - a method of making free long distance calls, with the help of a toy whistle given away with Cap'n Crunch cereal. Blue_box 1972 Steve Wozniak and Steve Jobs learn the art of phreaking, taking the names 'Berkeley Blue' (Wozniak) and 'Oaf Tobar' (Jobs). ERROR! 19805 1981 The Chaos Computer Club, Europe's largest association of hackers, is formed. ccc_Logo 1984 The first edition of 2600: The Hacker Quarterly is published. 1986 The Computer Fraud and Abuse Act is passed in the US. 1988 Kevin Poulsen (Dark Dante) hacks a federal computer network, is pursued by the police, and goes into hiding. 1988 Robert Morris develops the 'Morris Worm', the first computer worm on the internet. Robert_Morris X 1989 Robert Morris becomes the first person to be convicted under the Computer Fraud and Abuse Act. ERROR! 19905 1991 Kevin Poulsen is caught and arrested by police. He is sentenced to 5 years in prison. 1992 Kevin Mitnick breaks his probation terms from an earlier conviction and goes on the run, beginning a 2 1/2 year-long hacking 1994 spree. KEVIN_MITNI.. Vladimir Levin accesses the accounts of Citibank's customers through their dial-up wire transfer service, and steals around $10million. Vladimir_Leuin X 1995 Vladimir Levin is caught. He will later be sentenced to 3 years in prison. 1995 Kevin Mitnick is finally arrested after 2 1/2 years. He will later be sentenced to over 5 years in prison. 1997 AOHELL, a hacking program, brings the AOL network to its knees, disrupting chat rooms and inboxes. AOHELL ERROR! AOHELL 20005 2000 The ILOVEYOU computer worm is released. It rapidly spreads through email accounts, causing $10billion damage before it is finally stopped. 1110101010 ILOVEYOU 2000 Subject: ILOVEYOU Michael Calce (MafiaBoy) launches a series of Distributed Denial of Service (DDOS) attacks, bringing down Yahoo!, eBay, CNN, Amazon and Dell.com in the space of a week. kindly check the attached LOVELETTER LOVE-LETTER-FORY OU. TXT.vbs coming from me. Michael Calce FDH IGH IGH 2001 Gary McKinnon (Solo) hacks into 97 US military and NASA computers, allegedly disrupting operations, deleting files, and posting messages. 2001 Michael Calce is arrested and sentenced to open custody, after bragging about his DDOS attacks on internet chat rooms. 2002 Gary McKinnon is indicted by the US, who request his extradition. He could face up to 70 years in prison. 2002 Adrian Lamo (the homeless hacker) hacks the website of The New York Times. 200 니 ADRIAN_LAMO X AOL staff member Jason Smathers steals the details of 92 million customers, and sells them on to spammers. This results in 7 billion spam emails, and over a year in prison for Jason. JASON_SMATHE... X 200 니 Adrian Lamo is charged with computer crimes. He is sentenced to 6 months in prison, 2 years probation, and a large fine. 2007 George Hotz becomes the first person ever to carrier unlock the iPhone. 2008 GEORGE_HOTZ X The Chaos Computer Club publishes fingerprints of German Minister of the Interior, as a protest against the use of biometric data in German identity. 2010 George Hotz hacks the PlayStation 3. 2010 The Stuxnet worm causes serious damage to an Iranian nuclear facility, damaging physical equipment as well as computer systems. 2010 Barnaby Jack attends the Black Hat conference, and makes 2 ATMS dispense fake paper money in front of the audience. 2011 Barnaby_Joack Hacker group LulzSec hacks Sony repeatedly, stealing information from 70 million user accounts. LulzSec_Logo 2011 Barnaby Jack hacks an insulin pump at the MCAfee FOCUS 11 conference. 2012 2012 MasterCard and Visa are hacked. More than 1.5 million customers have their credit card numbers stolen. JH Home Secretary Theresa May finally blocks Gary McKinnon's extradition. Thereso_May 2013 Hacking group Anonymous hack the Twitter and Flickr accounts of the North Korean governments, posting insulting pictures and inflammatory comments. 2013 Syrian loyalists hack the Twitter account of the Associated Press. ERROR! A FACTS 10121HYSHJTJHR 1,000 Websites 90% of people delete suspicious emails from their PCs But only 56% do the same on their mobile devices GR3 On average $113 billion is stolen through cybercrime every year. It would take 10 minutes to hack a 6-character lowercase password. JH 30,000 websites are hacked every day. It would take 44,530 years to hack a 9-character password with lowercase letters, uppercase letters, numbers and symbols. More than a million people become victims of cybercrime every day. There are 378 million victims a A quarter of people don't have any antivirus protection on their PCs. year. Or 12 victims a second. SOURCES www.crn.com/news/security/190300322/the-10-most-destructive-pc-viruses-of-all-time.htm i-sight.com/corporate-security/cracking-the-code-on-password-protection/ www.forbes.com/sites/jameslyne/2013/09/06/30000-web-sites-hacked-a-day-how-do-you-host-yours/ www.symantec.com/connect/blogs/cybercrime-takes-its-toll www.symantec.com/connect/blogs/cybercrime-takes-its-toll#_ftn1 www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013 SSLS.com Same certs. Low price

Hacking History: A Timeline of Hack Tactics

shared by JohnSSLs on May 01
250 views
0 shares
4 comments
Hacking is an epidemic. In 2013, Twitter, Facebook, Adobe, Target and NBC were all the victims of high-profile security breaches – and they weren't alone. SSLs.com has performed thorough research a...

Publisher

SSLs.com

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size