FANDOM


Construction cone
This page is under construction and is still being written! Any major unauthorized edits will be reverted, but some minor, grammar and spelling fixes are freely allowed if you find any errors of this type.


IMPORTANT:This page has used CC-BY-SA content from Wikipedia in either a refactored, modified, abridged, expanded, built on or 'strait from' text content!
Wana Decrypt0r screenshot

A screenshot of Wana Decrypt0r 2.0.!

Staphycid 500mg 16x

Not even Flucloxacillin can kill this infection!

Parliament 'hit by cyber-attack'02:00

Parliament 'hit by cyber-attack'

Parliament 'hit by cyber-attack' The UK Parliament has been hit by a cyber security attack, the Liberal Democrat peer Lord Rennard has said. The peer revealed on Twitter there was a problem, asking followers to send any "urgent messages" to him by text. MPs were reportedly told about the hack on Friday night and later reported difficulties in accessing their emails away from the Westminster estate. A Commons spokeswoman said the lack of email access was a result of the steps being taken to manage the issue. If you found this video valuable, give it a like. If you know someone who needs to see it, share it. Leave a comment below with your thoughts. Add it to a playlist if you want to watch it later. Don't forget to subscribe our channel.

The attackers'  plansEdit

A cyber-attack is any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information systems.

They try to take over online devices and either hack, zombiefyed, ransom lock or otherwise take them over. Zombiefyed stuff can also be used to spew erroneous messages on line to swamp out and collapse sites and ISPs.

The October 2016 denile of service (DDOS) attack was directed against a major internet host: New Hampshire-based Dyn Inc. badly disrupting traffic to and from major internet services including Twitter, Spotify and Amazon.

National modus operandiEdit

  1. Russia- destroy all on-line stuff.
  2. USA- destroy military and corporate on-line stuff.
  3. Israel- Specific targets such as a airbase or factory.
  4. Germany- Specific targets such as a airbase or factory.
  5. Mexico- Specific targets such as a airbase or factory.
  6. Canada- Specific targets such as a airbase or factory.
  7. Australia- Specific targets such as a airbase or factory.
  8. N.Z.- Specific targets such as a airbase or factory.
  9. Ukraine- Specific targets such as a airbase or factory.
  10. Iran- Specific targets such as a airbase or factory.
  11. Turkey- Specific targets such as a airbase or factory.
  12. DPRK- Specific targets such as a airbase or factory.
  13. UK- Specific targets such as a airbase or factory and spying in general.
  14. France- Specific targets such as a airbase or factory and spying in general.
  15. Italy- Specific targets such as a airbase or factory and spying in general.
  16. China- paralyses all of E-space with ddos attacks and steels corporate secrets. Theory holds that all that a Chines and Hong Kong web-cam sees, when swiched on, also gose to the Chinese secret service to be drained of any corporate secrets it films!  
  17. Organised crime- Ransomwere, steeling data, virusing, DDOS attacks, zombifying computers, locking computers, destroying computers and finding stuff to use for blackmailing.

November 2, 1988 Morris wormEdit

The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It was the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988 from the computer systems of the Massachusetts Institute of Technology.

1989 AIDS trojan horse virus attackEdit

Not to be confused with the human, cat and\or monkey AIDS virus.

AIDS, also known as Aids Info Disk or PC Cyborg Trojan, is a trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by AIDS to count the number of times the computer has booted. Once this boot count reaches 90, AIDS hides directories and encrypts the names of all files on drive C: (rendering the system unusable), at which time the user is asked to 'renew the license' and contact PC Cyborg Corporation for payment (which would involve sending 189 US$ to a post office box in Panama). There exists more than one version of AIDS, and at least one version does not wait to munge drive C:, but will hide directories and encrypt file names upon the first boot after AIDS is installed

1990 AIDS II computer virusEdit

  • Not to be confused with the human, cat, dog and\or monkey AIDS virus.

AIDS II is a computer virus written in Turbo Pascal 3.01a which overwrites COM files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first. Thus, by creating infected com files, AIDS code will always be executed before the intended exe code.

Early SQL injectionsEdit

The first public discussions of SQL injection started appearing around 1998; for example, a 1998 article in Phrack Magazine.

March 26, 1999 Melissa virusEdit

Around March 26, 1999 Melissa was put in the wild by David L. Smith of Aberdeen Township, New Jersey. (The virus itself was credited to Kwyjibo, who was shown to be macrovirus writers VicodinES and ALT-F11 by comparing MS Word documents with the same globally unique identifier—this method was also used to trace the virus back to Smith.) On December 10, 1999 Smith pleaded guilty and was sentenced to 10 years, serving 20 months, and was fined US $5,000. The arrest was the result of a collaborative effort involving (amongst others) the FBI, the New Jersey State Police, Monmouth Internet and a Swedish computer scientist. David L. Smith was accused of causing $80 million worth of damages by disrupting personal computers and computer networks in business and government.

5th of May 2000 ILOVEYOU virusEdit

ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension (in this case, 'VBS' – a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting random types of files (including Office files, image files, and audio files; however after overwriting MP3 files the virus would hide the file), and sent a copy of itself to all addresses in the Windows Address Book used by Microsoft Outlook. In contrast, the Melissa virus only sent copies to the first 500 contacts. This made it spread much faster than any other previous email worm.

July 15, 2001 Code Red wormEdit

Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server.

The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh, the Code Red worm exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time.

Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000.

September 18th, 2001 Nimda wormEdit

Nimda is a malicious file, infecting computer worm. It spreads, surpassing the economic damage caused by previous outbreaks such as Code Red.

The first released advisory about this thread (worm) was released on September 18th, 2001. Due to the release date, exactly one week after the 9\11 attacks on the World Trade Center and Pentagon, some media quickly began speculating a link between the virus and Al Qaeda, though this theory ended up proving unfounded.

Nimda affected both user workstations (clients) running Windows 95, 98, NT, 2000 or XP and servers running Windows NT and 2000.

The worm's name origin comes from the reversed spelling of "admin".

F-Secure found the text "Concept Virus(CV) V.5, Copyright(C)2001 R.P.China" in the Nimda code, suggesting its country of origin.

February 2002, Jeremiah JacksEdit

In February 2002, Jeremiah Jacks discovered that Guess.com was vulnerable to an SQL injection attack, permitting anyone able to construct a properly-crafted URL to pull down 200,000+ names, credit card numbers and expiration dates in the site's customer database.

The 2003-2006 Titan Rain attacksEdit

Over viewEdit

Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 2003; they were known to have been ongoing for at least three years.

The attacks were labeled as Chinese in origin, although their precise nature, e.g., state-sponsored espionage, corporate espionage, or random hacker attacks, and their real identities – masked by proxy, zombie computer, spyware/virus infected – remain unknown. The activity known as "Titan Rain" is believed to be associated with an Advanced Persistent Threat.

