Today In Infosec (@todayininfosec) 's Twitter Profile
Today In Infosec

@todayininfosec

Tweeting news from the world of information security that occurred or was announced on today's date in a previous year. Managed by @stevewerby.

ID: 2646511602

calendar_today14-07-2014 23:39:07

4,4K Tweet

40,40K Takipçi

1 Takip Edilen

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1993: Neil Woods (24) and Karl Strickland (22) became the first people imprisoned under the UK's 1990 Computer Misuse Act. Terminals, modems, and phone lines - oh my!

1993: Neil Woods (24) and Karl Strickland (22) became the first people imprisoned under the UK's 1990 Computer Misuse Act. Terminals, modems, and phone lines - oh my!
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1975: The article "Students Stuff the Contest Box" was published. 26 Caltech students exploited McDonald's "Enter as often as you wish" rules to win 20% of a contest's prizes by submitting 1.1 million entries to 98 stores. McDonald's WAS NOT PLEASED.

1975: The article "Students Stuff the Contest Box" was published. 26 Caltech students exploited McDonald's "Enter as often as you wish" rules to win 20% of a contest's prizes by submitting 1.1 million entries to 98 stores. McDonald's WAS NOT PLEASED.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2015: Egor Homakov published a blog post about a vulnerability on starbucks.com which allows a malicious individual to increae the balance of a Starbucks gift card. How? Exploiting a race condition vuln during a transfer between two cards. sakurity.com/blog/2015/05/2…

2015: Egor Homakov published a blog post about a vulnerability on starbucks.com which allows a malicious individual to increae the balance of a Starbucks gift card. How? Exploiting a race condition vuln during a transfer between two cards.

sakurity.com/blog/2015/05/2…
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1989: FBI Director William Sessions said "Viruses are easy to create and propagate, require little expertise, and may be nearly impossible to prevent or detect."

1989: FBI Director William Sessions said "Viruses are easy to create and propagate, require little expertise, and may be nearly impossible to prevent or detect."
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2005: The paper "How to Break MD5 and Other Hash Functions" was published. It described an algorithm which can find 2 different sequences with the same MD5 hash. You didn't realize collisions were possible? MD5 is still useful, just generally not as a cryptographic function.

2005: The paper "How to Break MD5 and Other Hash Functions" was published. It described an algorithm which can find 2 different sequences with the same MD5 hash.

You didn't realize collisions  were possible? MD5 is still useful, just generally not as a cryptographic function.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1989: Evilnick (also referred to as Evil) was discovered by Jeremy Hughes. It is a boot sector virus for the Atari ST. Or it was. Well, it still is. But it's 36 years old. And it's doubtful anyone has an Atari ST. Though someone will reply to say they do...or they did. Evil.

1989: Evilnick (also referred to as Evil) was discovered by Jeremy Hughes. It is a boot sector virus for the Atari ST. Or it was. Well, it still is. But it's 36 years old. And it's doubtful anyone has an Atari ST. Though someone will reply to say they do...or they did. Evil.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1991: Michael John Lauffenburger's logic bomb was set to detonate on a system at General Dynamics. He'd implemented it 2 months prior. Lauffenburger later pleaded guilty to a misdemeanor charge of computer tampering.

1991: Michael John Lauffenburger's logic bomb was set to detonate on a system at General Dynamics. He'd implemented it 2 months prior. Lauffenburger later pleaded guilty to a misdemeanor charge of computer tampering.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1977: Hacker space epic "Star Wars" was released to little fanfare, though it has since become a cult classic. It's the tale of the droid R2-D2's hacking of the Death Star computer systems after his inept friends foolishly dove into a trash compactor.

1977: Hacker space epic "Star Wars" was released to little fanfare, though it has since become a cult classic. It's the tale of the droid R2-D2's hacking of the Death Star computer systems after his inept friends foolishly dove into a trash compactor.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2002: DES was superseded by AES, after Rijndael beat 14 other designs in a competitive process to replace it. DES had a 25 year run.

2002: DES was superseded by AES, after Rijndael beat 14 other designs in a competitive process to replace it. DES had a 25 year run.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest.

2014: LulzSec hacker Hector Monsegur, known as Sabu, was sentenced and released the same day on time served for his role in a slew of high-profile cyberattacks. He had served 7 months in prison after his arrest.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2012: The discovery of Flame malware was first announced. It was used in targeted espionage attacks against Middle Eastern nations. Later The Washington Post claimed that Flame was jointly developed by the NSA, the CIA, and Israel's military at least five years prior.

2012: The discovery of Flame malware was first announced. It was used in targeted espionage attacks against Middle Eastern nations. Later The Washington Post claimed that Flame was jointly developed by the NSA, the CIA, and Israel's military at least five years prior.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2014: An announcement was made on the TrueCrypt website that the development of TrueCrypt had ended and that the disk encryption tool wasn't secure. Despite this, an independent audit months later found no substantial flaws.

2014: An announcement was made on the TrueCrypt website that the development of TrueCrypt had ended and that the disk encryption tool wasn't secure.

Despite this, an independent audit months later found no substantial flaws.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2003: The documentary "In The Realm of the Hackers" was released. It covers Australian hacking group The Realm in the 1980s and 1990s, focusing on the teen hackers Electron and Phoenix. Want to watch it? You can find the 55 minute film on YouTube.

2003: The documentary "In The Realm of the Hackers" was released. It covers Australian hacking group The Realm in the 1980s and 1990s, focusing on the teen hackers Electron and Phoenix.

Want to watch it? You can find the 55 minute film on YouTube.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2010: The 25th anniversary edition of Steven Levy's book "Hackers: Heroes of the Computer Revolution" was published. The cover art and tagline of the first edition published in 1984 make for a far superior cover.

2010: The 25th anniversary edition of Steven Levy's book "Hackers: Heroes of the Computer Revolution" was published. The cover art and tagline of the first edition published in 1984 make for a far superior cover.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1984: The Cult of the Dead Cow was founded in Lubbock, Texas. Did it fade into obscurity? Alter the course of history? Is it hiding in your closet? ¯\_(ツ)_/¯

1984: The Cult of the Dead Cow was founded in Lubbock, Texas.

Did it fade into obscurity?
Alter the course of history?
Is it hiding in your closet?

¯\_(ツ)_/¯
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1999: FBI agents executed a search warrant against 19 year old Chad Davis (aka Mindphasr) in Wisconsin. During the search he admitted to being a member of Global Hell. 26 days later he defaced the US Army's homepage. In 2000 he received a 6 month sentence.

1999: FBI agents executed a search warrant against 19 year old Chad Davis (aka Mindphasr) in Wisconsin. During the search he admitted to being a member of Global Hell. 26 days later he defaced the US Army's homepage. In 2000 he received a 6 month sentence.
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1983: WarGames was released. In the movie, high school hacker David Lightman wardialed a NORAD computer, guessed a weak password, and nearly triggered World War III. In the loosely related sequel released 3 years later, he hacked his high school's computer and skipped school. 😉

1983: WarGames was released. In the movie, high school hacker David Lightman wardialed a NORAD computer, guessed a weak password, and nearly triggered World War III. In the loosely related sequel released 3 years later, he hacked his high school's computer and skipped school. 😉
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1998: Members of Milw0rm compromised the Bhabha Atomic Research Centre (BARC), stealing and deleting data related to nuclear detonations.

1998: Members of Milw0rm compromised the Bhabha Atomic Research Centre (BARC), stealing and deleting data related to nuclear detonations.