Fortune 500 Cyber Attacks Timeline

For the Infosec professionals, this troubled 2014 will be remembered for the trail of gigantic breaches unleashed nearly exactly one year ago, when the real outcome of the infamous Target breach became to emerge. The real extent of the breach was yet to be known, like also the fact that it would not have been an isolated case, but just the beginning of a nightmare.

However this is not the only example of a Fortune 500 company deeply hit, and thanks to a very smart hint by @bufferzone, I took the opportunity to collect in this timeline all the main cyber incidents involving Fortune 500 and Fortune 500 Global companies since 2011 to nowadays.

The adopted selection criteria take into considerations only incidents involving a direct impact on end users, so defacements have not been taken into consideration.

Fortune 500 Global companies are characterized by a blank value in the Rank column, whereas Fortune 500 companies are characterized by a red value. Also, when possible I inserted both values if the targeted company belongs to both charts and, in those cases in which a subsidiary company has been targeted, I have obviously inserted the rank of the parent company.

Fortune 500 Cyber Attacks TImeline (more…)

Continue Reading Fortune 500 Cyber Attacks Timeline

First Security Breach In The App Store

  • Post author:
  • Post last modified:November 8, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read

It looks like the Judgment Day for iOS has finally arrived. Until today the robustness of the AppStore has always…

Continue Reading First Security Breach In The App Store

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:9 mins read

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue Reading The Dangerous Liaisons (Updated)

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:MobileSecurity
  • Post comments:1 Comment
  • Reading time:5 mins read

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue Reading Phonarchy in the U.K.