In early December 2005 the director of the SANS Institute, a security institute in the United States, said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems."

Their targetsEdit

Titan Rain hackers gained access to many United States defense contractor computer networks who were targeted for their sensitive information, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.

The attackersEdit

The series of attacks are believed by some to be the actions of the People’s Liberation Army (PLA), rather than some freelance Chinese hackers. These hackers attacked both the American (Defense Intelligence Agency – DOD) and British Government Departments (Ministry of Defence – MOD). The British government had an incident in 2006 where a part of the House of Commons computer system was shut down by - initially thought to be an individual – an “organised Chinese hacking group.” Although most of the evidence has pointed to the Chinese government as the attackers, the Chinese government has claimed that it was not them who attacked the United States, leading to another possibility that it was hackers using Chinese computers.

August 2003 Mimail attackEdit

Mimail is a computer worm which first emerged in August 2003; it is transmitted via e-mail. Since its initial release, nearly two dozen variants of the original Mimail worm have appeared. The Mydoom worm, which emerged in January 2004, was initially believed to be a variant of Mimail. Mimail is written in the C programming language.

Global attack of 22nd August 2003Edit

The hard hitting 'Sobig.F' virus spread to 134 countries in just 96 hours, generating tens of millions of e-mails. It was the fastest-growing computer virus in history as of that date.

26 January 2004 to 18 February 2005 Mydoom attacksEdit

Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and "'Shimgapi'", is a computer worm affecting Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous records set by the Sobig worm and ILOVEYOU, a record which as of 2017 has yet to be surpassed.

A modified form was later released on July 2009.

Doomjuice February 9th, 2004Edit

Doomjuice is a variant of the Mydoom computer worm, in two variants known as Doomjuice.A or Doomjuice.B. It infects Microsoft Windows utilizing the ports left open by the Mydoom.A and Mydoom.B worms. This worm also launches a Denial of Service (DoS) attack on the Microsoft Web site. It struck on February 9th, 2004.

January 13, 2006 Rhode Island attackEdit

On January 13, 2006, Russian computer criminals broke into a Rhode Island government website and allegedly stole credit card data from individuals who have done business online with state agencies.

2007 cyberattacks on EstoniaEdit

The attacksEdit

A series of cyber attacks began 27 April 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's disagreement with Russia about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in Tallinn. Most of the attacks that had any influence on the general public were distributed denial of service type attacks ranging from single individuals using various methods like ping floods to expensive rentals of botnets usually used for spam distribution. Spamming of bigger news portals commentaries and defacements including that of the Estonian Reform Party website also occurred.

Some observers reckoned that the onslaught on Estonia was of a sophistication not seen before. The case is studied intensively by many countries and military planners as, at the time it occurred, it may have been the second-largest instance of state-sponsored cyberwarfare, following Titan Rain.

As of January 2008, one ethnic-Russian Estonian national has been charged and convicted.

During a panel discussion on cyber warfare, Sergei Markov of the Russian State Duma has stated his unnamed aide was responsible in orchestrating the cyber attacks. Markov alleged the aide acted on his own while residing in an unrecognised republic of the former Soviet Union, possibly Transnistria.[6] On 10 March 2009 Konstantin Goloskokov, a "commissar" of the Kremlin-backed youth group Nashi, has claimed responsibility for the attack. Experts are critical of these varying claims of responsibility.

Origins of the attacksEdit

Critical systems whose network addresses would not be generally known were targeted, including those serving telephony and financial transaction processing. Although not all of the computer crackers behind the cyberwarfare have been unveiled, some experts believed that such efforts exceed the skills of individual activists or even organised crime as they require a co-operation of a state and a large telecom company.

A Commissar of the Nashi pro-Kremlin youth movement in Moldova and Transnistria, Konstantin Goloskokov (Goloskov in some sources), admitted organizing cyberattacks against Estonian government sites. Goloskokov stressed, however, that he was not carrying out an order from Nashi's leadership and said that a lot of his fellow Nashi members criticized his response as being too harsh.

Like most countries, Estonia does not recognise Transnistria, a secessionist region of Moldova. As an unrecognised nation, Transnistria does not belong to Interpol. Accordingly, no Mutual Legal Assistance Treaty applies. If residents of Transnistria were responsible, the investigation may be severely hampered, and even if the investigation succeeds finding likely suspects, the legal recourse of Estonian authorities may be limited to issuing all-EU arrest warrants for these suspects. Such an act would be largely symbolic.

Head of Russian Military Forecasting Center, Colonel Anatoly Tsyganok confirmed Russia's ability to conduct such an attack when he stated: "These attacks have been quite successful, and today the alliance had nothing to oppose Russia's virtual attacks", additionally noting that these attacks did not violate any international agreement. 

2007 Zeus (malware) atacksEdit

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. It is also used to install the CryptoLocker ransomware. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of tech support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected. 

July 2009 cyber attacksEdit

OverviewEdit

The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States. The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled.

The timing and targeting of the attacks have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated.

Timeline of attacksEdit

First waveEdit

The first wave of attacks occurred on July 4, 2009 (Independence Day holiday in the United States), targeting both the United States and South Korea. Among the websites affected were those of the White House and The Pentagon. An investigation revealed that 27 websites were targets in the attack based on files stored on compromised systems.

Second waveEdit

The second wave of attacks occurred on July 7, 2009, affecting South Korea. Among the websites targeted were the presidential Blue House, the Ministry of Defense, the Ministry of Public Administration and Security, the National Intelligence Service and the National Assembly.

Third waveEdit

A third wave of attacks began on July 9, 2009, targeting several websites in South Korea, including the country's National Intelligence Service as well as one of its largest banks and a major news agency. The U.S. State Department said on July 9 that its website also came under attack. State Department spokesman Ian Kelly said: "I'm just going to speak about our website, the state.gov website. There's not a high volume of attacks. But we're still concerned about it. They are continuing." U.S. Department of Homeland Security spokesperson Amy Kudwa said that the department was aware of the attacks and that it had issued a notice to U.S. federal departments and agencies to take steps to mitigate attacks.

EffectsEdit

Despite the fact that the attacks have targeted major public and private sector websites, the South Korean Presidential office has suggested that the attacks are targeted towards causing disruption, rather than stealing data. However, Jose Nazario, manager of a U.S. network security firm, claimed that the attack is estimated to have produced only 23 megabits of data per second, not enough to cause major disruptions. Joe Stewart, researcher at SecureWorks' Counter Threat Unit, said that the data generated by the attacking program appeared to be based on a Korean-language browser.

It was expected that the economic costs associated with websites being down would be large, as the disruption had prevented people from carrying out transactions, purchasing items or conducting business.

