Timeline of computer security hacker history

Timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.

1903

1930s

1932

1939

1943

1960s

1965

1970s

1971

1980s

1981

Of course, the bargain-seekers who waited until midnight to call long distance were hit with high bills.[5]

1983

1984

1985

1986

1987

1988

1989

1990s

1990

1992

1993

1994

1995

1996

1997

1998

1999

2000s

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010s

2010

2011

2012

2013

2014

References

  1. Marks, Paul (December 27, 2011). "Dot-dash-diss: The gentleman hacker's 1903 lulz". New Scientist. Retrieved January 11, 2012.
  2. "untitled1.html". Retrieved 14 March 2015.
  3. http://osvdb.org/show/osvdb/23257
  4. David Price: Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality CounterPunch, June 30, 2008
  5. http://archive.wired.com/science/discoveries/news/2001/02/41630?currentPage=all
  6. Elmer-DeWitt, Philip (August 29, 1983). "The 414 Gang Strikes Again". Time. p. 75.
  7. "Beware: Hackers at play". Newsweek. September 5, 1983. pp. 42–46, 48.
  8. "Timeline: The U.S. Government and Cybersecurity". Washington Post. May 16, 2003. Retrieved 2006-04-14. Check date values in: |year= / |date= mismatch (help)
  9. Thompson, Ken (October 1983). "Reflections on Trusting Trust" (PDF). 1983 Turing Award Lecture. ACM.
  10. "2600: The Hacker Quarterly (Volume 2, Number 8, August 1985)". Retrieved 14 March 2015.
  11. http://nj-statute-info.com/getStatute.php?statute_id=1618
  12. "TUCoPS :: Cyber Law  :: psbust.txt". Retrieved 14 March 2015.
  13. "2600 Article". Retrieved 14 March 2015.
  14. 'Hacking' into Prestel is not a Forgery Act offence" (Law Report), The Times, 21 July 1987.
  15. Cliff Stoll (1989). The cuckoo's egg. New York: Doubleday. ISBN 0-370-31433-6.
  16. Burger, R.: "Computer viruses - a high tech disease", Abacus/Data Becker GmbH (1988), ISBN 1-55755-043-3
  17. Spafford, E.H.: "The Internet Worm Program: An Analysis", Purdue Technical Report CSD-TR-823 (undated)
  18. Eichin, M.W. and Rochlis, J.A.: "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", MIT(1989)
  19. Bill Apro & Graeme Hammond (2005). Hackers: The Hunt for Australia’s Most Infamous Computer Cracker. Five Mile Press. ISBN 1-74124-722-5.
  20. Esquibel, Bruce (1994-10-08). ""Operation Sundevil" is finally over for Dr. Ripco". Electronic Frontier Foundation. Retrieved 2009-03-08.
  21. "Recent Large Name Phreaker Busts by Anonymous". EmpireTimes. March 11, 1995.
  22. http://www.nap.edu/html/trust/trust-1.htm
  23. "U.S. Department of Justice, For Immediate Release, Dallas, Texas". USDOJ. September 16, 1999.
  24. "North Korean hackers sabotage computer networks of South Korea". Pravda Online. Retrieved 2008-10-14.
  25. Rob Lemos. "Campaign seeks to defang Rafa's hacker image", "Security Focus", April 11, 2005.
  26. Krebs, Brian. "Teen Pleads Guilty to Hacking Paris Hilton's Phone", The Washington Post, September 13, 2005.
  27. Iain Thomson (2005-11-04). "FBI sting nets botnet hacker". vnunet.com. Archived from the original on 2007-12-20. Retrieved 2008-09-26.
  28. Jeremy Kirk (17 May 2007). "Estonia recovers from massive denial-of-service attack". Network World. Retrieved 14 March 2015.
  29. Michael Cooney (13 June 2007). "FBI: Operation Bot Roast finds over 1 million botnet victims". Network World. Retrieved 14 March 2015.
  30. McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld (IDG). Retrieved 2008-03-10.
  31. Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive (National Journal Group). Retrieved 2008-03-10.
  32. "BMnin sitesi hacklendi haberi". Internethaber. Retrieved 14 March 2015.
  33. Michael Cooney (29 November 2007). "FBI ‘Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments". Network World. Retrieved 14 March 2015.
  34. "Chinese hackers: No site is safe". CNN. March 7, 2008. Retrieved 2008-03-07.
  35. Stefanie Hoffman. "Trend Micro Victim Of Malicious Hack". CRN. Retrieved 14 March 2015.
  36. Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
  37. "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
  38. Broad, William J.; Sanger, David E. (18 November 2010). "Worm in Iran Can Wreck Nuclear Centrifuges". The New York Times.
  39. Mohit Kumar (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
  40. Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.
  41. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  42. Eduard Kovacs (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
  43. John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
  44. Alaa Ashkar. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
  45. Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
  46. Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
  47. Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
  48. http://hitechanalogy.com/saudi-hacker-0xomar-threatens-israel-release-01-million-credit-card-numbers-story/
  49. "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
  50. Results of the Facebook exploit on pastebin - http://pastebin.com/z5YgWanz
  51. Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Retrieved 2012-04-25.
  52. "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
  53. Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian (London).
  54. "Google,Microsoft,Yandex,Paypal and important websites hacked". May 4, 2012.
  55. USA Gov., Farmers Ins., Mastercard and + Hacked! Pastebin - http://pastebin.com/AP2M5cDX
  56. BBC - http://www.bbc.co.uk/news/world-us-india-8533906955
  57. New Times Broward-Palm Beach - http://blogs.browardpalmbeach.com/pulp/2013/02/anonymous_hacked_burger_king_horse_meat.php
  58. Gizmodo- http://gizmodo.com/5985385/jeeps-twitter-account-has-been-hacked
  59. ZATAZ - http://archives.zataz.com/news/23303/fbi--faille--fuite--data-leak.html
  60. ZATAZ - http://archives.zataz.com/news/23139/nsa--oD-Defense-Connect-online.html
  61. "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. Retrieved 14 March 2015.
  62. http://www.coorms.com/2014/11/globe-website-was-hacked-by-bloodsec-hackers.html

Further reading