1-15 May 2013 Cyber Attacks Timeline

And here we are with our bi-weekly review of the main cyber attacks. This time is the turn of the first half of May.

Probably this month will be remembered for the huge cyber-heist against two Payment Processors, and affecting two banks (National Bank of Ras Al-Khaimah PSC in the United Arab Emirates and the Bank of Muscat in Oman), which suffered a massive loss of $45 million due to an endless wave of unlimited withdrawals from their ATMs.

Other relevant actions related to Cyber-criminal operations include the massive breaches against MSI Taiwan (50,000 records affected) and most of all, the Washington state Administrative Office of the Courts (up to 160,000 SSN and 1 million driver’s license numbers).

On the other hand, the hacktivists concentrated their efforts on the so-called OpUSA (7 May), even if it looks like that most of the attacks were nuisance-level. Instead, and this is a great news, after months of intense activity, the operation Ababil come to a stop.

On the cyber war front, this month reports an unedited conflict between Taiwan and Philippines.

Last but not least, even if this attack dates back to 2007, on the Cyber-Espionage front, Bloomberg has shaken this lazy month revealing the repeated attacks by the infamous Comment Crew hackers against Qinetiq, a very critical Defense contractor. The cyber threats from the Red Dragon (real or alleged) keep on scaring the western world.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

May 2013 Cyber Attacks Timeline Part I (more…)

Continue Reading 1-15 May 2013 Cyber Attacks Timeline

Again On The Carrier IQ Saga

  • Post author:
  • Post last modified:December 13, 2011
  • Post category:MobileSecurity
  • Post comments:2 Comments
  • Reading time:5 mins read

Yesterday I posted evidence about the presence of the infamous Carrier IQ Software in Italy. Today another episode (I presume…

Continue Reading Again On The Carrier IQ Saga

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:9 mins read

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue Reading The Dangerous Liaisons (Updated)