SlideShare a Scribd company logo
1 of 13
Download to read offline
5 BIGGEST
CYBER
ATTACKS
And most famous hackers in the world
Roman Antonov 20 JAN 2021
No System Is Absolutely Safe
Any system can be hacked, even if it is banks or government
information system. Doesn't exist absolutely secure systems,
but have various of protections on different levels, which
interrupt hackers attacks.
No Users is Absolutely anonymous
Sooner or later, attackers will be catched by their traces.
Hacker skills can postpone this event, but not absolutely
avoid.
Facts that you must know
Security hacker
Though the term "hacker" has become associated in
popular culture with a "security hacker" – someone
who utilizes their technical know-how of bugs or
exploits to break into computer systems and access
data which would otherwise be unavailable to them
– hacking can also be utilized by legitimate figures in
legal situations.
Hacker
A computer hacker is a computer expert who uses
their technical knowledge to achieve a goal or
overcome an obstacle, within a computerized
system by non-standard means.
MONEY IS NOT ALWAYS MAIN
HACKERS MOTIVATION
First, there is a criminal financial gain to be had when hacking systems with the
specific purpose of stealing credit card numbers or manipulating banking systems.
Second, many hackers increasing their reputation within the hacker subculture.
Third, information on products or services that can be stolen or used as leverage
within the marketplace.
And fourth, state-sponsored attacks provide nation states within political games.
WORLD MOST FAMOUS HACKERS
Kevin Mitnick
World's most famous hacker, global bestselling author, and
the top cybersecurity keynote speaker
Jonathan James
James hacked NASA's network and downloaded enough source
code (assets equaling $1.7 million at the time) to learn how the
International Space Station worked.
Anonymous
Anonymous got its start in 2003 on 4chan message boards in an
unnamed forum. The group exhibits little organization and is loosely
focused on the concept of social justice.
WORLD MOST FAMOUS HACKERS
Albert Gonzalez
American computer hacker and computer criminal who is
accused of masterminding the combined credit card theft and
subsequent reselling of more than 170 million card and ATM
numbers from 2005 to 2007: the biggest such fraud in history.
TOP 5 CYBER ATTACKS
"Teen hacks NASA and US Defense Department"
"Morris Worm"
"Twitter hack: 130 accounts targeted in attack"
"MafiaBoy causes $1 billion dollars"
"The South Korean nightmare"
#1 Morris Worm
The Morris Worm was a self-replicating
computer program (worm) written by Robert
Tappan Morris, a student at Cornell University,
and released from MIT on November 2, 1988
Before spreading to a new machine, the Morris Worm
checked if the machine had already been infected and
was running a Morris Worm process. If a target machine
had already been infected, the Morris Worm would re-
infect it 1 in 7 times.
Morris receiving a sentence of three years in prison, 400
hours of community service and a $10,000 fine.
#2 Teen hacks NASA and
US Defense Department
Jonathan James was 15 at the time but what he did that
year secured him a place in the hacker’s hall of fame.
James had managed to penetrate the computers of a US Department of
Defense divison and installed a ‘backdoor’ on its servers.
This allowed him to intercept thousands of emails from government
organisations including ones containing usernames and passwords for
military computers. James steal a piece of NASA software which cost the
space agency $41,000 as systems were shutdown for three weeks.
He committed suicide in 2008 after he was accused of conspiring with
other hackers to steal credit card information
On 15 July, a number of Bitcoin-related accounts began
tweeting what appeared to be a simple Bitcoin scam,
promising to "give back" to the community by doubling
any Bitcoin sent to their address.
The security breach saw accounts including those of
Barack Obama, Elon Musk, Kanye West and Bill Gates
tweet a Bitcoin scam to millions of followers.
Despite the fact that the scam was obvious to some, the
attackers received hundreds of transfers, worth more
than $100,000 (£80,000).
#3 Twitter hack
Another 15 year old that caused mischief in
cyber space was Michael Calce a.k.a. MafiaBoy.
In 2000, Calce, was just a Canadian high school
student when decided to unleash a DDoS attack
on a number of high-profile commercial
websites including Amazon, CNN, eBay and
Yahoo!.An industry expert estimated the attacks
resulted in a $US1.2 billion dollar damage bill.
#4 MafiaBoy causes
$1 billion dollars
The South Koreans learned in January 2014 that data
from 100 million credit cards had been stolen over the
course of several years. In addition, 20 million bank
accounts had also been hacked.
Hacker stole personal information from customers of
credit card companies when he worked for them as a
consultant by simply copying the data to an external
hard drive. He then resold the data to credit traders
and telemarketing companies.
#5 The South Korean
nightmare
BE SAFE :)
Roman Antonov Wisdom of Living

More Related Content

What's hot (20)

