Posts
Re: Declined: [The Powers That Beat] Fwd: [Powers That Beat] Post chang... @ Wed Sep 13, 2017 4pm - 5pm
Re: Declined: [The Powers That Beat] Fwd: [Powers That Beat] Post chang... @ Wed Sep 13, 2017 4pm - 5pm
- Get link
- X
- Other Apps
2011 CyberAttacks Timeline Posted by Update June 29: 2011 Cyber Attacks
(and Cyber Costs) Timeline (Updated) I found this interesting graph
from an original Thomson Reuters post, showing the timeline of the
major 2011 CyberAttacks. The graph shows all the main Cyber Events of
this tremendous 2011 up to June, the 16th. Actually to be perfect it
should include also the infamous Epsilon Data Breach, happened on
March, the 30th. Probably it had a major impact on the U.S. rather than
in Europe, but it is clear that the aftermaths of this breach will last
for years in terms of spear-phishing attacks tarteting the affected
users. Moreover, to be “ultra perfect”, it shpould also include the
other attacks discovered against U.S. Defense Contractors (L-3 on
April, the 6th, and Northrop Grumman on May, the 26th) should be
considered as well. Even if some attacks are missing, the graph is
useful (and meaningful) to show the easiness with which our data are at
risk
2011 CyberAttacks Timeline Posted by Update June 29: 2011 Cyber Attacks
(and Cyber Costs) Timeline (Updated) I found this interesting graph
from an original Thomson Reuters post, showing the timeline of the
major 2011 CyberAttacks. The graph shows all the main Cyber Events of
this tremendous 2011 up to June, the 16th. Actually to be perfect it
should include also the infamous Epsilon Data Breach, happened on
March, the 30th. Probably it had a major impact on the U.S. rather than
in Europe, but it is clear that the aftermaths of this breach will last
for years in terms of spear-phishing attacks tarteting the affected
users. Moreover, to be “ultra perfect”, it shpould also include the
other attacks discovered against U.S. Defense Contractors (L-3 on
April, the 6th, and Northrop Grumman on May, the 26th) should be
considered as well. Even if some attacks are missing, the graph is
useful (and meaningful) to show the easiness with which our data are at
risk
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps