Timeline of computer security hacker history

The timeline of computer security hacker history covers important and noteworthy events in the history of hacking and cracking.

1900

1903

1930s

1932

1939

1940s

1943

1950s

1955

1957

1960s

1963

1965

1970s

1971

1979

1980s

1980

technical experts; skilled, often young, computer programmers, who almost whimsically probe the defenses of a computer system, searching out the limits and the possibilities of the machine. Despite their seemingly subversive role, hackers are a recognized asset in the computer industry, often highly prized
The newspaper describes white hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated that "The Company realizes the benefit to NCSS and in fact encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".[14]

1981

1983

1984

1985

1986

1987

1988

1989

1990s

1990

1992

1993

1994

1995

1996

1997

1998

1999

2000s

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010s

2010

2011

2012

2013

2014

2015

2016

2017

See also

References

  1. Marks, Paul (December 27, 2011). "Dot-dash-diss: The gentleman hacker's 1903 lulz". New Scientist. Retrieved January 11, 2012.
  2. Davis, Amanda. "A History of Hacking - IEEE - The Institute". Theinstitute.ieee.org. Retrieved 2017-07-01.
  3. Yagoda, Ben (6 March 2014). "A Short History of “Hack”". Retrieved 22 July 2017.
  4. "Hacking and Blue Boxes | The Story of Information". Infostory.com. 2011-11-20. Retrieved 2017-07-01.
  5. Gustavo Duarte (2008-08-27). "First Recorded Usage of "Hacker" - Gustavo Duarte". Duartes.org. Retrieved 2017-07-01.
  6. "untitled1.html". Larch-www.lcs.mit.edu:8001. 1940-11-07. Retrieved 2017-07-01.
  7. "23257 : IBM 7094 CTSS System Text Editor Multiple Instance Password File Disclosure". Archive.fo. Retrieved 2017-07-01.
  8. "The World's First Computer Password? It Was Useless Too". WIRED. 2011-06-19. Retrieved 2017-07-01.
  9. David Price: Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality CounterPunch, June 30, 2008
  10. Rosenbaum, Ron (2011-10-07). "The article that inspired Steve Jobs: “Secrets of the Little Blue Box”". Slate.com. Retrieved 2017-07-01.
  11. "The Memory Hole > The Missing Chapter from The Art of Deception by Kevin Mitnick". Web.archive.org. Retrieved 2017-07-01.
  12. 1 2 McLellan, Vin (1981-07-26). "Case of the Purloined Password". The New York Times. Retrieved 11 August 2015.
  13. "The Greatest Hacks of All Time". WIRED.
  14. Elmer-DeWitt, Philip (August 29, 1983). "The 414 Gang Strikes Again". Time. p. 75.
  15. "Beware: Hackers at play". Newsweek. September 5, 1983. pp. 42–46, 48.
  16. "Timeline: The U.S. Government and Cybersecurity". Washington Post. 2002. Retrieved 2006-04-14.
  17. Thompson, Ken (October 1983). "Reflections on Trusting Trust" (PDF). 1983 Turing Award Lecture. ACM.
  18. "2600: The Hacker Quarterly (Volume 2, Number 8, August 1985) | United States Postal Service | Telephone Tapping". Scribd.com. Retrieved 2017-07-01.
  19. "New Jersey Statute Directory - NJSA 2C:20-25 Computer criminal activity; degree of crime; sentencing". Nj-statute-info.com. Retrieved 2017-07-01.
  20. "TUCoPS :: Cyber Law :: psbust.txt". Artofhacking.com. Retrieved 2017-07-01.
  21. 'Hacking' into Prestel is not a Forgery Act offence" (Law Report), The Times, 21 July 1987.
  22. Stoll, Cliff (1989). The cuckoo's egg. New York: Doubleday. ISBN 0-370-31433-6.
  23. Burger, R.: "Computer viruses - a high tech disease", Abacus/Data Becker GmbH (1988), ISBN 1-55755-043-3