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Rootkit
RootkitRootkit
Rootkit
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
HACKING
HACKINGHACKING
HACKING
 
Computer security
Computer securityComputer security
Computer security
 
Ransomware
Ransomware Ransomware
Ransomware
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Password Security
Password SecurityPassword Security
Password Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 

Similar to 5 biggest cyber attacks and most famous hackers

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Hacking
HackingHacking
HackingVirus
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 

Similar to 5 biggest cyber attacks and most famous hackers (20)

Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Unit 1
Unit 1Unit 1
Unit 1
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Malwares
MalwaresMalwares
Malwares
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

5 biggest cyber attacks and most famous hackers

  • 1. 5 BIGGEST CYBER ATTACKS And most famous hackers in the world Roman Antonov 20 JAN 2021
  • 2. No System Is Absolutely Safe Any system can be hacked, even if it is banks or government information system. Doesn't exist absolutely secure systems, but have various of protections on different levels, which interrupt hackers attacks. No Users is Absolutely anonymous Sooner or later, attackers will be catched by their traces. Hacker skills can postpone this event, but not absolutely avoid. Facts that you must know
  • 3. Security hacker Though the term "hacker" has become associated in popular culture with a "security hacker" – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. Hacker A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
  • 4. MONEY IS NOT ALWAYS MAIN HACKERS MOTIVATION First, there is a criminal financial gain to be had when hacking systems with the specific purpose of stealing credit card numbers or manipulating banking systems. Second, many hackers increasing their reputation within the hacker subculture. Third, information on products or services that can be stolen or used as leverage within the marketplace. And fourth, state-sponsored attacks provide nation states within political games.
  • 5. WORLD MOST FAMOUS HACKERS Kevin Mitnick World's most famous hacker, global bestselling author, and the top cybersecurity keynote speaker Jonathan James James hacked NASA's network and downloaded enough source code (assets equaling $1.7 million at the time) to learn how the International Space Station worked.
  • 6. Anonymous Anonymous got its start in 2003 on 4chan message boards in an unnamed forum. The group exhibits little organization and is loosely focused on the concept of social justice. WORLD MOST FAMOUS HACKERS Albert Gonzalez American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007: the biggest such fraud in history.
  • 7. TOP 5 CYBER ATTACKS "Teen hacks NASA and US Defense Department" "Morris Worm" "Twitter hack: 130 accounts targeted in attack" "MafiaBoy causes $1 billion dollars" "The South Korean nightmare"
  • 8. #1 Morris Worm The Morris Worm was a self-replicating computer program (worm) written by Robert Tappan Morris, a student at Cornell University, and released from MIT on November 2, 1988 Before spreading to a new machine, the Morris Worm checked if the machine had already been infected and was running a Morris Worm process. If a target machine had already been infected, the Morris Worm would re- infect it 1 in 7 times. Morris receiving a sentence of three years in prison, 400 hours of community service and a $10,000 fine.
  • 9. #2 Teen hacks NASA and US Defense Department Jonathan James was 15 at the time but what he did that year secured him a place in the hacker’s hall of fame. James had managed to penetrate the computers of a US Department of Defense divison and installed a ‘backdoor’ on its servers. This allowed him to intercept thousands of emails from government organisations including ones containing usernames and passwords for military computers. James steal a piece of NASA software which cost the space agency $41,000 as systems were shutdown for three weeks. He committed suicide in 2008 after he was accused of conspiring with other hackers to steal credit card information
  • 10. On 15 July, a number of Bitcoin-related accounts began tweeting what appeared to be a simple Bitcoin scam, promising to "give back" to the community by doubling any Bitcoin sent to their address. The security breach saw accounts including those of Barack Obama, Elon Musk, Kanye West and Bill Gates tweet a Bitcoin scam to millions of followers. Despite the fact that the scam was obvious to some, the attackers received hundreds of transfers, worth more than $100,000 (£80,000). #3 Twitter hack
  • 11. Another 15 year old that caused mischief in cyber space was Michael Calce a.k.a. MafiaBoy. In 2000, Calce, was just a Canadian high school student when decided to unleash a DDoS attack on a number of high-profile commercial websites including Amazon, CNN, eBay and Yahoo!.An industry expert estimated the attacks resulted in a $US1.2 billion dollar damage bill. #4 MafiaBoy causes $1 billion dollars
  • 12. The South Koreans learned in January 2014 that data from 100 million credit cards had been stolen over the course of several years. In addition, 20 million bank accounts had also been hacked. Hacker stole personal information from customers of credit card companies when he worked for them as a consultant by simply copying the data to an external hard drive. He then resold the data to credit traders and telemarketing companies. #5 The South Korean nightmare
  • 13. BE SAFE :) Roman Antonov Wisdom of Living