This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of
computers,
computing, and
information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of
computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security articles
This article is within the scope of WikiProject History, a collaborative effort to improve the coverage of the subject of
History on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.HistoryWikipedia:WikiProject HistoryTemplate:WikiProject Historyhistory articles
This article is within the scope of WikiProject Law, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the
legal field and the subjects encompassed by it.LawWikipedia:WikiProject LawTemplate:WikiProject Lawlaw articles
Something about this should probably be added:
https://www.wired.com/story/wired-guide-to-data-breaches/
"One early landmark incident occurred in 1984, when the credit reporting agency TRW Information Systems (now Experian) realized that one of its database files had been breached. The trove was protected by a numeric passcode that someone lifted from an administrative note at a Sears store and posted on an “electronic bulletin board”—a sort of rudimentary Google Doc that people could access and alter using their landline phone connection. From there, anyone who knew how to view the bulletin board could have used the password to access the data stored in the TRW file: personal data and credit histories of 90 million Americans. The password was exposed for a month."
DKEdwards (
talk)
20:47, 12 January 2021 (UTC)reply
What do editors think about renaming this page to List of cybersecurity incidents to widen the scope of this page? Would an incident like
this be relevant to this page in its current scope?
LondonIP (
talk)
01:10, 22 December 2021 (UTC)reply
The following is a closed discussion of a
requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a
move review after discussing it on the closer's talk page. No further edits should be made to this discussion.
Just an fyi, we generally look for policy or evidence-based reasoning in these replies. Just saying you're an expert will not have any effect on the discussion. If you do have any sources, policy or logic-based arguments you can put forward, that will help.
ASUKITE15:24, 14 January 2022 (UTC)reply
Oppose per
The Crab Who Played With The Sea. I was about to oppose myself due to the fact that the proposed title is too broad as it could include what is already at
List of cyberattacks, but then I read the aforementioned editor's comment, and it about sums up my thoughts regarding this move request. If this page is to be moved, the title should to be something with a narrower scope than the proposed title.
Steel1943 (
talk)
19:24, 25 January 2022 (UTC)reply
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
Russia's compromise of the FBI radios (2012 - 2016) is not listed.
U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.
U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.
Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”
Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.
Interestingly during that period Putin was accusing then Sectary of State, Hillary Clinton, of fomenting protest against him, by accusing him of using Election Fraud to win his Third Presidential Election.
203.214.51.124 (
talk)
10:20, 8 October 2022 (UTC)reply
A0drul3z
The article claims that, in 2010, "An advanced malware for
Symbian OS is released by hacker A0drul3z". I could not find any mention of the hacker prior to his inclusion on this list. The edit was made by @
Steve dexon in 2013 without any citation. Could someone add source?
Changeworld1984 (
talk)
13:15, 27 March 2024 (UTC)reply