  24. Spafford, E.H.: "The Internet Worm Program: An Analysis", Purdue Technical Report CSD-TR-823 (undated)
  25. Eichin, M.W. and Rochlis, J.A.: "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", MIT(1989)
  26. "Computer Intruder is Put on Probation and Fined" by John Markoff, New York Times. The total fine ran to $13,326, which included a $10,000 fine, $50 special assessment, and $3,276 cost of probation oversight.
  27. Bill Apro & Graeme Hammond (2005). Hackers: The Hunt for Australia’s Most Infamous Computer Cracker. Five Mile Press. ISBN 1-74124-722-5.
  28. Esquibel, Bruce (1994-10-08). ""Operation Sundevil" is finally over for Dr. Ripco". Electronic Frontier Foundation. Retrieved 2009-03-08.
  29. Poulsen, Kevin (January 21, 2000). "The case of the kung fu 'phreak'". ZDNet. Retrieved 12 May 2015.
  30. "Recent Large Name Phreaker Busts by Anonymous". EmpireTimes. March 11, 1995.
  31. A. Young, M. Yung. "Cryptovirology: Extortion-Based Security Threats and Countermeasures". IEEE Symposium on Security & Privacy, May 6–8, 1996. pp. 129141. IEEEExplore: Cryptovirology: extortion-based security threats and countermeasures
  32. Trust in Cyberspace, Committee on Information Systems Trustworthiness, National Research Council, 1999
  33. Hackers jam Microsoft's site, 1997
  34. "CNN - Sounding off: MP3s heading to mainstream? - Mar. 26, 1998". Cnn.com. Retrieved 2017-05-19.
  35. Associated Press (December 10, 1997). "Hackers Leave Ransom Note on Yahoo Site". Retrieved 19 May 2017.
  36. "Pentagon Deflects Web Assault | WIRED". Archive.wired.com. Retrieved 2017-07-01.
  37. "U.S. Department of Justice, For Immediate Release, Dallas, Texas". USDOJ. September 16, 1999.
  38. "North Korean hackers sabotage computer networks of South Korea". Pravda Online. Retrieved 2008-10-14.
  39. Rob Lemos. "Campaign seeks to defang Rafa's hacker image", "Security Focus", April 11, 2005.
  40. Krebs, Brian. "Teen Pleads Guilty to Hacking Paris Hilton's Phone", The Washington Post, September 13, 2005.
  41. Iain Thomson (2005-11-04). "FBI sting nets botnet hacker". vnunet.com. Archived from the original on 2007-12-20. Retrieved 2008-09-26.
  42. Kirk, Jeremy (17 May 2007). "Estonia recovers from massive denial-of-service attack". Network World. Retrieved 14 March 2015.
  43. Cooney, Michael (13 June 2007). "FBI: Operation Bot Roast finds over 1 million botnet victims". Network World. Retrieved 14 March 2015.
  44. McMillan, Robert (June 21, 2007). "Pentagon shuts down systems after cyberattack". InfoWorld. IDG. Retrieved 2008-03-10.
  45. Aitoro, Jill R. (March 5, 2008). "Defense officials still concerned about data lost in 2007 network attack". Government Executive. National Journal Group. Retrieved 2008-03-10.
  46. "BMnin sitesi hacklendi haberi". Internethaber. Retrieved 14 March 2015.
  47. "Chinese hackers: No site is safe". CNN. March 7, 2008. Retrieved 2008-03-07.
  48. Hoffman, Stefanie. "Trend Micro Victim Of Malicious Hack". CRN. Retrieved 14 March 2015.
  49. Markoff, John (2009-08-26). "Defying Experts, Rogue Computer Code Still Lurks". New York Times. Retrieved 2009-08-27.
  50. "A new approach to China". Google Inc. 2010-01-12. Retrieved 17 January 2010.
  51. Broad, William J.; Sanger, David E. (18 November 2010). "Worm in Iran Can Wreck Nuclear Centrifuges". The New York Times.
  52. Kumar, Mohit (26 March 2011). "Thousands of Bank of America Accounts Hacked !". The Hacker News - Biggest Information Security Channel. Retrieved 14 March 2015.