PerpetratorsEdit

It is not known who is behind the attacks. Reports indicate that the type of attacks being used, commonly known as distributed denial-of-service attacks, were unsophisticated. Given the prolonged nature of the attacks, they are being recognized as a more coordinated and organized series of attacks. According to the South Korean National Intelligence Service, the source of the attacks was tracked down and the government activated an emergency cyber-terror response team who blocked access to five host sites containing the malicious code and 86 websites that downloaded the code, located in 16 countries, including the United States, Guatemala, Japan and the People's Republic of China, but North Korea was not among them. Later, it has been discovered that the malicious code responsible for causing the attack, identified as W32.Dozer, is programmed to destroy data on infected computers and to prevent the computers from being rebooted. South Korean police are analyzing a sample of the thousands of computers used to crash websites, stating that there is "various evidence" of North Korean involvement, but said they may not find the culprit. Security experts said that the attack re-used code from the Mydoom worm. One analyst thinks that the attacks likely came from the United Kingdom.

On October 30, 2009, South Korea's spy agency, the National Intelligence Service, stated the origin of the attacks were from North Korea's telecommunications ministry.

November 8, 2010 British Royal Navy attackEdit

On November 8, 2010 the British Royal Navy website was compromised by a Romanian hacker named TinKode using SQL injection.

April 17 and April 19, 2011 PlayStation Network outageEdit

The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed. The outage lasted 23 days.

At the time of the outage, with a count of 77 million registered PlayStation Network accounts, it was one of the largest data security breaches in history. It surpassed the 2007 TJX hack which affected 45 million customers. Government officials in various countries voiced concern over the theft and Sony's one-week delay before warning its users.

Sony stated on April 26 that it was attempting to get online services running "within a week." On May 14, Sony released PlayStation 3 firmware version 3.61 as a security patch. The firmware required users to change their password upon signing in. At the time the firmware was released, the network was still offline. Regional restoration was announced by Kazuo Hirai in a video from Sony. A map of regional restoration and the network within the United States was shared as the service was coming back online.

Norwegian attack of July 9th, 2014Edit

Anonymous Norway claimed responsibility for massive cyber-attack on Norwegian banks, but not the Norwegian insurance firms.

  • The victims were-
  1. DNB 
  2. Danske Bank 
  3. Nordea 
  4. Norges Bank 
  5. Sparebank 1
  6. Telenor 
  7. Storebrand
  8. Gjensidige

August 2014 Hold Security attackEdit

In August 2014, Milwaukee-based computer security company Hold Security disclosed that it uncovered a theft of confidential information from nearly 420,000 websites through SQL injections. The New York Times confirmed this finding by hiring a security expert to check the claim.

November 24, 2014, Sony Pictures hackEdit

On November 24, 2014, a hacker group which identified itself by the name "Guardians of Peace" (GOP) leaked a release of confidential data from the film studio Sony Pictures. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of then-unreleased Sony films, and other information.[1]

In November 2014, the GOP group demanded that Sony pull its film The Interview, a comedy about a plot to assassinate North Korean leader Kim Jong-Un, and threatened terrorist attacks at cinemas screening the film. After major U.S. cinema chains opted not to screen the film in response to these threats, Sony elected to cancel the film's formal premiere and mainstream release, opting to skip directly to a digital release followed by a limited theatrical release the next day.[2][3][4]

United States intelligence officials, after evaluating the software, techniques, and network sources used in the hack, alleged that the attack was sponsored by North Korea.[5] North Korea has denied all responsibility.


Novetta blamed the Lazarus Group,Lazarus Group is a cybercrime group


Stammberger provided to the FBI Norse's findings that suggest the hack was an inside job, stating, "Sony was not just hacked; this is a company that was essentially nuked from the inside. After a private briefing lasting three hours, the FBI formally rejected Norse's alternative assessment.[98]


The report, published in collaboration with Kaspersky Lab, Symantec, AlienVault, Invincea, Trend Micro, Carbon Black, PunchCyber, RiskIQ, ThreatConnect and Volexity, concluded that a well-resourced organization had committed the intrusion, a


6] Symantec reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.[7]

The WannaCry Malware that affected as many as 300,000 computers worldwide are likely authored by hackers from southern China, Hong Kong, Taiwan or Singapore, said a US intelligence company.[8]


October 2015 Talk Talk attackEdit

October 2015, an SQL injection attack was used to steal the personal details of 156,959 customers from British telecommunications company Talk Talk's servers, exploiting a vulnerability in a legacy web portal.

It experienced a "significant and sustained cyber-attack", during which personal and banking details of up to four million customers is thought to have been accessed. TalkTalk stated they had received a ransom demand from a group claiming to be responsible. Some customers complained that they were targeted by criminals before TalkTalk disclosed the cyber-attack, and the Chair of the Home Affairs Select Committee said "Suggestions that TalkTalk has covered up both the scale and duration of this attack ... must be thoroughly investigated."

Having initially stated that all its customers might have been affected, on 24 October TalkTalk issued a statement saying that a "materially lower" amount of customers’ financial information was stolen, and that the stolen data was not sufficient for money to be taken from bank accounts. On 6 November, TalkTalk stated that the impact of the breach was "much more limited than initially suspected", adding that 156,959 customer accounts were involved, from which 15,656 sort codes and bank account numbers had been taken. This amounts to 4% of customers whose financial data is compromised. There were 28,000 partial credit and debit cards stolen, but as these were "obscured" they could not be used. TalkTalk stated the lost data had not been encrypted, but they were not legally required to encrypt it.

The attack cost £42m to TalkTalk and 101,000 subscribers left in the aftermath of the attack. On 5 October 2016, TalkTalk was fined £400,000 by the Information Commissioner's Office for its negligence on securing clients data.

NHS Orkney attack of August 2015Edit

NHS Orkney had a virus that encrypt a number of internal files.

Ukraine attack of Christmas 2015Edit

A cyberattack cut electricity to nearly 250,000 Ukrainians 2 days before Christmas 2015, at exactly 00:00.00. Ukranian time.

2016 TalkTalk malware router infectionEdit

On 1 December 2016, TalkTalk routers were infected with a modified version of the Mirai malware, leaving hundreds of thousands of customers without Internet access, because of the inability of TalkTalk to keep the routers securely updated. The malware stole the Wi-Fi passwords of the routers. The handling of the Wi-Fi password breach was criticised by several cyber-security experts.

Global attack of February 8, 2016Edit

World wideEdit

Over 100 banks in 30 countries and NHS Grampian logged the largest number of cyber attacks (2,250) against Scotland’s health boards in the last 3 years (2013-2016). Scottish businesses £5billion per year over these 3 years.

