Digital Dangers: A Brief History of Computer Security Threats

By   ISBuzz Team
Writer , Information Security Buzz | Sep 22, 2014 05:05 pm PST

The headlines offer up a grim picture: major corporations getting hacked, revealing personal information about tens of millions of customers; bugs exploited in millions of servers; foreign nations spying on others by stealing passwords and email addresses. It’s enough to cause more than a few headaches. Security threats are nothing new, but these days they appear to be causing far more damage than ever before. While the methods have changed, attackers still aim to cause as much damage as possible. A look at a brief history of computer security threats shows the evolution of the risks and hazards.

Phone Hackings

The first security threats were actually created before personal computers were a common household item. Decades ago, criminals often looked to tap into phone systems. Starting in the 1960s, AT&T decided to closely monitor calls in order to catch “phone freaks.” These “phreakers,” as they were called, used “blue boxes” to generate the right tone to get free calls. This surveillance eventually led to 200 convictions. Not long after, a man named John Draper found a way to duplicate a tone using a blue box and a toy whistle found in Cap’n Crunch cereal. The tone was used to unlock the AT&T network. As serious as these threats were, the focus on phone networks would soon pave the way for greater risks to computers.

Free Download: Is An Outright Ban On Workplace Social Networking A Good Idea?

Computer Threats

Viruses and worms were the next big cyber culprits, though they were at first harmless. For example, the first worm was developed in 1979 at a Xerox research station; its goal was to actually help make more efficient computers. Later on, hackers took the worms, modified them, and began using them to destroy or alter data. Eventually, the first PC virus named “Brain” was developed in 1986, but it was not destructive in nature. In fact, the men behind it actually included their names and contact information buried within the code. More harmful viruses eventually followed, including “Form” and “Michelangelo.” Self-modifying viruses were first created in 1990, but rapid infection rates didn’t take off until several years later.

Rise of the Hackers

Starting in 1995, viruses were spreading at an alarming pace, starting with the first Microsoft Word-based virus. Eventually, hackers took centerstage. In 1998, an incident known as “Solar Sunrise” occurred, where teenage hackers gained control of hundreds of computer systems used by the military, government, and private sectors. Two years later, other hackers used distributed denial of service (DDOS) attacks to shut down Yahoo, eBay, Amazon and others. In 2001, the Code Red worm was unleashed, infecting tens of thousands of systems and causing around $2 billion in damage. The harm brought about by hacking was becoming very costly.

Increase in Infections

More viruses continued to spread over the following years. In 2006, up to one million computers were infected with the Nyxem virus, which was spread through email attachments. The Storm Worm virus accounted for 8% of all infections only three days after it was released. Other worms and viruses quickly spread–the Koobface virus (spread through email and social media), the Conficker worm (millions infected), and the Stuxnet virus (in development for ten years).

Millions Infected, Billions Lost

Problems continued to spread all over the world. The Heartbleed bug was discovered in 2012, giving attackers access to passwords, communications, and sensitive data. Millions of servers were infected due to this bug. In 2013, hackers were able to infiltrate Target’s servers, stealing the personal information of 70 million customers. The cost of the data breach is estimated to be more than $200 million. A few months later, 81 million Yahoo email customers became the victims of cyber criminals. Auction site eBay was likewise hit with a breach, forcing the company to advise its 145 million customers to change their passwords. More recently, Home Depot reported a breach that may end up being the largest computer network breach that a retail company has ever experienced.

It’s now a common sight to see a business report a large data breach. According to some of the latest statistics, more than 200 new viruses are being discovered every month worldwide. For this reason, businesses are making security a higher priority, whether it be computer, IT, or network security. With so much sensitive data now going onto the internet, customers are also urged to use more caution and take preventative measures to secure their information. As this look at the history of computer security threats shows, the need to protect against these risks is greater than ever.

By Rick Delgado | @ricknotdelgado

Rick_DelgadoBio: Rick is blessed to have a successful career and has recently taken a step back to pursue his passion for writing. He loves to write about new technologies and how they can help us and our planet in particular. Rick occasionally writes for several tech companies, including Dell. His articles are always industry-neutral.

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

0
Would love your thoughts, please comment.x
()
x