  53. Apr 27, 2011 10:56 AM ET (April 27, 2011). "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. Retrieved 2011-04-29.
  54. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  55. Kovacs, Eduard (26 September 2011). "700,000 InMotion Websites Hacked by TiGER-M@TE". softpedia. Retrieved 14 March 2015.
  56. John P. Mello Jr. "Sesame Street Hacked, Porn Posted". PC World. Retrieved 2011-10-26.
  57. Ashkar, Alaa. "PA Telecommunications minister: Palestinian Internet Under Hacking Attacks". IMEMC. Retrieved 2011-11-02.
  58. Ashcraft, Brian. "Steam Forums Apparently Hacked". Kotaku.
  59. Jonas Sverrisson Rasch. "News article about the arrests of Noria". Dagbladet. Retrieved 2012-12-14.
  60. Flock, Elizabeth (January 3, 2012). "Saudi hackers say they published Israeli credit card information". The Washington Post.
  61. Saudi Hacker Threatens to Release 1 Million Israeli Credit Card Numbers, Curt Hopkins, 6 January 2012
  62. "Israeli hacker retaliates to credit card hacking". BBC News. January 12, 2012.
  63. Kripos. "(Norwegian) Tre personer siktet for datainnbrudd". Kripos. Retrieved 2012-04-25.
  64. "Marriott,Hack,Extortion, Arrest and important websites hacked". Feb 3, 2012.
  65. Garside, Juliette (February 9, 2012). "Apple supplier Foxconn hacked in factory conditions protest". The Guardian. London.
  66. "Hackers Stole 65 Million Passwords From Tumblr, New Analysis Reveals - Motherboard". Motherboard.vice.com. 2016-05-30. Retrieved 2017-07-01.
  67. "The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster - WIRED". WIRED. Retrieved 14 March 2015.
  68. "White House computer network 'hacked' - BBC". BBC. Retrieved 6 November 2015.
  69. Evan Perez; Shimon Prokupecz (8 April 2015). "How the U.S. thinks Russians hacked the White House". CNN. Retrieved 17 December 2016. Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
  70. Michael Angelo Santos. "Globe Website was Hacked by Blood Sec Hackers". Coorms.
  71. Zengerle, Patricia; Cassella, Megan (2015-07-09). "Estimate of Americans hit by government personnel data hack skyrockets". Reuters. Retrieved 2015-07-09.
  72. Barrett, Devlin (5 June 2015). "U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say". Wall Street Journal. Retrieved 5 June 2015.
  73. Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. Retrieved 5 June 2015.
  74. "ISIL-Linked Kosovo Hacker Sentenced to 20 Years in Prison". Justice Department of the United States.
  75. Romm, Tony; Geller, Eric. "WikiLeaks supporters claim credit for massive U.S. cyberattack, but researchers skeptical". POLITICO. Retrieved 22 October 2016.
  76. Mussa, Matthew (2017-04-30). "‘The Dark Overlord’, Netflix Hacker: 5 Fast Facts You Need to Know". Heavy.com. Retrieved 2017-07-01.
  77. Brenner, Bill (2017-05-16). "WannaCry: the ransomware worm that didn’t arrive on a phishing hook". Naked Security. Retrieved 2017-05-18.
  78. "Cyber-attack: Europol says it was unprecedented in scale". BBC News. 2017-05-13. Retrieved 2017-05-18.
  79. 1 2 3 Hern, Alex (1970-01-01). "Hackers publish private photos from cosmetic surgery clinic | Technology". The Guardian. Retrieved 2017-05-31.
  80. "Plastic surgery clinics hacked; 25,000 photos, data online". The Seattle Times. Retrieved 2017-05-31.
  81. "Plastic surgery clinics hacked; 25,000 photos, data online". Abcnews.go.com. Retrieved 2017-05-31.
  82. "Global ransomware attack causes chaos". BBC News. 27 June 2017. Retrieved 27 June 2017.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.