SlideShare ist ein Scribd-Unternehmen logo
1 von 10
 Cyber warfare seems to be dominating headlines as of late. Be it a clandestine groups
hacking computers for ‘fun’ or alleged government agencies attempting to steal
classified information, the Internet landscape has been transformed into a binary
battlefield.
Who needs a gun when you have a keyboard?
With many of us unlikely to join in on the action, ARN has assembled a list the most
notorious cyber attacks in history.o
o
o
o

Robert Tappan Morris and the Morris Worm (1988):
Creator of the first computer worm transmitted through the Internet, Morris, a student at
Cornell Univeristy in the USA, claimed it his progeny was not aimed to harm but was
made for the innocuous intent to determine the vastness of the cyberspace.
Things went pear-shaped when a the worm encountered a critical error and morphed
into a virus which replicated rapidly and began infecting other computers resulting in
denial of service. The damage? 6000 computers were reportedly affected causing an
estimated $10-$100 million dollars in repair bills.
While this event could be pinned as being an unfortunate accident, it no doubt played a
part in inspiring the calamitous distributed denial-of-service (DdoS) type of attacks we
see today.
o
o
o
o

MafiaBoy causes $1 billion dollars in damages (2000):
Another 15 year old that caused mischief in cyber space was Michael Calce a.k.a.
MafiaBoy.
In 2000, Calce, now 25, was just a Canadian high school student when decided to
unleash a DDoS attack on a number of high-profile commercial websites including
Amazon, CNN, eBay and Yahoo!.An industry expert estimated the attacks resulted in a
$US1.2 billion dollar damage bill.
He was later apprehended. Because he was still a juvenile, Calce was sentenced in
2001 to eight months in open custody, meaning his movements and actions would be
restricted. His online access was also limited by the court.
Calce and since scored gigs as a columnist and recently published a book about his
ordeal.
o
o
o
o

Google China hit by cyber attack (2009):
When Google's Chinese headquarters detected a security breech in mid-December, it
opened up a whole can of worms (pun intended) implicating the Chinese Government.
Hackers had gained access to several Google’s corporate servers and intellectual
property was stolen.
In a blog, Google said it has “evidence to suggest that a primary goal of the attackers
was accessing the Gmail accounts of Chinse human rights activists”. As the company
dug deeper, they found numerous Gmail of users from US, China and Europe had been
routinely been accessed without permission. Those emails belonged to advocates of
human rights in China.
All eyes darted towards the Chinse Government, which has been accused of flagrantly
disregarding human rights for years.
Google entered the Chinese market with www.google.cn in 2006 and capitulated to
China’s stringent Internet censorship regime. The cyber attacks in December 2009
resulted in the company’s re-evaluation of its business in the country.
In March 2010, Google relocated its servers for google.cn to Hong Kong in order to
escape China’s Internet filtering policy.
o
o
o
o

Teen hacks NASA and US Defense Department:
The year was 1999. Jonathan James was 15 at the time but what he did that year
secured him a place in the hacker’s hall of fame.
James had managed to penetrate the computers of a US Department of Defense
divison and installed a ‘backdoor’ on its servers. This allowed him to intercept
thousands of internal emails from different government organisations including ones
containing usernames and passwords for various military computers.
Using the stolen information, James was able to steal a piece of NASA software which
cost the space exploration agency $41,000 as systems were shutdown for three weeks.
According to NASA, “the software [purported to be worth $1.7 million] supported the
International Space Station’s physical environment, including control of the temperature
and humidity within the living space.”
James was later caught but received a light sentence due to his young age.
He committed suicide in 2008 after he was accused of conspiring with other hackers to
steal credit card information. James denied the allegation in his suicide letter.
o
o
o

