Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security Information

Some of the greatest known hacks in history

Paul Anderson by Paul Anderson
May 21, 2014
in Information, Security
0
640 hack web
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

While international corporations emit a sense of invincibility, sometimes not even their power, wealth and prestige can protect them against malicious hackers who are determined to infiltrate their systems at any cost. Read on for an overview of the greatest hacking attacks in history!

You might also like

BreachForums Owner Arrested and Charged

Stolen credit card market BidenCash leaks over 2 million credit cards

Cloudflare Stops Record-Breaking DDoS

Kevin Mitnick – USA’s Most Wanted
Back in 1995, US citizen Kevin Mitnick was renowned as America’s most notorious internet hacker. He was sentenced to fifteen years imprisonment for hundreds of malicious computer hacks and his esteemed targets included Apple, Nokia, Motorola and the FBI. Ironically, Mitnick now operates a hugely successful internet consultancy business.

Vladimir Levin – The Citibank Scandal
Russian computer programmer, Vladimir Levin, was arrested in 1995 for hacking into the Citibank network and embezzling the corporation out of a massive US$10.7 million. While the initial transfer was a success, Levin was later busted at Heathrow Airport after attempting to recover the cash. His punishment was three years in a US prison. While Citibank undoubtedly had tight security measures in place, the hack highlights the absolute necessity of regular security testing as well as a structured audit and compliance schedule.

Timothy Lloyd – The Logic Bomb
1996 saw US hacker Timothy Lloyd implant six destructive lines of software code into Omega Engineering’s computer network. The code initiated the explosion of a ‘logic bomb’ designed to cripple the company’s vital software, which was used to service NASA and the US Navy. Had the company protected itself with source code safeguarding software such as Escrow Agreements from the NCC Group, they may have been able to reclaim the codes, restore the critical software and retain continuity that would have saved millions.

Gary McKinnon – Infiltrated NASA and the Pentagon
Inspired by the 1983 military hacking film WarGames, McKinnon managed to break into 97 US military computers in search of UFO evidence. The 2001-2002 attacks on the Pentagon and NASA computer systems rendered 300 Navy weapons computers unusable and caused US$800,000 worth of damage.

Adrian Lamo – Notorious New York Times Hacker
Originally from Boston, Adrian Lamo has gained cult-like status as the “most controversial [ex] hacker operating in the 21st century.” He met his downfall in 2003 when he was arrested for hacking into the New York Times computer system, where he added his name to an exclusive list of expert sources.

George Hotz – The PlayStation Fiasco
American hacker George Hotz caused worldwide panic when he and his cyber team broke into the PlayStation 3 network which was celebrated as being the only 100% secure console system of the seventh generation video games era. The hack saw personal data and information stolen from 77 million users across the globe. One can’t help but think PlayStation’s penetration testing wasn’t quite up to scratch. Like many other legendary hackers, Hotz’s genius has won him industry recognition and the 24 year old was later employed by Facebook.

From Citibank and NASA, to PlayStation and Apple, it seems no corporation is safe from malicious hackers. To protect your company against digital catastrophes it is vital to ensure that your software applications have sufficient escrow agreements, security tests, penetration tests, audit and compliance procedures and defensive precautions in place.

Tags: hacksHistory
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Stolen credit card market BidenCash leaks over 2 million credit cards

by Paul Anderson
March 3, 2023
0
Stolen credit card market BidenCash leaks over 2 million credit cards

BidenCash, a marketplace that focuses on carding, has leaked a database of 2,165,700 credit and debit cards to celebrate its first anniversary. Instead of keeping the leak a...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more
Next Post
eBay hacked, user data at risk

eBay hacked, user data at risk

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.