1-15 November 2020 Cyber Attacks Timeline

Here we are with the first timeline of November, covering the main cyber attacks occurred in the first half of the same month (as usual with some additional events that were disclosed in the considered period). In this timeline I have collected 100 events, but this number also includes...

Continue Reading 1-15 November 2020 Cyber Attacks Timeline
16-30 April 2020 Cyber Attacks Timeline
Image by Gerd Altmann from Pixabay

16-30 April 2020 Cyber Attacks Timeline

It's time to publish the second timeline of April. Due to the COVID-19 crisis, the level of activity continues to be quite high. In this timeline I have collected 92 events, less than the 104 events collected in the first timeline of April, but equally an important number. So the Pandemic...

Continue Reading 16-30 April 2020 Cyber Attacks Timeline

16-30 September 2014 Cyber Attacks Timeline

And finally we can complete the September 2014 Cyber Attacks Timeline (Part I here), with the second part covering the most important events between the 16th and the 30th.

A very fruitful month for Cyber Criminals, since there are several events that will be remembered. For sure the Shellshock vulnerability will spoil the troubled sleeps of many System Administrators. In any case this is not the only remarkable event, the chronicles report of an (un)expected tail of the Celebrity Leak scandal (the so-called Fappening), with other two rounds of leaked pictures occurred on the 20th and the 26th, and a couple of massive breaches against TripAdvisor subsidiary Viator (1.4 million users affected) and Japan Airlines (750,000 users affected). Last but not least, it is also worthwhile to mention the group of teen hackers charged for hacking into Microsoft, the US Army and several game companies, stealing $100 million in Intellectual Property, and the so-called Operation Harkonnen, the longest cyber crime campaign ever.

Regarding the Cyber Espionage, the timeline reports the discovery of yet another Chinese Operation against US contractors, and a coordinated state-sponsored mobile malware aimed to intercept protesters in Hong Kong.

At least for once… Nothing particular interesting for Hacktivism…

If you want to have an idea of how fragile our electronic identity is inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).16-30-september-2014-cyber-attacks-timeline

(more…)

Continue Reading 16-30 September 2014 Cyber Attacks Timeline

First Security Breach In The App Store

  • Post author:
  • Post last modified:November 8, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read

It looks like the Judgment Day for iOS has finally arrived. Until today the robustness of the AppStore has always…

Continue Reading First Security Breach In The App Store

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:9 mins read

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue Reading The Dangerous Liaisons (Updated)