Other troubles for system administrators: March is confirming the 2013 dangerous trend with several high profile breaches against industrial, financial and governmental targets.
The first two weeks of March have begun with the breach to Evernote, and continued with (among the others) the third phase of the infamous Operation Ababil, targeting U.S. Banks and an alleged Chinese attack against the Reserve Bank of Australia.
Additional noticeable events include a wave of DDoS attacks against several Czech Republic’s targets (belonging to media, news and financial sector), a breach suffered by the NIST Vulnerability Database (unfortunately not an isolated example of the attacks against US governmental targets happened in these two weeks) and also the leak of 20,000 records from an Avast! German distributor.
Last but not least, the examined period has also confirmed the role of Twitter as the new mean to make resounding attacks against single individuals or organizations. Qatar Foundation, Saudi Aramco, and France 24 are only several of the organizations fallen victims of accounts hijacking.
Of course, these are only the main events, feel free to scroll down the list to analyze in detail what happened in these two weeks.
If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).
Once again, a special thanks to Kim Guldberg AKA @bufferzone for continuously advising me about significant cyber events through the Submit Form! Much Appreciated!
- 878,558 hits since November 2010
08/13/2011 - My Post on Android Malware Mentioned on Engadget.
04/14/2011 - The Article Smart Grid: L'ultima Frontiera del Cybercrime published on ICT Security Magazine May 2011.
03/14/2011 - Security Summit 2011: Paolo Passeri guest at Round Table "Mobile Security: Rischi, Tecnologie, Mercato"
02/14/2011 - The Article Gears of Cyberwar published on ICT Security Magazine January 2011.
About This Blog
In this blog I express my personal opinion, which does not necessarily reflects the opinion of my organization, about events and news or interest, concerning information security, winking to mobile world and, why not, to some curious personal event.
Every information is reported with its source.
Anyone intending to use information contained in my post is free to do so, provided that mention my blog in your article.
Top Posts & Pages
- 1-15 August 2014 Cyber Attacks Timeline
- List Of Hacked Celebrities Who Had (Nude) Photos Leaked
- 2012 Cyber Attacks Statistics
- 2014 Cyber Attacks Timeline Master Index
- 2013 Cyber Attacks Statistics
- A (Graphical) World of Botnets and Cyber Attacks
- 1-15 June 2014 Cyber Attacks Timeline
- 2013 Cyber Attacks Statistics (Summary)
- July 2014 Cyber Attacks Statistics
- About Me
- 1-15 August 2014 Cyber Attacks Timeline wp.me/p14J6X-2DG - 1 day ago
- Europe's new data laws: how many cloud vendors would comply? Only one cloud provider in 100 study finds. zdnet.com/europes-new-da… - 3 days ago
- RT @helpnetsecurity: A look at advanced targeted attacks through the lens of a human-rights NGO - bit.ly/1nNAt5s - 6 days ago
- New study: Activists pose easy target for nation-state attackers ars.to/1uLbZ2C - 1 week ago
- A Look at Advanced Targeted Attacks Through the Lense of a Human-Rights NGO, World Uyghur Congress labs.lastline.com/a-look-at-adva… - 1 week ago
- July 2014 Cyber Attacks Statistics wp.me/p14J6X-2Dm - 1 week ago
- @jmsahr @ericdknapp @icsisac THX 4 jumping into the fray! If helpful I tried in the past.. 2 much time Xpensive 4 me! paulsparrows.files.wordpress.com/2012/03/infogr… - 1 week ago
- RT @lastlineinc: At @BlackHatEvents? Stop by booth #256 to meet our team! http://t.co/kMX0x2kb1Y - 1 week ago
- Now and then Outlook for Mac hides inexplicably and irreversibly some messages (using gmail with IMAP). Falling back to @Postbox mode! - 1 week ago
- RT @raistolo: Standing room only and packed room for @lastlineinc 's Chris Kruegel speaking on emulation for dynamic malware analysis - 1 week ago