Timeline of computer security hacker history

Timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.

1900

1903

1930s

1932

1939

1940s

1943

1950s

1957

1960s

1965

1970s

1971

1980s

1980

technical experts; skilled, often young, computer programmers, who almost whimsically probe the defenses of a computer system, searching out the limits and the possibilities of the machine. Despite their seemingly subversive role, hackers are a recognized asset in the computer industry, often highly prized
The newspaper describes white hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated that "The Company realizes the benefit to NCSS and in fact encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".[5]

1981

1983

1984

1985

1986

1987

1988

1989

1990s

1990

1992

1993

1994

1995

1996

1997

1998

1999

2000s

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010s

2010

2011

2012

2013

2014

2016


References

  1. Marks, Paul (December 27, 2011). "Dot-dash-diss: The gentleman hacker's 1903 lulz". New Scientist. Retrieved January 11, 2012.
  2. "untitled1.html". Retrieved 14 March 2015.
  3. http://osvdb.org/show/osvdb/23257
  4. David Price: Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality CounterPunch, June 30, 2008
  5. 1 2 McLellan, Vin (1981-07-26). "Case of the Purloined Password". The New York Times. Retrieved 11 August 2015.
  6. "The Greatest Hacks of All Time". WIRED.
  7. Elmer-DeWitt, Philip (August 29, 1983). "The 414 Gang Strikes Again". Time. p. 75.
  8. "Beware: Hackers at play". Newsweek. September 5, 1983. pp. 42–46, 48.
  9. "Timeline: The U.S. Government and Cybersecurity". Washington Post. 2002. Retrieved 2006-04-14.
  10. Thompson, Ken (October 1983). "Reflections on Trusting Trust" (PDF). 1983 Turing Award Lecture. ACM.
  11. "2600: The Hacker Quarterly (Volume 2, Number 8, August 1985)". Retrieved 14 March 2015.
  12. http://nj-statute-info.com/getStatute.php?statute_id=1618
  13. "TUCoPS :: Cyber Law  :: psbust.txt". Retrieved 14 March 2015.
  14. "2600 Article". Retrieved 14 March 2015.
  15. 'Hacking' into Prestel is not a Forgery Act offence" (Law Report), The Times, 21 July 1987.
  16. Cliff Stoll (1989). The cuckoo's egg. New York: Doubleday. ISBN 0-370-31433-6.
  17. Burger, R.: "Computer viruses - a high tech disease", Abacus/Data Becker GmbH (1988), ISBN 1-55755-043-3
  18. Spafford, E.H.: "The Internet Worm Program: An Analysis", Purdue Technical Report CSD-TR-823 (undated)
  19. Eichin, M.W. and Rochlis, J.A.: "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", MIT(1989)
  20. Bill Apro & Graeme Hammond (2005). Hackers: The Hunt for Australia’s Most Infamous Computer Cracker. Five Mile Press. ISBN 1-74124-722-5.
  21. Esquibel, Bruce (1994-10-08). ""Operation Sundevil" is finally over for Dr. Ripco". Electronic Frontier Foundation. Retrieved 2009-03-08.
  22. Kevin Poulsen (January 21, 2000). "The case of the kung fu 'phreak'". ZDNet. Retrieved 12 May 2015.
  23. "Recent Large Name Phreaker Busts by Anonymous". EmpireTimes. March 11, 1995.
  24. Trust in Cyberspace, Committee on Information Systems Trustworthiness, National Research Council, 1999
  25. Hackers jam Microsoft's site, 1997
  26. "U.S. Department of Justice, For Immediate Release, Dallas, Texas". USDOJ. September 16, 1999.
  27. "North Korean hackers sabotage computer networks of South Korea". Pravda Online. Retrieved 2008-10-14.
  28. Rob Lemos. "Campaign seeks to defang Rafa's hacker image", "Security Focus", April 11, 2005.
  29. Krebs, Brian. "Teen Pleads Guilty to Hacking Paris Hilton's Phone", The Washington Post, September 13, 2005.
  30. Iain Thomson (2005-11-04). "FBI sting nets botnet hacker". vnunet.com. Archived from the original on 2007-12-20. Retrieved 2008-09-26.
  31. Jeremy Kirk (17 May 2007). "Estonia recovers from massive denial-of-service attack". Network World. Retrieved 14 March 2015.
  32. Michael Cooney (13 June 2007). "FBI: Operation Bot Roast finds over 1 million botnet victims". Network World. Retrieved 14 March 2015.
  33. McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld (IDG). Retrieved 2008-03-10.
  34. Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive (National Journal Group). Retrieved 2008-03-10.
  35. "BMnin sitesi hacklendi haberi". Internethaber. Retrieved 14 March 2015.
  36. Michael Cooney (29 November 2007). "FBI ‘Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments". Network World. Retrieved 14 March 2015.
  37. "Chinese hackers: No site is safe". CNN. March 7, 2008. Retrieved 2008-03-07.
  38. Stefanie Hoffman. "Trend Micro Victim Of Malicious Hack". CRN. Retrieved 14 March 2015.
  39. Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
  40. "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
  41. Broad, William J.; Sanger, David E. (18 November 2010). "Worm in Iran Can Wreck Nuclear Centrifuges". The New York Times.
  42. Mohit Kumar (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
  43. Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.
  44. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  45. Eduard Kovacs (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
  46. John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
  47. Alaa Ashkar. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
  48. Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
  49. Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
  50. Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
  51. Saudi Hacker Threatens to Release 1 Million Israeli Credit Card Numbers, Curt Hopkins, 6 January 2012
  52. "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
  53. Results of the Facebook exploit on pastebin - http://pastebin.com/z5YgWanz
  54. Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Retrieved 2012-04-25.
  55. "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
  56. Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian (London).
  57. "Google,Microsoft,Yandex,Paypal and important websites hacked". May 4, 2012.
  58. USA Gov., Farmers Ins., Mastercard and + Hacked!, Pastebin -
  59. Various Telecommunications Companies Breached by NinjaSec
  60. Scada Systems of 6 Countries Breached by sl1nk - http://zerosecurity.org/2012/12/scada-systems-of-6-countries-breached-by-sl1nk
  61. Burger King Twitter account 'hacked' with McDonald's logo, BBC
  62. New Times Broward-Palm Beach - http://blogs.browardpalmbeach.com/pulp/2013/02/anonymous_hacked_burger_king_horse_meat.php
  63. Gizmodo- http://gizmodo.com/5985385/jeeps-twitter-account-has-been-hacked
  64. "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. Retrieved 14 March 2015.
  65. "White House computer network 'hacked' - BBC". BBC. Retrieved 6 November 2015.
  66. Michael Angelo Santos. "Globe Website was Hacked by Blood Sec Hackers". Coorms.

Further reading

This article is issued from Wikipedia - version of the Friday, May 06, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.