Two Weeks Living Dangerously! I have no other words to describe this second half of January (first two weeks here) that has shown an unprecedented level of attacks! And if a good day starts with the morning, this will be a very troubled year from an information security perspective.
Not only the peaks of DDoS attacks against the US Banks have reached an unstoppable peak, but, most of all, at the end of the month details have been unveiled about a massive cyber-espionage campaign allegedly orchestrated by Chinese hackers against some major US media including The New York Times, The Wall Street Journal, The Washington Post and Bloomberg News.
A very very long list of targets this month, with some high profile victims such as the U.S. Sentencing Commission, whose web site has been hacked twice and turned into an Asteroid game, but also Renault Argentina that suffered 37,000 accounts leaked.
To summarize this month is really impossible, you just have to scroll down the timeline to realize the hacking spree in this January 2013.
If this trend continues, I will have to decrease the frequency of publication…
If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts). To do so, you can use this form.
- 649,752 hits since November 2010
08/13/2011 - My Post on Android Malware Mentioned on Engadget.
04/14/2011 - The Article Smart Grid: L'ultima Frontiera del Cybercrime published on ICT Security Magazine May 2011.
03/14/2011 - Security Summit 2011: Paolo Passeri guest at Round Table "Mobile Security: Rischi, Tecnologie, Mercato"
02/14/2011 - The Article Gears of Cyberwar published on ICT Security Magazine January 2011.
About This Blog
In this blog I express my personal opinion, which does not necessarily reflects the opinion of my organization, about events and news or interest, concerning information security, winking to mobile world and, why not, to some curious personal event.
Every information is reported with its source.
Anyone intending to use information contained in my post is free to do so, provided that mention my blog in your article.
Top Posts & Pages
- List Of Hacked Celebrities Who Had (Nude) Photos Leaked
- 1-15 December 2013 Cyber Attacks Timeline
- 2012 Cyber Attacks Statistics
- 2013 Cyber Attacks Statistics
- 2013 Cyber Attacks Timeline Master Index
- A (Graphical) World of Botnets and Cyber Attacks
- August 2013 Cyber Attacks Statistics
- November 2013 Cyber Attacks Statistics
- One Year Of Android Malware (Full List)
- About Me
- Hackers break into Washington Post servers for third time in three years ars.to/1fo7raO - 1 day ago
- 1-15 December 2013 Cyber Attacks Timeline wp.me/p14J6X-2uo - 4 days ago
- Bots now running the Internet with 61 percent of Web traffic cnet.co/1h4RaZm via @CNET - 1 week ago
- November 2013 Cyber Attacks Statistics wp.me/p14J6X-2u5 - 1 week ago
- RT @tvcutsem: Best explanation I read so far on why Bitcoin has value reddit.com/r/Bitcoin/comm… - 1 week ago
- Hack on JPMorgan website exposes data for 465,000 card holders ars.to/IKUpsG - 2 weeks ago
- 16-30 November 2013 Cyber Attacks Timeline wp.me/p14J6X-2tY - 2 weeks ago
- 1-15 November 2013 Cyber Attacks Timeline wp.me/p14J6X-2tO - 3 weeks ago
- RT @Accumuli_Sec: Accumuli signs partnership with @Lastlineinc and announces availability of integration suite into #SIEM platforms http://… - 1 month ago
- October 2013 Cyber Attacks Statistics wp.me/p14J6X-2tw - 1 month ago