Bangladesh Bank robbery of February 2016Edit

Bangladesh bank reserve hack 2016 🙈 Bangladesh bank heist ➤ Hacking news02:24

Bangladesh bank reserve hack 2016 🙈 Bangladesh bank heist ➤ Hacking news

In February 2016, instructions to steal US$951 Million from Bangladesh Bank, the central bank of Bangladesh, were issued via the SWIFT network. Five transactions issued by hackers, worth $101 million and withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York, succeeded, with $20M traced to Sri Lanka (since recovered) and $81M to the Philippines. The Federal Reserve Bank of NY blocked the remaining 30 transactions, amounting to $850 million, at the request of Bangladesh Bank.

The Bangladesh Bank robbery, also known colloquially as the Bangladesh Bank heist, took place in February 2016, when instructions to steal US$951 million from Bangladesh Bank, the central bank of Bangladesh, were issued via the SWIFT network. Five transactions issued by hackers, worth $101 million and withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York, succeeded, with $20 million traced to Sri Lanka (since recovered) and $81 million to the Philippines (about $18 million recovered). The New York Fed blocked the remaining thirty transactions, amounting to $850 million, at the request of Bangladesh Bank. It was identified later that Dridex malware was used for the attack. Atiur Rahman, Governor of Bangladesh Bank who resigned from his post in response to the case and On August 5, 2016, the Bangko Sentral ng Pilipinas approved a ₱1 billion (~US$52.92 million) fine against RCBC for its non-compliance with banking laws and regulations in connection with the bank robbery. This is the largest monetary fine ever approved by BSP against any institution. RCBC stated that the bank will comply with the BSP's decision, and will pay the imposed fine.

16-21 October 2016 Cyber Attacks on the USAEdit

It was a Russian (?) tempt to undermine Hillary Clinton's chances of winning in the American presidential elections and unfairly put Donald Trump in power with out his knowing it.

Dyn Inc. and NHS, attacks in October 2016Edit

On 21 October 2016, Dyn's networks were attacked three times by hackers using a DDOS attack, causing major sites including Twitter, Reddit, GitHub, Amazon, Netflix, Airbnb, Spotify, Runescape, and its own website (http://www.dyn.com), and many others to become unreachable.

The principle sources of the attack including cameras, residential gateways, computer printers and baby monitors, that had been infected and zombifyed with the Mirai Mmalware.

30 October-November 01, 2016 saw Lincoln and Goolde NHS Trust networks in Scunthorpe and Grimsby taken off line for 3 days by a ransom were attack.

Kenyan and Liberia attacks in November 2016Edit

November 2nd saw a mas hacking of the Kenyan government.

Liberia was the cut off by similar attacks on November 3rd and 8th.

Yahoo attack of December 14, 2016Edit

1 Billion Yahoo User Accounts Were Hacked and information like passwords stolen.

March 15, 2017 Twitter attackEdit

Swastikas were stamped on Twitter pages for a day or so by hackers.

Cambrian College attack of May 1, 2017Edit

A $54,000 or 30 bitcoins ransom ware attack hit Canada's Cambrian College.

Baltic energy networks atack of May 11th-16th, 2017Edit

A suspected Russia-backed hackers target Baltic energy networks on May 11th, 2017.

Global attacks of May 12th, 2017Edit

OverviewEdit

Some very sophisticated and well dedicated scum-bags, suspected to be in a organised crime outfit, caused a lot of unwanted suffering on May 12th, 2017. It started with hitting 99 countries on the 12th and 150 (?) by the 15th with targets including the UK's NHS, Spain's Telefónica S.A., Spain's energy system, El Mundo and possibly some minor US health firms and a O'Porto dentist's surgery.

A black, white and red or black only screen with a image of a lock on it, containing red, black or white text notice came up on the screen saying show a program demanding $300 (£230) in bitcoin within 3 days or $600 within 7 days, that looks similar to or actualy is the ransomware known as WannaCryptor or WCry. If it is not done, the shit heads say that will wipe the data.

The virusEdit

WannaCry, also known as WanaCrypt0r 2.0, is a ransomware software package. In May 2017, a large scale infection started affecting Telefónica and several other large companies in Spain, as well as parts of the British National Health Service. Many other countries were attacked by WanaCrypt0r 2.0. Other targets in at least 11 countries were also reported to have been attacked around the same time. WannaCry is believed to use the EternalBlue exploit to attack computers running Microsoft Windows operating systems.

WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA) to attack computers running Microsoft Windows operating systems. Although a patch to remove the underlying vulnerability for supported systems had been issued on 14 March 2017, delays in applying security updates and lack of support by Microsoft of legacy versions of Windows left many users vulnerable. Due to the scale of the attack, to deal with the unsupported Windows systems, Microsoft has taken the unusual step of releasing updates for all older unsupported operating systems from Windows XP onwards.

Shortly after the attack began a researcher found an effective kill switch, which prevented many new infections. This greatly slowed the spread. However, it has been reported that subsequently new versions of the attack have been detected which lack the kill switch, thus able to spread to systems in which the vulnerability has not been patched.

Following an investigation by The Sunday Times, which showed that YouTube was "providing a platform for criminals promoting and selling ransomware" by allowing hackers to post step-by-step guides to build ransomware on the platform, as well as providing links to websites where ransomware can be purchased for $20 (£15), YouTube terminated at least one channel and removed other guides on how to build ransomware.

Computers targetedEdit

According to Wired, affected systems will also have had the DOUBLEPULSAR backdoor installed; this will also need to be removed when systems are decrypted.

Windows systems Microsoft had taken the unusual step of releasing updates for the long unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems. Shortly after the attack began a British and American researcher found an effective kill switch.

More than 230,000 computers were infected by 10.30pm on 14th of May 2017. As of 17 May 2017, at 2:33am UTC, May 17th, a total of 238 payments totaling $72,144.76 had been transferred.

Arne Schönbohm (de), President of Germany's Federal Office for Information Security (BSI), stated that:

"the current attacks show how vulnerable our digital society is. It's a wake-up call for companies to finally take IT security [seriously]".

UK government cover-upEdit

In the UK the impact on the NHS quickly became political, with claims that the effects were exacerbated by Conservative Party under-funding of the NHS as part of the government's austerity measures, in particular the refusal to pay extra to keep protecting outdated Windows XP systems from such attacks. Home secretary Amber Rudd refused to say whether patient data had been backed up, and shadow health secretary Jon Ashworth accused health secretary Jeremy Hunt of refusing to act on a critical note from Microsoft, the National Cyber Security Centre (NCSC) and the National Crime Agency two months previously.

