Professional Documents
Culture Documents
By Paul Gil
Internet Basics Expert
released this information to the world through various websites. The shameful
impact to people's personal reputations has had ripples across the world, including
claims that user suicides followed after the hack.
This hack is memorable not only because of the sheer publicity of the impact, but
because the hackers also earned some fame as vigilantes crusading against
infidelity and lies.
Read more about the Ashley Madison breach:
Rob Price describes the impacts of the Ashley Madison hack scandal
Callum Paton tells us how you can check if your spouse was affected by the
hack
Ads
Bitrix24 Is 100% Free
bitrix24.com/Unified_Communication
Bitrix24 Is World's #1 Free Unified Communication Platform. Learn More
Start Download Now
www.audiotoaudio.com
Audio to Audio Converter Convert Various Audio Files & More!
Conficker worm malware: still infection 1 mil computers per year. Steve Zabel /
Getty
2. The Conficker Worm 2008: Still Infecting a Million Computers a Year
While this resilient malware program has not wreaked irrecoverable damage, this
program refuses to die; it actively hides itself and then nefariously copies itself to
other machines. Even more frightening: this worm continues to open backdoors for
future hacker takeovers of the infected machines.
The Conficker worm program (aka 'Downadup' worm) replicates itself across
computers, where it lies in secret to either a) convert your machine into a zombie
bot for spamming, or b) to read your credit card numbers and your passwords
through keylogging, and transmit those details to the programmers.
Conficker/Downadup is a very smart computer program. It defensively deactivates
your antivirus software in order to protect itself.
Conficker is noteworthy because of its resilience and reach; it still travels around the
Internet 8 years after its discovery.
Read more about the Conficker/Downadup worm program:
This devious and silent attack wreaked far more damage than simply destroying the
refining centrifuges themselves; the worm led thousands of specialists down the
wrong path for a year and half, and wasted thousands of hours of work and millions
of dollars in uranium resources.
The worm was named 'Stuxnet', a keyword that was found in the code's internal
comments.
This hack is memorable because of both optics and deceipt: it attacked a nuclear
program of a country that has been in conflict with the USA and other world powers;
it also deceived the entire nuclear staff for a year and a half as it performed its
nasty deeds in secret.
Read more about the Stuxnet hack:
Ads
Start Download
www.allin1convert.com
Convert 50+ Files On-line Free All in One Converter!
Start Download
www.videodownloadconverter.com
Download Videos To Your Desktop & Convert To Any Format - All Free!
Home Depot hack, 2014: over 50 million credit card numbers. Raedle / Getty
How CEO Frank Blake responded to his chain of stores getting hacked
A London teenage hacker pleads guilty to being one of the DDOS hackers
Meet Spamhaus, the anti-spam service who was the prime target of the
DDOS attack.
Ads
Download For Free Movies
www.filmfanatic.com
Get Showtimes & Watch Movies Free Download Movies w/ Film Fanatic!
Whichever way you choose to measure this unpleasant incident, millions of online
shoppers have had their password-protected data compromised. This hack is
particularly memorable because it was very public, and because eBay was painted
as weak on security because of their slow and lackluster public response.
Read more about the eBay hack of 2014:
eBay does not win any points with its sluggish response to the breach
The UK Register tells us that server technicians failed to upgrade one of its
servers that allowed the hack
As a response, Anthem is providing free credit monitoring for its members. Anthem
is also considering encrypting all their data for the future.
The Anthem hack is memorable because of its optics: another monolithic
corporation fell victim to a few clever computer programmers.
Read more about the Anthem hack here:
Ads
Start Download Now
www.audiotoaudio.com
Audio to Audio Converter Convert Various Audio Files & More!
Start Download
www.allin1convert.com
Convert 50+ Files On-line Free All in One Converter!
Heartland hack 2012: 110 million users. PhotoAlto / Gabriel Sanchez / Getty
12. Global Payments 2012 Hack: 110 Million Credit Cards
Global Payments is one of several companies that handle credit card transactions
for lenders and vendors. Global Payments specializes in small business vendors. In
2012, their systems were breached by hackers, and information on people's credit
cards was stolen. Some of those users have since had their credit accounts
defrauded with dishonest transactions.
The signature system of credit cards in the USA is dated, and this breach could have
easily been reduced if credit card lenders would invest in using the newer chip cards
that are used in Canada and the UK.
This hack is noteworthy because it struck at the daily routine of paying for goods at
the store, shaking the confidence of credit card users around the world.
Read more about the Global Payments hack:
Heartland payment processor was also hacked in 2009 before merging with
Global Payments