HACKERS ATTACKED AGAINhttp://www.monster.com/ has been hacked by the hackers.The Hackers has always attacked the internet from time to time and most of the time they have succeeded.This time,one of the largest job search engine website has been hacked.Over 1.3 million users have been affected in this hacking.Patrick Martin, senior product manager at Symantec, said that the aim of the attack seemed to have been to gain access to user data to send more convincing spam in the hope of stealing financial information.
Great Hacks since yet.1969Arpanet, the forerunner of the internet, is founded. The first network has only four nodes.
1971 First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes.
1980
In October 1980, Arpanet comes to a crashing halt by the accidental distribution of a virus.
1983
The internet is formed when Arpanet is split into military and civilian sections. Wargames, a film that glamorises hacking, is released. Many hackers later claim that the movie inspired them to start playing around with computers and networks.
1986
In August, while following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers who were found responsible for that.
1988
Robert Morris, a graduate student at Cornell University, sets off an internet worm program that quickly replicates itself to over 6,000 hosts bringing almost the whole network to a halt. Morris is arrested soon afterwards and is punished by being fined $10,000, sentenced to three years on probation and ordered to do 400 hours of community service.
Worms are different from virus.
1989Kevin Mitnick: Arrested twice for hacking.He is convicted of stealing software from Digital Equipment and codes for long-distance lines from US telephone company MCI. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes. He spent a one-year prison term. At the Cern laboratory for research in high-energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the world wide web.
1993 Kevin Poulsen, Ronald Austin and Justin Peterson were charged for conspiring to rig a radio phone-in competition to win prizes. The trio seized control of phone lines to the radio station ensuring only their calls got through. The group allegedly netted two Porsches, $20,000 in cash and holidays in Hawaii.
1994
A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, Nasa and the Korean Atomic Research Institute. His online mentor, "Kuji", is never found. Also this year, a group directed by Russian hackers breaks into the computers of Citibank and transfers more than $10 million from customers' accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money.
1995
In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.
On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail. The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995.
1996
Popular websites are attacked and defaced in an attempt to protest about the treatment of Kevin Mitnick. The internet now has over 16 million hosts and is growing rapidly.
1997
Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said. Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.
AOHell is released, a freeware application that allows a burgeoning community of unskilled hackers--or script kiddies--to wreak havoc on America Online. For days, hundreds of thousands of AOL users find their mailboxes flooded with multi-megabyte mail bombs and their chat rooms disrupted with spam messages.
1998
Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.
In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."
Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.
Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.
Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.
The hacking group Cult of the Dead Cow releases its
Trojan horse program, Back Orifice--a powerful hacking tool--at Def Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine.
1999
David Smith,The Creator of the Melissa virus.In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith.
2000 In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data.
In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn't do enough to protect themselves.
In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen.
2001
DNS Attack
Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted. The hack is detected within a few hours, but prevents millions of users from reaching Microsoft Web pages for two days.
2004
NEW YORK (Reuters) - A 22-year-old California man pleaded guilty Thursday to hacking into the New York Times Co. computer network and entering a database containing personal information about Op-Ed page contributors.
2005
NEW YORK - Saying it's been a bad week in the realm of information security is putting it lightly. The incident that got the most attention, mostly because it involved compromising pictures of the ever-overexposed Paris Hilton, was the ever-widening fallout from a hacking attack. The target was the servers that wireless carrier T-Mobile uses to run services for users of its Sidekick wireless devices. Paris Hilton: Her Sidekick wireless device was the target of a hacking attack, and now her friends are angry.
WASHINGTON — Cisco Systems Inc. (CSCO) said on Tuesday authorities in Sweden had detained a person for stealing its source code, the basic instructions for the machines that direct Internet traffic around the globe.
"We are aware that a person has been detained in Sweden related to the IOS source code theft and are encouraged by this action," the San Jose, Calif., company said in a statement.
2006
CHICAGO _ A computer consultant working in the FBI's Springfield, Ill., offices used free programs available on the Internet to breach secure areas of the bureau's computer system and find administrators' passwords, including one belonging to FBI Director Robert Mueller. Joseph Thomas Colon, 28, who was living in Springfield was the hero.
LOS ANGELES: A Romanian man has been indicted on charges of hacking into more than 150 U.S. government computers, causing disruptions that cost NASA, the Energy Department and the Navy nearly $1.5 million (€1.1 million).
2007
CARACAS, Venezuela — A 17-year-old has been detained by Venezuelan authorities after hacking into multiple government Web sites and posting playful photos of President Hugo Chavez and his close ally, Cuba's Fidel Castro.
The boy modified 23 Web sites _ including those of the vice president's office, the National Guard and the investigative police _ in late December, said Oswaldo Guevara, the investigative police's head of computer-related crimes.
LONDON: A British court on Friday sentenced a tabloid journalist to four months in prison for hacking into royal officials' voicemail systems.
Judge Peter Henry Gross said he had no option but to hand a prison sentence to Clive Goodman, 49, the royal editor of the News of the World, describing his crime as "reprehensible in the extreme."
Symantec discovers Monster hack :Hackers have stolen the personal information — including home addresses and phone numbers – of several hundred thousand users of online job portal Monster.com.
According to online security firm Symantec Corp., hackers over the weekend used a Trojan Horse virus called Infostealer.Monstres to break into Monster accounts maintained by recruiters and steal their credentials. The hackers used that information to log into Monster.com as prospective employers and gleaned personal details, including names, addresses and phone numbers, from individuals who had posted resumes to the site.