Last Updated on by
Cyber Security refers to technology, procedures, and activities that are designed to protect networks, computers, applications, and information from cyber attacks of any kind. Cybersecurity can also be referred to as security for information technology (IT). In this article, we will discuss the history of cybersecurity and hackers.
Maybe you do not hear such a term before, so let’s have a quick look at this term. Cyber Security is about preventing unauthorized access and alteration of your computers or network. Not only is the Internet the main source of information, but it is also a source or medium through which people do business.
These days people use the Internet for advertising purposes and also sell products in various ways, communicate with their customers and retailers, and make financial transactions. Because of this, the Internet is used by hackers and cybercriminals as a tool to spread malware and perform cyber attacks.
To avoid such things Cybersecurity is introduced. Cybersecurity is aimed at protecting machines, networks and software programs against such cyber attacks. Most of these cyber attacks were intended to access, modify or remove sensitive information, to extort money from victims, or to disrupt normal business operations.
History of Cyber Attacks
Most of the people consider the cybersecurity term as a new, but the truth is it begins in the last decade comparatively. Cybersecurity history, however, dates back to the 1970s, before most people even had a computer.
Before jumping into the article deeply, you should know about best hackers in the world. These are the guys who love to enjoy only two things, Computer hacking and drinking their own hand made coffee ( If you want to make your own here are 10 best Coffee Makers). Now let’s have a quick look at the types of cyberattacks.
- Unpatched software
- Phishing attacks
- Network traveling worms
- Dedicated Denial-of-service
- Trojan horses
- Advanced President Threats
The Morris Worm
In 1988, Robert Tappan Morris, a graduate of Cornell University, created a system for measuring the scale of the network. The software would browse the internet, download itself on other machines, and count the number of copies is made.
Surprisingly, to cause damage, Morris did not write the worm. To illustrate security flaws like Unix Sendmail and bad passwords, Morris developed this. The software, however, unnecessarily repeated the parasite, causing damage expected to be between $100,000 and $10,000,000. It also resulted in a multi-day partitioning of the network. This was the firsy DPS attack in History.
More widely known as the first “ransom worm”. In 2017 WannaCry infected computers running the operating system of Microsoft Windows and requested ransom payments in the cryptocurrency of Bitcoin.
In just one day, over 230,000 machines across 150 countries are infected with the worm.
In a cyber attack during the summer of 2014, the accounts of 76 million households and 7 million small businesses were compromised. The attackers gained access to the account holders’ names, addresses, telephone numbers, and messages, but there was no proof to recover passwords or social security numbers.
T Gonzales Attack
In 2009 T Gonzales, a Miami hacker was blamed for one of the biggest cases of fraud in the history of the United States. Gonzales is responsible for sealing over 250 financial institutions with hundreds of millions of credit card and debit card numbers. He also infiltrated the business’s payment card network including the convenience store chain of 7-Eleven.
It wasn’t until 2016 Yahoo announced that it was the victim of a “state-sponsored” attack in 2014, while in negotiations for its sale to Verizon. There had been a settlement of 500 million accounts.
Yahoo reported another violation in December 2016 which happened in 2013, damaging 1 billion user accounts. A few months later, Yahoo had to update its figures and reveal that it probably affected all 3 billion user accounts, reducing the value of Yahoo by around $350 million.
The Web was directly hit in 2002, marking a first in the cyber-attack era. By targeting the thirteen root servers of the Domain Name System (DNS), a DDoS attack took an hour to attack the entire internet. While most users were unaffected, if sustained for a longer period, the DDoS attack could have shut down the internet. Until this point, such a sophisticated cyber-attack on such a large scale had never been conducted.
LA KIIS FM Attack
Kevin Poulsen used his hacker abilities in an entertaining cyber attack to participate in a radio contest. LA KIIS FM sent the 102nd caller a Porsche and Poulsen wanted to win, of course. To block their ability to receive calls, he penetrated the phone network, and Poulsen was assured of the 102nd caller slot. He was finally caught, despite winning the Porsche and sentenced to five years in prison.
The Church of Scientology
In 2008 the Church of Scientology website was targeted for a DDoS attack by a hacker group known as Anonymous. The attack was organized as part of a movement against the church by political activism dubbed “Project Chanology.”
During one week, as many as 500 DDoS attacks hit the Scientology website. Some of these have been powerful enough even to take down the website. A woman from New Jersey has been punished for two years for this crime.
First Ransomware Attack
1989 also marked a big day in the history of cyberattacks, with the first ransomware attack being developed by Joseph Popp. Joseph Popp developed an AIDS Trojan virus, which used the floppy disk for spreading via his postal mailing lists.
AIDS Trojan was poorly designed and that’s why quickly removed. This was because the virus corrupted only the names of the files, rather than the contents of the folder. Many systems were still accessible and people made software such as AIDS OUT easily to open the files.
Businesses every day are facing data breaches. Whether it’s a popular educational website such as Edmodo.com (May 2017 – 77 million exposed user accounts) or a close-knit gaming platform such as Rune.live (March 2017 – 9,618 exposed user accounts), everyone is at danger.
Data are precious such as Passwords, names, emails. This Personal Identification Information (PII) can be sold and purchased in the darkest corners of the Internet.
Now It is up to you to ensure that you have security in place, and if anything goes wrong, there is a disaster recovery plan. Figure out what tools are available to defend your company from cyberattack, whether it is malware, ransomware, or DDoS.