  • According the UK government 0 trusts were sill down on the 13th down and 5% used XP.
  • According to NHS England 5 trusts were sill down on the 13th down and 20% used XP.
  • According to NHS staff 7 trusts were sill down on the 14th down and most used XP, the rest being Windows 7 and Widowas 8.
  • The health secatery said the NHS, like all of us, should have backed up our data and updated our computers in accordance to Microsoft wishes. 
  • The BBC and Sky News said mostly XPs were hit, but thire with some later OSs were also victims by May 15.
  • The British Defense Secretary, Michael Fallon, said on May 15th that the NHS has been given about £50m to pay for them to improve theirs computer systems and was repeatedly warned about cyber threats before the attack took place.
  • Later, Jon Ashworth accused health secretary Jeremy Hunt of refusing to act on a critical note from Microsoft, the National Cyber Security Centre (NCSC) and the National Crime Agency two months previously on May.
  • Hospital staff confirmed it was contained after a week and was all sorted out after 2 weeks.

The European victimsEdit

RomaniaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 10.00pm, May 12.
  • Automobile Dacia (Mioveni plant) attack at - at 12.30pm, May 13.
  • Ministry of Foreign Affairs on 1.45pm, May 12
  • Ministry of Foreign Affairs on 16.45pm, May 12

San MarinoEdit

  • N\A noteworthy attack at 4.15am, May 12

VaticanEdit

  • N\A noteworthy attack at 4.15am, May 12

AndorraEdit

  • N\A noteworthy attack at 4.15am, May 12

GermanyEdit

  • Deutsche Bahn at 4.15am, May 12
  • N\A noteworthy attack at - 4.30pm, May 12
  • Deutsche Bahn at N\A, May 14
  • O2 (Germany) (16:50, May 19)

AustriaEdit

  • N\A noteworthy attack at 4.15am, May 12

HungaryEdit

  • N\A noteworthy attack at 4.15am, May 12
  • Telenor Hungary attack at 10.35pm, May 12

GreeceEdit

N\A noteworthy attack at (?)- at 00.00am (May 13th).

AlbaniaEdit

N\A noteworthy attack at (?)- at 00.00am (May 13th).

BulgariaEdit

N\A noteworthy attack at - at 00.00am (May 13th).

LithuaniaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

LatviaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

MacedoniaEdit

N\A noteworthy attack at - at 00.00am (May 13th).

PolandEdit

N\A noteworthy attack at - at 00.00am (May 13th).

CzechiaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

SlovakiaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

DenmarkEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

LuxembourgEdit

N\A noteworthy attack at - at 00.00am (May 13th).

NetherlandsEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Q-Park at 9.10pm, May 13

BelgiumEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

FranceEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Renault (in France) - at 12.30pm (May 13th).
  • Renault (in France) - at N\A (May 14th).

SwedenEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Sandvik at 0.35am, May 13
  • Timrå kommun at 17.55, May 12

UKEdit

  • N\A noteworthy attack at 4.15am, May 12
  • National Health Service UK 10.30, May 12
  • NHS England- 3pm, May 12th
    • East and North Hertfordshire NHS trust,
    • St. Barts Health in London,
    • Essex Partnership university NHS trusts,
    • The university hospitals of Morecambe Bay NHS foundation trust,
    • Nottingham's hospitals
    • Liverpool's hospitals
    • Southport and Ormskirk hospital NHS trust
    • Blackpool teaching hospital NHS foundation trust.
    • Lincoln and Goolde NHS Trust.
    • United Lincolnshire Health Trusts
    • York teaching hospital NHS trust.
    • Chelmsford NHS Trust.
    • Becontree NHS Trust.
  • Nissan (Sunderland)- 12.30pm May 13th.
  • Nissan UK at 1.00am, May 13.
  • NHS Scotland- 4.30pm, May 12th.
    • Forth Division.
    • Clyde Division.
    • Grater Glasgow Division.
    • Dumfiress and Galloway Division.
    • A Dundee GP and dental surgery.
    • Scottish Ambulance Service- 18.00 on May 12th.
    • NHS Lanarkshire Division.

SpainEdit

  • Banco Bilbao Vizcaya Argentaria at 9.55pm, May 12
  • Telefónica at 9.55pm, May 12
  • N\A noteworthy attack at 4.15am, May 12
  • Telefónica S.A.- 3.00pm, May 12
  • The energy system- 4.30pm, May 12
  • El Mundo- 5.30pm, May 12
  • Public utilities at 5.00am, May 14

PortugalEdit

  • N\A noteworthy attack at 4.15am, May 12
  • A O'Porto dentist's surgery (?) - 3.00pm, May 12
  • N\A noteworthy attack at 4.10.pm, May 12
  • Portugal Telecom at 2.00pm, May 12

ItalyEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at 4.10.pm, May 12
  • University of Milano-Bicocca (Italy) N\A, 12 May

SwitzerlandEdit

N\A noteworthy attack at 12.00pm (May 15th).

IrelandEdit

N\A noteworthy attack at 12.00pm (May 15th).

IcelandEdit

N\A noteworthy attack at 12.00pm (May 15th).

The CIS victimsEdit

BelarusEdit

N\A noteworthy attack at - at 00.00am (May 13th).

ArmeniaEdit

N\A noteworthy attack at (?)- at 00.00am (May 13th).

AzerbaijanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

TurkmenistanEdit

  • N\A noteworthy attack at 4.15am, May 12

RussiaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at 4.10.pm, May 12.
  • Russia's Interior Ministry at 8.30pm, May 12.
  • Russia's Emergency Ministry at 11.15pm, May 12.
  • MegaFon at 11.15pm, May 12.
  • MegaFon at 4.40, May 13
  • Ministry of Internal Affairs at 11.00pm, May 12
  • Russian Railways on N\A, May 13
  • N\A noteworthy attack at (?), May 12
  • N\A noteworthy attack at 10.00pm, May 12
  • N\A noteworthy attack at 10.00pm, May 13
  • N\A noteworthy attack at 10.00pm, May 14
  • Sberbank at 16.55, May 15

UkraineEdit

  • N\A noteworthy attack at 4.10.pm, May 12
  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) at 10.00pm, May 12

UzbekistanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 10.00pm.

TajikistanEdit

N\A noteworthy attack at (?)- at 10.00pm.

KirghiziaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?)- at 00.00am (May 13th).

KazakhstanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 10.00pm, may 12.

The Oceanian victimsEdit

AustraliaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - 4.30pm, May 12
  • N\A noteworthy attack at - at 10.00pm, May 12.
  • N\A noteworthy attack at - at 10.00pm, May 13.
  • 1 N\A firm had a noteworthy attack on at 1.45 on May 15.

Papua Maw GuineaEdit

  • N\A noteworthy attack on at 1.45 on May 15.

New ZealandEdit

  • N\A noteworthy attack at 12.00pm (May 15th).

The African victimsEdit

KenyaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 9.15pm (May 13th).