Phone lines blocked to win Porsche (1995)
Kevin Poulsen is famous for his work in hacking into the Los Angeles phone system in a
bid to win a Ferrari on a radio competiton.
LA KIIS FM was offering a Porsche 944 S2 to the 102th caller. Poulsen guaranteed his
success as he took control of the phone network and effectively blocked incoming calls
to the radio station’s number.
He won the Porsche but the law caught up to him and he was sentenced to five years in
prison.
Poulsen later became the senior editor for IT security publication, Wired News.
o
o
o
o

Hacker targets Scientology (2008):
In January 2008, a New Jersey teenager along with a gang of hackers launched a
DDoS attack that crippled the Church of Scientology website for several days.
The group is dubbed Annoymous and is staunchly against the ‘religion’.
Dmitriy Guzner, who was 19 years old, was charged and convicted for the DDoS attack.
The maximum penalty was 10 years prison and a $250,000 fine but he was ultimately
sentenced to two years probation and was ordered to pay the Church of Scientology
$37,500.
A second man has been charged for the attack.
o
o
o
o

Solar Sunrise (1998):
Originally thought to have been the efforts of Iraqi operatives, a systematic cyber attack
was launched in the US which seized control of over 500 government and private
computer systems. The hackers were exploiting computers running on the Sun Solaris
operating system, hence collective attacks were called ‘Solar Sunrise’.
The US Government assembled a number of defense divisions including the FBI and
the Defense Information Systems Agency to investigate the matter.
Much to everybody’s surprise, there were no Iraqi operatives involved in the hacking.
Investigations resulted in the arrest of three teenagers from California.
While it was cased closed for ‘Solar Sunrise’, the attacks highlighted how a co-ordinated
effort could affect an entire country’s IT infrastructure.
o
o
o
o

The Melissa virus (1999)
It was a very simple virus which ended up costing $80 million in damages.
The Melissa virus would infect Microsoft Word documents and automatically
disseminates itself as an attachment via email. It would mail out to the first 50 names
listed in an infected computer’s Outlook email address box.
The creator of Melissa, David Smith, said he did not intend for the virus to harm
computers but was still arrested and sentenced to 20 months in prison.
Incidentally, anti-virus software sales went gangbusters that year.
o
o
o
o

Internet attacked (2002):
In 2002, a cyber attack aimed squarely at all 13 domain name system’s root servers in
the US almost brought the Internet to its knees. It was a DDoS attack which lasted for
one hour. While it doesn’t some like a long time, it was the scale of the attack that was
most alarming.
At that time, US Federal authorities described the attack as the largest and most
complex in history.
Internet servers were severely strained for one hour although users probably didn’t
experience any adverse effects. But if the attacks lasted any longer, it would have
brought the Internet to a standstill.
o
o
o
o

Hacker steals tens of million of credit card details (2009):
t Gonzales, a hacker from Miami, was responsible for one of the biggest fraud case in
US history.
Gonzales was responsible for sealing tens of millions of credit card and debit card
numbers from over 250 financial institutions. He had hacked the payment card network
from companies including the 7-Eleven convenient store chain.
Facing at least three separate cases related to hacking in three states, Gonzales pled
guilty in December.
o

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ähnlich wie Top 10 Cyber Crimes in the World till now

Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxcowinhelen
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Case studies ii and cyber response.docx
Case studies ii and cyber response.docxCase studies ii and cyber response.docx
Case studies ii and cyber response.docxstirlingvwriters
 

Ähnlich wie Top 10 Cyber Crimes in the World till now (20)

Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Cyber war
Cyber warCyber war
Cyber war
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Case studies ii and cyber response.docx
Case studies ii and cyber response.docxCase studies ii and cyber response.docx
Case studies ii and cyber response.docx
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 

Mehr von Abdullah Khosa

Chanel and H&M Brand Comparison.pdf
Chanel and H&M Brand Comparison.pdfChanel and H&M Brand Comparison.pdf
Chanel and H&M Brand Comparison.pdfAbdullah Khosa
 
