Thursday, July 16, 2020
07:17 AM (GMT +5)

Go Back   CSS Forums > Off Topic Section > Computers and Technology

Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies.

Reply Share Thread: Submit Thread to Facebook Facebook     Submit Thread to Twitter Twitter     Submit Thread to Google+ Google+    
LinkBack Thread Tools Search this Thread
Old Saturday, August 22, 2009
Waseemtabish's Avatar
Senior Member
Join Date: Oct 2006
Location: Bhakkar
Posts: 646
Thanks: 735
Thanked 702 Times in 333 Posts
Waseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the roughWaseemtabish is a jewel in the rough
Default Top 10 hacking incidents

Top 10 hacking incidents of all time instances where some of the

most seemingly secure computer networks were compromised

Early 1990s

Kevin Mitnick, often incorrectly called by many as god of hackers,
broke into the computer systems of the world's top technology and
telecommunications companies Nokia, Fujitsu, Motorola, and Sun
Microsystems. He was arrested by the FBI in 1995, but later released
on parole in 2000. He never termed his activity hacking, instead he
called it social engineering.

November 2002

Englishman Gary McKinnon was arrested in November 2002 following an
accusation that he hacked into more than 90 US military computer
systems in the UK. He is currently undergoing trial in a British court
for a "fast-track extradition" to the US where he is a wanted man. The
next hearing in the case is slated for today.


Russian computer geek Vladimir Levin effected what can easily be
called The Italian Job online - he was the first person to hack into a
bank to extract money. Early 1995, he hacked into Citibank and robbed
$10 million. Interpol arrested him in the UK in 1995, after he had
transferred money to his accounts in the US, Finland, Holland, Germany
and Israel.


When a Los Angeles area radio station announced a contest that awarded
a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of
the entire city's telephone network, ensured he is the 102nd caller,
and took away the Porsche beauty. He was arrested later that year and
sentenced to three years in prison. He is currently a senior editor at
Wired News.


Kevin Poulsen again. A little-known incident when Poulsen, then just a
student, hacked into Arpanet, the precursor to the Internet was hacked
into. Arpanet was a global network of computers, and Poulsen took
advantage of a loophole in its architecture to gain temporary control
of the US-wide network.


US hacker Timothy Lloyd planted six lines of malicious software code
in the computer network of Omega Engineering which was a prime
supplier of components for NASA and the US Navy. The code allowed a
"logic bomb" to explode that deleted software running Omega's
manufacturing operations. Omega lost $10 million due to the attack.


Twenty-three-year-old Cornell University graduate Robert Morris
unleashed the first Internet worm on to the world. Morris released 99
lines of code to the internet as an experiment, but realised that his
program infected machines as it went along. Computers crashed across
the US and elsewhere. He was arrested and sentenced in 1990.


The Melissa virus was the first of its kind to wreak damage on a
global scale. Written by David Smith (then 30), Melissa spread to more
than 300 companies across the world completely destroying their
computer networks. Damages reported amounted to nearly $400 million.
Smith was arrested and sentenced to five years in prison.


MafiaBoy, whose real identity has been kept under wraps because he is
a minor, hacked into some of the largest sites in the world, including
eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000.
He gained access to 75 computers in 52 networks, and ordered a Denial
of Service attack on them. He was arrested in 2000.


They called themselves Masters of Deception, targeting US phone
systems. The group hacked into the National Security Agency, AT&T, and
Bank of America. It created a system that let them bypass
long-distance phone call systems, and gain access to private lines.
~It is possible to fail in many ways...while to succeed is possible only in one way.~

Last edited by Viceroy; Saturday, August 22, 2009 at 10:31 PM.
Reply With Quote
The Following 2 Users Say Thank You to Waseemtabish For This Useful Post:
ambren_kanval (Wednesday, September 02, 2009), khanzada_111 (Wednesday, September 02, 2009)

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On

Similar Threads
Thread Thread Starter Forum Replies Last Post
development of pakistan press since 1947 Janeeta Journalism & Mass Communication 16 Tuesday, May 05, 2020 03:04 AM
Dr. Hasan Askari Rizvi's articles shallowwater News & Articles 42 Saturday, December 18, 2010 04:13 PM
All about Suicidal Bombing Sureshlasi News & Articles 5 Saturday, September 20, 2008 03:54 PM
Aristotle's plot Last Island English Literature 0 Friday, June 24, 2005 06:42 PM

CSS Forum on Facebook Follow CSS Forum on Twitter

Disclaimer: All messages made available as part of this discussion group (including any bulletin boards and chat rooms) and any opinions, advice, statements or other information contained in any messages posted or transmitted by any third party are the responsibility of the author of that message and not of (unless is specifically identified as the author of the message). The fact that a particular message is posted on or transmitted using this web site does not mean that CSSForum has endorsed that message in any way or verified the accuracy, completeness or usefulness of any message. We encourage visitors to the forum to report any objectionable message in site feedback. This forum is not monitored 24/7.

Sponsors: ArgusVision   vBulletin, Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.