UruguayEdit

  • N\A noteworthy attack at 4.15am, May 15
  • N\A noteworthy attack at 12.00pm (May 15th).
  • N\A noteworthy attack on at 1.45 on May 15.
  • N\A noteworthy attack at 4.15am, May 16
  • N\A noteworthy attack at 4.15pm, May 16
  • N\A noteworthy attack at - at 9.15pm (May 16th).
  • N\A noteworthy attack at - at 12.15pm (May 17th).

S. AfricaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 00.00am (May 13th).
  • N\A noteworthy attack at - at 12.30pm (May 13th).
  • Telkom (N\A, May 21)

MoroccoEdit

  • N\A noteworthy attack at 4.15am, May 12

TunisiaEdit

  • N\A noteworthy attack at 4.15am, May 12

NigerEdit

  • N\A noteworthy attack at 4.15am, May 12

NigeriaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • A Lagos car showroom attack at 4.25pm, May 12

AngolaEdit

  • N\A noteworthy attack at 4.15am, May 12

MozambiqueEdit

  • N\A noteworthy attack at 4.15am, May 12

TanzaniaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) at 10.00pm, May 12

EthiopiaEdit

N\A noteworthy attack at 12.00pm (May 15th).

UgandaEdit

N\A noteworthy attack at 12.00pm (May 15th).

GeorgiaEdit

N\A noteworthy attack at 12.00pm (May 15th).

NamibiaEdit

N\A noteworthy attack at 12.00pm (May 15th).

Congo (Brazzaville)Edit

N\A noteworthy attack at 12.00pm (May 15th).

ZimbabweEdit

N\A noteworthy attack at 12.00pm (May 15th).

ReunionEdit

N\A noteworthy attack at 12.00pm (May 15th).

MauritiusEdit

N\A noteworthy attack at 12.00pm (May 15th).

ZambiaEdit

N\A noteworthy attack at 12.00pm (May 15th).

N. SudanEdit

  • N\A noteworthy attack at 11.00am (May 15th).

CameroonEdit

  • N\A noteworthy attack at 11.00am (May 15th).

TogoEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Cape VerdeEdit

  • N\A noteworthy attack at 11.00am (May 15th).

BeninEdit

  • N\A noteworthy attack at 11.00am (May 15th).

GhanaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

AlgeriaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

MoroccoEdit

  • N\A noteworthy attack at 11.00am (May 15th).

LibyaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

TunisiaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Coate de IvoreEdit

  • N\A noteworthy attack at 11.00am (May 15th).

LiberiaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Sierra LeonineEdit

  • N\A noteworthy attack at 11.00am (May 15th).

MaliEdit

  • N\A noteworthy attack at 11.00am (May 15th).

SenegalEdit

  • N\A noteworthy attack at 11.00am (May 15th).

GambiaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

The N. American victimsEdit

MexicoEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

CanadaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Lakeridge Health (Canada) at N/A on May 13
  • University of Waterloo (?), 10,30pm, May 14
  • Cambrian College attack at 11.35am on May 15th
  • University of Montréal at 3pm, May 16

USAEdit

  • N\A noteworthy attack at 4.15am, May 12
  • A few health care minor firms (?)- 4.pm, May 12
  • 14 major firms (?) 9.30pm, May 12
  • Several noteworthy hospitals 10.30pm, May 12
  • FedEx at 10.00pm, May 12
  • FedEx at 10.30pm, May 12
  • Massachusetts Institute of Technology at 11.00pm on May 14

The Central American\Caribbean victimsEdit

GuatemalaEdit

N\A noteworthy attack at 12.30pm (May 13th).

Costa RicaEdit

N\A noteworthy attack at 12.30pm (May 13th).

Cayman IslandsEdit

N\A noteworthy attack at 12.30pm (May 13th).

PanamaEdit

N\A noteworthy attack at 12.00pm (May 15th).

NicaraguaEdit

N\A noteworthy attack at 12.00pm (May 15th).

HondurasEdit

N\A noteworthy attack at 12.00pm (May 15th).

El SalvadorEdit

N\A noteworthy attack at 12.00pm (May 15th).

JamaicaEdit

N\A noteworthy attack at 12.00pm (May 15th).

AnguillaEdit

N\A noteworthy attack at 12.00pm (May 15th).

Antigua and BarbudaEdit

N\A noteworthy attack at 12.00pm (May 15th).

ArubaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

BahamasEdit

  • N\A noteworthy attack at 11.00am (May 15th).

BarbadosEdit

  • N\A noteworthy attack at 11.00am (May 15th).

BonaireEdit

  • N\A noteworthy attack at 11.00am (May 15th).

British Virgin IslandsEdit

  • N\A noteworthy attack at 11.00am (May 15th).

CuraçaoEdit

  • N\A noteworthy attack at 11.00am (May 15th).

DominicaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Dominican RepublicEdit

  • N\A noteworthy attack at 11.00am (May 15th).

GrenadaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

GuadeloupeEdit

  • N\A noteworthy attack at 11.00am (May 15th).

MartiniqueEdit

  • N\A noteworthy attack at 11.00am (May 15th).

MontserratEdit

  • N\A noteworthy attack at 11.00am (May 15th).

SabaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Saint BarthélemyEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Saint Kitts and NevisEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Saint LuciaEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Saint MartinEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Saint Vincent and the GrenadinesEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Sint EustatiusEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Sint MaartenEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Trinidad and TobagoEdit

  • N\A noteworthy attack at 11.00am (May 15th).

Turks and Caicos IslandsEdit

  • N\A noteworthy attack at 11.00am (May 15th).

United States Virgin IslandsEdit

  • N\A noteworthy attack at 11.00am (May 15th).

GuyanaEdit

  • N\A noteworthy attack at 12.00pm (May 15th).

The South American victimsEdit

ColombiaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Instituto Nacional de Salud at 9.25pm, May 13
  • Instituto Nacional de Salud at 11.25am, May 13

BoliviaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

VenezuelaEdit

N\A noteworthy attack at - at 00.00am (May 13th).

ChileEdit

  • LATAM Airlines Group S.A at 4.10am, May 12
  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

EcuadorEdit

  • N\A noteworthy attack at 4.15am, May 12

PeruEdit

  • N\A noteworthy attack at 4.15am, May 12

ArgentinaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

BrazilEdit

  • N\A noteworthy attack at 4.15am, May 12
  • Petrabras at 10.00pm, May 12th.
  • A Reo De Janero power station (?) at 17.30 on May 13th
  • The energy sector in general (?) at 17.30 on May 13th
  • São Paulo Court of Justice at N/A on May 13
  • São Paulo Court of Justice at 00.30am May 13
  • Vivo (Telefônica Brasil) at N/A on May 13
  • Vivo at 10.20am, May 16

ParaguayEdit

N\A noteworthy attack at 12.00pm (May 15th).