Policy directives of federal government of pakistan for Enterprise Architecture
Policy directives of federal government of pakistan for Enterprise ArchitecturePolicy directives of federal government of pakistan for Enterprise Architecture
Policy directives of federal government of pakistan for Enterprise ArchitectureAbdullah Khosa
 
Face to Face Communication and Text Based Communication in HCI
Face to Face Communication and Text Based Communication in HCIFace to Face Communication and Text Based Communication in HCI
Face to Face Communication and Text Based Communication in HCIAbdullah Khosa
 
Cloud Artificial Intelligence services
Cloud Artificial Intelligence servicesCloud Artificial Intelligence services
Cloud Artificial Intelligence servicesAbdullah Khosa
 
Digital centralization
Digital centralizationDigital centralization
Digital centralizationAbdullah Khosa
 
Diamond water-paradox (A Theory)
Diamond water-paradox (A Theory)Diamond water-paradox (A Theory)
Diamond water-paradox (A Theory)Abdullah Khosa
 
The 5th generation (5G)
The 5th generation (5G)The 5th generation (5G)
The 5th generation (5G)Abdullah Khosa
 
Report of database of list of Pakistan international cricket stadiums
Report of database of list of Pakistan international cricket stadiumsReport of database of list of Pakistan international cricket stadiums
Report of database of list of Pakistan international cricket stadiumsAbdullah Khosa
 
Database of list of Pakistan international cricket stadiums
Database of list of Pakistan international cricket stadiumsDatabase of list of Pakistan international cricket stadiums
Database of list of Pakistan international cricket stadiumsAbdullah Khosa
 
Benefits of Search engine optimization
Benefits of Search engine optimizationBenefits of Search engine optimization
Benefits of Search engine optimizationAbdullah Khosa
 
Physical Database Design & Performance
Physical Database Design & PerformancePhysical Database Design & Performance
Physical Database Design & PerformanceAbdullah Khosa
 
Advanced Normalization
Advanced NormalizationAdvanced Normalization
Advanced NormalizationAbdullah Khosa
 
Relational Algebra & Calculus
Relational Algebra & CalculusRelational Algebra & Calculus
Relational Algebra & CalculusAbdullah Khosa
 
Advance database system(part 8)
Advance database system(part 8)Advance database system(part 8)
Advance database system(part 8)Abdullah Khosa
 
Advance database system(part 7)
Advance database system(part 7)Advance database system(part 7)
Advance database system(part 7)Abdullah Khosa
 

Mehr von Abdullah Khosa (20)

Chanel and H&M Brand Comparison.pdf
Chanel and H&M Brand Comparison.pdfChanel and H&M Brand Comparison.pdf
Chanel and H&M Brand Comparison.pdf
 
Mycin presentation
Mycin presentationMycin presentation
Mycin presentation
 
Policy directives of federal government of pakistan for Enterprise Architecture
Policy directives of federal government of pakistan for Enterprise ArchitecturePolicy directives of federal government of pakistan for Enterprise Architecture
Policy directives of federal government of pakistan for Enterprise Architecture
 
Face to Face Communication and Text Based Communication in HCI
Face to Face Communication and Text Based Communication in HCIFace to Face Communication and Text Based Communication in HCI
Face to Face Communication and Text Based Communication in HCI
 
STRATEGIC PAY PLANS
STRATEGIC PAY PLANSSTRATEGIC PAY PLANS
STRATEGIC PAY PLANS
 
AI services in google
AI services in googleAI services in google
AI services in google
 
Cloud Artificial Intelligence services
Cloud Artificial Intelligence servicesCloud Artificial Intelligence services
Cloud Artificial Intelligence services
 
Digital centralization
Digital centralizationDigital centralization
Digital centralization
 
Diamond water-paradox (A Theory)
Diamond water-paradox (A Theory)Diamond water-paradox (A Theory)
Diamond water-paradox (A Theory)
 
The 5th generation (5G)
The 5th generation (5G)The 5th generation (5G)
The 5th generation (5G)
 
