1-16 February 2013 Cyber Attacks Timeline

Here is the summary of the Cyber Attacks Timeline for February. A month that will probably be remembered for the “sophisticated” cyber attacks to the two main social networks: Facebook and Twitter.

But the attacks against the two major social networks were not the only remarkable events of this period. Other governmental and industrial high-profile targets have fallen under the blows of (state-sponsored) cyber criminals: the list of the governmental targets is led by the U.S. Department of Energy and the Japan Ministry of Foreign Affairs, while Bit9, a primary security firm, was also targeted, leading the chart of Industrial targets.

Hacktivists have raised the bar and breached the Federal Reserve, leaking the details of 4,000 U.S. Banks executives. Similarly, the Bush family was also targeted, suffering the leak of private emails.

Even if the list is not as long as the one of January, it includes other important targets, so, scroll it down to have an idea of how fragile our data are inside the cyberspace. Also have a look at the timelines of the main Cyber Attacks in 2011, 20122013, and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts). To do so, you can use this form.1-16-february-2013-cyber-attacks-timeline1

(more…)

Continue Reading 1-16 February 2013 Cyber Attacks Timeline

January 2012 Cyber Attacks Timeline (Part 1)

Click here for part 2.

New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012 with the chart of the attacks occurred in the first fifteen days of January. This month has been characterized so far by the leak of Symantec Source Code and the strange story of alleged Cyber Espionage revolving around it. But this was not the only remarkable event: chronicles tell the endless Cyber-war between Israel and a Saudi Hacker (and more in general the Arab World), but also a revamped activity of the Anonymous against SOPA (with peak in Finland). The end of the month has also reserved several remarkable events (such as the breaches to T-Mobile and Zappos, the latter affecting potentially 24,000,000 of users). In general this has been a very active period. For 2012 this is only the beginning, and if a good beginning makes a good ending, there is little to be quiet…

Browse the chart and follows @paulsparrows to be updated on a biweekly basis. As usual after the jump you will find all the references. Feel free to report wrong/missing links or attacks.

(more…)

Continue Reading January 2012 Cyber Attacks Timeline (Part 1)

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:9 mins read

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue Reading The Dangerous Liaisons (Updated)

L’Androide In Vetta (Ma Perde i Pezzi)

  • Post author:
  • Post last modified:March 5, 2011
  • Post category:Mobile
  • Post comments:2 Comments
  • Reading time:2 mins read

Nuovi dati di Nielsen confermano la corsa dell'Androide, che nel ricco mercato Americano si conferma la prima piattaforma per diffusione…

Continue Reading L’Androide In Vetta (Ma Perde i Pezzi)

Nokia e Microsoft: Matrimonio Al Volo

  • Post author:
  • Post last modified:February 11, 2011
  • Post category:Mobile
  • Post comments:3 Comments
  • Reading time:3 mins read

E alla fine il gran giorno è arrivato: il fatidico #feb11 si è concretizzato, e in un tranquillo venerdì di…

Continue Reading Nokia e Microsoft: Matrimonio Al Volo

Due Tacchini Non Fanno Un’Aquila

  • Post author:
  • Post last modified:February 9, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:5 mins read

Con questa perentoria battuta, Vic Gundotra, Vice-President di Google (ironia della sorte Ex Manager di Microsoft), ha commentato le presunte…

Continue Reading Due Tacchini Non Fanno Un’Aquila