The Asian victimsEdit

TaiwanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at 4.10.pm, May 12
  • N\A noteworthy attack at (?) at 10.00pm, May 12

MalaysiaEdit

  • N\A noteworthy attack at 4.15am, May 12

BurmaEdit

N\A noteworthy attack at 12.00pm (May 15th).

CambodiaEdit

N\A noteworthy attack at 12.00pm (May 15th).

NepalEdit

N\A noteworthy attack at 12.00pm (May 15th).

BhutanEdit

N\A noteworthy attack at 12.00pm (May 15th).

MaldivesEdit

N\A noteworthy attack at 12.00pm (May 15th).

BruneiEdit

N\A noteworthy attack at 12.00pm (May 15th).

VietnamEdit

  • N\A noteworthy attack at - 4.30pm, May 12
  • N\A noteworthy attack at 4.15am, May 12

PhilippinesEdit

  • N\A noteworthy attack at - 4.30pm, May 12
  • N\A noteworthy attack at 4.15am, May 12

IndonesiaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - 6.30pm, May 12.
  • Several hospitals at 5.00am, May 14
  • Dharmais Hospital 10.00am, May 13
  • Harapan Kita Hospital 10.00am, May 13
  • Universitas Jember, Indonesia at 1.30 am, May 16

JapanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?)- 6.30pm, May 12
  • N\A noteworthy attack at 4.15am, May 12
  • N\A businesses at N\A on May 15
  • Hitachi attack at 11.45pm on May 15th

ChinaEdit

  • N\A noteworthy attack at 4.15am, May 12
  • 16 major Universities at 10.00pm, May 12.
  • PetroChina at 12.10pm, May 13
  • Public Security Bureaus at 2pm, May 13
  • Sun Yat-sen University at 0.35, May 13
  • Several schools at 5.00am, May 14
  • N\A universities at N\A on May 15
  • N\A schools at N\A on May 15

SingaporeEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Harapan Kita Hospital attack at 10.30 am, May 15th

Macau SAREdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

HK SAREdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

BangladeshEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

PakistanEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

ThailandEdit

  • N\A noteworthy attack at 4.15am, May 12.
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Garena Blade and Soul at 12.35, May 13

IranEdit

  • N\A noteworthy attack at - at 10.00pm, May 12.
  • N\A noteworthy attack at 4.15am, May 12

IndiaEdit

  • N\A noteworthy attack at 4.15am, May 12.
  • N\A noteworthy attack at - at 10.00pm, May 12.
  • Andhra Pradesh Police attack at 1.50am, May 13.
  • West Bengal power supply grid at N\A on May 15.
  • A West Bengal power station at 12.05pm, on May 15.
  • Government of Kerala 3.00pm, on May 15.
  • Government of West Bengal 3.00pm, on May 15.
  • Government of Gujarat 3.00pm, on May 15.

S. KoreaEdit

  • N\A noteworthy attack at 4.15am, May 12.
  • N\A noteworthy attack at - at 06.30am (May 13th).
  • CGV- N\A on May 15th.
  • CJ CGV attack at 11.45pm on May 15th
  • Bus Station- N\A on May 15th.

TurkeyEdit

  • N\A noteworthy attack at 4.15am, May 12.
  • N\A noteworthy attack at - 4.30pm, May 12.
  • N\A noteworthy attack at (?) at 10.00pm, May 12.

The Middle Eastern victimsEdit

OmanEdit

N\A noteworthy attack at (?)- at 00.00am (May 13th).

UAEEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

IsraelEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at (?) 00.00am (May 13th).

Saudi ArabiaEdit

  • N\A noteworthy attack at 4.15am, May 12>
  • N\A noteworthy attack at (?) 00.00am (May 13th).
  • Saudi Telecom at 00.00am (May 14th).
  • Saudi Telecom Company at N\A on 14 May
  • The laptop of Waseem Ahammed at N\A on May 14th

KuwaitEdit

  • N\A noteworthy attack at 4.15am, May 12

IsraelEdit

  • N\A noteworthy attack at 4.15am, May 12

JordanEdit

  • N\A noteworthy attack at 4.15am, May 12

EgyptEdit

  • N\A noteworthy attack at 4.15am, May 12
  • N\A noteworthy attack at - at 10.00pm, May 12th.

The blame game Edit

  • http://www.libertatea.ro, some NATO figures and some people in the Romanian governments said the online terrorist group FancyBears did it.
  • The American traitor Edward Snowden, several UK tech experts and US tech experts said the American secret service did it.
  • Some French tech experts said the people who sold the data to Wikileaks cause it indirectly by spreading forbidden knowledge with the aim of causing anarchy on line.
  • Microsoft officials were angry that they were not told of the unintended 'back-door' since they could have patched it, but let the secret service use it when necessary. A spokesman accused them of slack protection of thire cyber weapons as akin to the theft of cruise missiles from a poorly guarded conventional arms depot.
  • The Russian goverment blamed the American government.
  • The American goverment blamed the N. Korean government for it.
  • The Ukrainan goverment blamed the Russian government for it. 
  • Europol blamed organised crime for both it's creation and use.
  • Some British people believed it was a Islamist\Hillary Clinton\NSA\Ukrainian world takeover bid.
  • Although cybersecurity companies Kaspersky Lab and Symantec had both said by May 16 that the code has some similarities with that previously used by the Lazarus Group, (believed to have carried out the cyberattack on Sony Pictures in 2014 and a Bangladesh bank heist in 2016 – and linked to North Korea), this may be either simple re-use of code by another group, or an attempt to shift blame – as in a false flag operation.

May 27th, 2017 BA attackEdit

The attackEdit

May 27th, 2017 saw the global hacking and crashing of British Airways' commuters. BA's main web page were still affected after 24 hours. Heathrow and Gatwick were still not fully restored after 48 hours. The UK government and BA denied it was an attack , despite it looking like a attack.

The blame gameEdit

  1. A local power cut in the location of the Indian data center.
  2. A local power surge in the location of the Indian data center.
  3. A local power cut in the location of the Heathrow data center.

