Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security Information

Some of the greatest known hacks in history

Paul Anderson by Paul Anderson
May 21, 2014
in Information, Security
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

While international corporations emit a sense of invincibility, sometimes not even their power, wealth and prestige can protect them against malicious hackers who are determined to infiltrate their systems at any cost. Read on for an overview of the greatest hacking attacks in history!

You might also like

Downthem DDoS service owner gets a 2-year prison sentence

Cloudflare Stops Record-Breaking DDoS

Chrome Browser Extension Vytal Prevents Privacy Leaks

Kevin Mitnick – USA’s Most Wanted
Back in 1995, US citizen Kevin Mitnick was renowned as America’s most notorious internet hacker. He was sentenced to fifteen years imprisonment for hundreds of malicious computer hacks and his esteemed targets included Apple, Nokia, Motorola and the FBI. Ironically, Mitnick now operates a hugely successful internet consultancy business.

Vladimir Levin – The Citibank Scandal
Russian computer programmer, Vladimir Levin, was arrested in 1995 for hacking into the Citibank network and embezzling the corporation out of a massive US$10.7 million. While the initial transfer was a success, Levin was later busted at Heathrow Airport after attempting to recover the cash. His punishment was three years in a US prison. While Citibank undoubtedly had tight security measures in place, the hack highlights the absolute necessity of regular security testing as well as a structured audit and compliance schedule.

Timothy Lloyd – The Logic Bomb
1996 saw US hacker Timothy Lloyd implant six destructive lines of software code into Omega Engineering’s computer network. The code initiated the explosion of a ‘logic bomb’ designed to cripple the company’s vital software, which was used to service NASA and the US Navy. Had the company protected itself with source code safeguarding software such as Escrow Agreements from the NCC Group, they may have been able to reclaim the codes, restore the critical software and retain continuity that would have saved millions.

Gary McKinnon – Infiltrated NASA and the Pentagon
Inspired by the 1983 military hacking film WarGames, McKinnon managed to break into 97 US military computers in search of UFO evidence. The 2001-2002 attacks on the Pentagon and NASA computer systems rendered 300 Navy weapons computers unusable and caused US$800,000 worth of damage.

Adrian Lamo – Notorious New York Times Hacker
Originally from Boston, Adrian Lamo has gained cult-like status as the “most controversial [ex] hacker operating in the 21st century.” He met his downfall in 2003 when he was arrested for hacking into the New York Times computer system, where he added his name to an exclusive list of expert sources.

George Hotz – The PlayStation Fiasco
American hacker George Hotz caused worldwide panic when he and his cyber team broke into the PlayStation 3 network which was celebrated as being the only 100% secure console system of the seventh generation video games era. The hack saw personal data and information stolen from 77 million users across the globe. One can’t help but think PlayStation’s penetration testing wasn’t quite up to scratch. Like many other legendary hackers, Hotz’s genius has won him industry recognition and the 24 year old was later employed by Facebook.

From Citibank and NASA, to PlayStation and Apple, it seems no corporation is safe from malicious hackers. To protect your company against digital catastrophes it is vital to ensure that your software applications have sufficient escrow agreements, security tests, penetration tests, audit and compliance procedures and defensive precautions in place.

Tags: hacksHistory
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Downthem DDoS service owner gets a 2-year prison sentence

by Christi Rogalski
June 30, 2022
0
Downthem DDoS Service owner sentenced

Matthew Gatrel, a resident of St. Charles, Illinois, has been sentenced to two years in prison for violating the Computer Fraud and Abuse Act (CFAA). The 33-year-old was...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more

WatchDog’s new multi-stage cryptojacking attack unsurfaced

by Christi Rogalski
June 11, 2022
0
WatchDog Targets Docker Containers

Cado Security’s honeypot has recently captured a rather interesting cryptojacker from what they believe to be the WatchDog hacking group. They note that although the attack’s life cycle...

Read more
Next Post
eBay hacked, user data at risk

eBay hacked, user data at risk

Related News

Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Syslogk Linux Rootkit triggers with magic packets

Syslogk Linux Rootkit triggers with magic packets

June 19, 2022 - Updated on June 20, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.