Report of database of list of Pakistan international cricket stadiums
Report of database of list of Pakistan international cricket stadiumsReport of database of list of Pakistan international cricket stadiums
Report of database of list of Pakistan international cricket stadiums
 
Database of list of Pakistan international cricket stadiums
Database of list of Pakistan international cricket stadiumsDatabase of list of Pakistan international cricket stadiums
Database of list of Pakistan international cricket stadiums
 
Attitude and behavior
Attitude and behaviorAttitude and behavior
Attitude and behavior
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Benefits of Search engine optimization
Benefits of Search engine optimizationBenefits of Search engine optimization
Benefits of Search engine optimization
 
Physical Database Design & Performance
Physical Database Design & PerformancePhysical Database Design & Performance
Physical Database Design & Performance
 
Advanced Normalization
Advanced NormalizationAdvanced Normalization
Advanced Normalization
 
Relational Algebra & Calculus
Relational Algebra & CalculusRelational Algebra & Calculus
Relational Algebra & Calculus
 
Advance database system(part 8)
Advance database system(part 8)Advance database system(part 8)
Advance database system(part 8)
 
Advance database system(part 7)
Advance database system(part 7)Advance database system(part 7)
Advance database system(part 7)
 

Kürzlich hochgeladen

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Kürzlich hochgeladen (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

