1990: Hackers from Netherlands Penetrated DoD Sites
Do you know who the first hackers were? Surprisingly, it was a group of Dutch hackers who, in 1990, managed to penetrate the computer networks of t...
Do you know who the first hackers were? Surprisingly, it was a group of Dutch hackers who, in 1990, managed to penetrate the computer networks of t...
Have you ever wondered what your reaction would be if somebody said that a hacker group managed to penetrate the card-holding systems of several Br...
Aren’t there many stories about hackers who exploit vulnerabilities in computer systems? These vulnerabilities often create complete havoc in every...
How could a single hacker sit in their home cause chaos at NASA? This is what happened in 1990, when a delinquent hacker from Denver was able to en...
Have you ever wondered how a simple disk could turn your computer into a slow, crashing mess? Back in 1989, the WDEF Mac Virus did just that to cou...
Picture You worked at NASA’s Goddard Space Flight Center in October 1989. The Galileo spacecraft is set to launch toward Jupiter. You grab your cof...
In 1989, a 16-year-old hacker known as “Fry Guy” stunned the world by breaching McDonald’s mainframe. Using nothing more than a manager...
In July 1989, a very basic computer system was nearly taken over for the nth time, and the presence of the Avenger virus was one of the scares of t...
Imagine one day logging into your computer, expecting everything to run smoothly, but instead, it’s slow or unresponsive. In 1988, that happened to...
In the late 80s, when personal computers were still a novelty in many homes, Macs were seen as nearly invincible. A friend proudly owned a Macintos...
Imagine being the most wanted hacker in the world and slipping through the cracks of some of the most secured networks. Kevin Mitnick did that in 1...
Imagine a small network connecting only a few computers when the Internet was still new. One day, in 1988, that fragile system was hit by something...
Picture this. It’s late night, and you’re at your desk, casually browsing the internet, when, out of the blue, you notice something tha...
Let’s go back to the year 1987. It is half a decade after the information age began in the United States. The concept of cyber security is also a n...
In the fall of 1987, students at Lehigh University were busy with their studies, swapping floppy disks to share files and programs. But something s...