Top 10 Cyber Crimes in the World till now

  • 1.  Cyber warfare seems to be dominating headlines as of late. Be it a clandestine groups hacking computers for ‘fun’ or alleged government agencies attempting to steal classified information, the Internet landscape has been transformed into a binary battlefield. Who needs a gun when you have a keyboard? With many of us unlikely to join in on the action, ARN has assembled a list the most notorious cyber attacks in history.o o o o  Robert Tappan Morris and the Morris Worm (1988): Creator of the first computer worm transmitted through the Internet, Morris, a student at Cornell Univeristy in the USA, claimed it his progeny was not aimed to harm but was
  • 2. made for the innocuous intent to determine the vastness of the cyberspace. Things went pear-shaped when a the worm encountered a critical error and morphed into a virus which replicated rapidly and began infecting other computers resulting in denial of service. The damage? 6000 computers were reportedly affected causing an estimated $10-$100 million dollars in repair bills. While this event could be pinned as being an unfortunate accident, it no doubt played a part in inspiring the calamitous distributed denial-of-service (DdoS) type of attacks we see today. o o o o  MafiaBoy causes $1 billion dollars in damages (2000): Another 15 year old that caused mischief in cyber space was Michael Calce a.k.a. MafiaBoy. In 2000, Calce, now 25, was just a Canadian high school student when decided to unleash a DDoS attack on a number of high-profile commercial websites including Amazon, CNN, eBay and Yahoo!.An industry expert estimated the attacks resulted in a $US1.2 billion dollar damage bill. He was later apprehended. Because he was still a juvenile, Calce was sentenced in 2001 to eight months in open custody, meaning his movements and actions would be
  • 3. restricted. His online access was also limited by the court. Calce and since scored gigs as a columnist and recently published a book about his ordeal. o o o o  Google China hit by cyber attack (2009): When Google's Chinese headquarters detected a security breech in mid-December, it opened up a whole can of worms (pun intended) implicating the Chinese Government. Hackers had gained access to several Google’s corporate servers and intellectual property was stolen. In a blog, Google said it has “evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinse human rights activists”. As the company dug deeper, they found numerous Gmail of users from US, China and Europe had been routinely been accessed without permission. Those emails belonged to advocates of human rights in China. All eyes darted towards the Chinse Government, which has been accused of flagrantly disregarding human rights for years. Google entered the Chinese market with www.google.cn in 2006 and capitulated to China’s stringent Internet censorship regime. The cyber attacks in December 2009
  • 4. resulted in the company’s re-evaluation of its business in the country. In March 2010, Google relocated its servers for google.cn to Hong Kong in order to escape China’s Internet filtering policy. o o o o  Teen hacks NASA and US Defense Department: The year was 1999. Jonathan James was 15 at the time but what he did that year secured him a place in the hacker’s hall of fame. James had managed to penetrate the computers of a US Department of Defense divison and installed a ‘backdoor’ on its servers. This allowed him to intercept thousands of internal emails from different government organisations including ones containing usernames and passwords for various military computers. Using the stolen information, James was able to steal a piece of NASA software which cost the space exploration agency $41,000 as systems were shutdown for three weeks. According to NASA, “the software [purported to be worth $1.7 million] supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” James was later caught but received a light sentence due to his young age. He committed suicide in 2008 after he was accused of conspiring with other hackers to steal credit card information. James denied the allegation in his suicide letter.
  • 5. o o o  Phone lines blocked to win Porsche (1995) Kevin Poulsen is famous for his work in hacking into the Los Angeles phone system in a bid to win a Ferrari on a radio competiton. LA KIIS FM was offering a Porsche 944 S2 to the 102th caller. Poulsen guaranteed his success as he took control of the phone network and effectively blocked incoming calls to the radio station’s number. He won the Porsche but the law caught up to him and he was sentenced to five years in prison. Poulsen later became the senior editor for IT security publication, Wired News. o o o o
  • 6.  Hacker targets Scientology (2008): In January 2008, a New Jersey teenager along with a gang of hackers launched a DDoS attack that crippled the Church of Scientology website for several days. The group is dubbed Annoymous and is staunchly against the ‘religion’. Dmitriy Guzner, who was 19 years old, was charged and convicted for the DDoS attack. The maximum penalty was 10 years prison and a $250,000 fine but he was ultimately sentenced to two years probation and was ordered to pay the Church of Scientology $37,500. A second man has been charged for the attack. o o o o
  • 7.  Solar Sunrise (1998): Originally thought to have been the efforts of Iraqi operatives, a systematic cyber attack was launched in the US which seized control of over 500 government and private computer systems. The hackers were exploiting computers running on the Sun Solaris operating system, hence collective attacks were called ‘Solar Sunrise’. The US Government assembled a number of defense divisions including the FBI and the Defense Information Systems Agency to investigate the matter. Much to everybody’s surprise, there were no Iraqi operatives involved in the hacking. Investigations resulted in the arrest of three teenagers from California. While it was cased closed for ‘Solar Sunrise’, the attacks highlighted how a co-ordinated effort could affect an entire country’s IT infrastructure. o o o o
  • 8.  The Melissa virus (1999) It was a very simple virus which ended up costing $80 million in damages. The Melissa virus would infect Microsoft Word documents and automatically disseminates itself as an attachment via email. It would mail out to the first 50 names listed in an infected computer’s Outlook email address box. The creator of Melissa, David Smith, said he did not intend for the virus to harm computers but was still arrested and sentenced to 20 months in prison. Incidentally, anti-virus software sales went gangbusters that year. o o o o
  • 9.  Internet attacked (2002): In 2002, a cyber attack aimed squarely at all 13 domain name system’s root servers in the US almost brought the Internet to its knees. It was a DDoS attack which lasted for one hour. While it doesn’t some like a long time, it was the scale of the attack that was most alarming. At that time, US Federal authorities described the attack as the largest and most complex in history. Internet servers were severely strained for one hour although users probably didn’t experience any adverse effects. But if the attacks lasted any longer, it would have brought the Internet to a standstill. o o o o
  • 10.  Hacker steals tens of million of credit card details (2009): t Gonzales, a hacker from Miami, was responsible for one of the biggest fraud case in US history. Gonzales was responsible for sealing tens of millions of credit card and debit card numbers from over 250 financial institutions. He had hacked the payment card network from companies including the 7-Eleven convenient store chain. Facing at least three separate cases related to hacking in three states, Gonzales pled guilty in December. o