June 24th, 2017, UK parliament attackEdit

The UK Parliament has been hit by a cyber-attack-102:00

The UK Parliament has been hit by a cyber-attack-1

MPs were reportedly told about the hack on Friday night and later told of difficulties in accessing their emails away from the Westminster estate. A Commons spokeswoman said the lack of email access was not a result of the cyber-attack itself but part of the steps being taken to manage the issue. She said Parliamentary authorities were liaising with the National Cyber Security Centre. The spokeswoman said: "The Houses of Parliament have discovered unauthorised attempts to access parliamentary user accounts. "We are continuing to investigate this incident and take further measures to secure the computer network.. 'Disabled remote access' "We have systems in place to protect member and staff accounts and are taking the necessary steps to protect our systems." She added: "Parliament has disabled remote access to protect the network." A number of MPs have confirmed to the BBC they are not able to access their parliamentary email accounts remotely. The attack was publicly revealed by Liberal Democrat peer Lord Rennard on Twitter who had also asked his followers to send any "urgent messages" to him by text. The incident comes just over a month since 48 of England's NHS trusts were hit by a cyber-attack. The government's National Security Strategy said in 2015 that the threat from cyber attacks was one of the "most significant risks to UK interests". The National Cyber Security Centre, which is part of intelligence agency GCHQ, started its operations in October last year. Source :http://www.bbc.com/news/uk-40394074 original video :https://www.youtube.com/watch?v=mcNNbF4Xjok

Some parliamentary staff's, many MPs' and some peers (Lords) have had thire computers shut down and thire emails hacked on June 24th, 2017. Russia is blamed for Westminster attack.

Global attacks of June 27th, 2017Edit

OverviewEdit

A Petya cyber attack has

There is no 'kill switch' for Petya.

.

The virusEdit

It is a form of ransomware that locks you computer until you pay an anonymous account $300 in bitcoins. The Berlin-based email service provider Posteo closed the account before the infection became widely known, thus minimising ransom payments.

Computers targetedEdit

Windows computers that are .

The global victimsEdit

Global multinational law firm DLA Piper: A major attack on June 27, as of 22.00.

  • TNT Express's assets world wide. June 27, as of 19.30.

The European victimsEdit

SpainEdit

  • N\A firms. June 27, as of 22.00.

UKEdit

WPP Plc, (Wire and Plastic Products Plc). June 27, as of 22.00.

DenmarkEdit

  • A.P. Moller–Maersk Group June 27, as of 10.00.
  • A.P. Moller–Maersk Group home page vandalized. It is probably a unrelated act of vandalism by a troll. June 27, as of 22.00.

GermanyEdit

  • Deutsche's Post June 27, as of 22.00.
  • Deutsche's Bhann June 27, as of 14.00.

FranceEdit

  • Saint Gobain. June 27, as of 22.00.

NorwayEdit

  • N\A international firm. June 27, as of 22.00.

NetherlandsEdit

  • TNT Express. June 27, as of 22.00.
  • N\A attack at 23.30, June 2017.

BelgiumEdit

  • TNT Express's Liege depot and sorting office. June 28, at 19.00.

RomaniaEdit

  • N\A attack at 23.30.

The CIS victimsEdit

UkraineEdit

  • Deutsche Post's Express division in the Ukraine: A devastating attack on June 27, as of 22.00.
  • Ukrainian shops from the German firm Metro: A devastating attack on June 27, as of 22.00.
  • Chernobyl powers station: Some of the safety systems at Chernobyl, June 27, as of 10.00.
  • Government departments: A devastating attack on June 27, as of 22.00.
  • The central bank: A minor attack on June 27, as of 10.00.
  • A state-run aircraft manufacturer: A devastating attack on June 27, as of 22.00.
  • Kiev metro: A devastating attack on June 27, as of 22.00.
  • Public Banks: A devastating attack on June 27, as of 10.00.
  • Kiev Boryspil Airport: A devastating attack on June 27, as of 10.00.
  • The government's home page: A devastating attack on June 27, as of 22.00.
  • The state power distributor: A minor attack on June 27, as of 22.00.
  • The state postal service: A devastating attack on June 27, as of 10.00.
  • Channel 24 TV News: A devastating attack on June 27, as of 10.00.

RussiaEdit

  • Rosneft: A major attack on June 27, as of 22.00.
  • Central bank: A minor attack on June 27, as of 10.00.
  • Evraz: A major attack on June 27, as of 22.00.
  • Russian branches of America's Home Credit consumer lender: A devastating attack on June 27, as of 10.00.
  • Public banks: A minor attack on June 27, as of 22.00.

The N. American victimsEdit

USAEdit

  • Merck & Co: A minor attack on June 27, as of 22.00.
  • Mondelez International: A modest attack on June 27, as of 22.00.
  • A west Pennsylvania hospital: A minor attack on June 27, as of 22.00.
  • Nabisco: A modest attack on June 27, as of 22.00.
  • Mars Inc: A minor attack on June 27, as of 22.00.

The Asian victimsEdit

IndiaEdit

  • Indian unit of British company Reckitt Benckiser Group Plc: A minor attack on June 27, as of 22.00.
  • Indian unit of German company Beiersdorf AG: A minor attack on June 27, as of 22.00.

The blame gameEdit

  1. Some computer security experts blames N. Korea, China, Russia, Iran and Ukraine.
  2. The Ukrainian Interior Minister Arsen Avakov said he believed it had originated from Russia.
  3. An advisory to Interior Minister Arsen Avakov said he believed it had originated from Russia.

22 June UK rail ticket machine attackEdit

The ticket machines on-screen messages said they had "no online connectivity", making them unable to send payment card details from circa 06:00 BST to 09:00 BST. A spokesman for the Rail Delivery Group (RDG) told the BBC it was resolved 09:00 BST by and it was.

The Tuxissa HoaxEdit

OverviewEdit

Tuxissa is a fictional computer virus hoax made up by Humorix, a humor website on Linux.

Although the website states that all articles there are fake, anti-virus software makers such as Symantec, Sophos and F-Secure had pages for the Tuxissa virus hoax.

How it works (in theory)Edit

The virus is based on the Melissa virus, with its aim to install Linux onto the victim's computer without the owner's notice. It is spread via e-mail, contained within a message titled "Important Message About Windows Security". It first spreads the virus to other computers, then it downloads a stripped-down version of Slackware, and uncompresses it onto the hard disk. The Windows Registry is finally deleted, and the boot options changed. There the virus destroys itself when it reboots the computer at the end, with the user facing the Linux login prompt.

Also seeEdit

  1. Science
  2. Help desk
  3. The 5 Eyes
  4. Codeine addiction help
  5. The YK2\Millennium bug
  6. How to tell your election was rigged!?
  7. How to save your PC during Cyber-war\E-warfair

LinksEdit

  1. https://en.wikipedia.org/wiki/TalkTalk_Group
  2. http://www.dailymail.co.uk/news/article-3991714/Hundreds-thousands-TalkTalk-Post-Office-broadband-users-knocked-internet-cyber-attack-seizes-control-routers.html
  3. http://www.bbc.co.uk/news/technology-38223805
  4. http://www.telegraph.co.uk/news/uknews/law-and-order/11952192/TalkTalk-faces-new-questions-over-cyber-attack.html
  5. https://www.https://www.organicfacts.net/home-remedies/15-tips-for-healthy-eyes.html?utm_source=onesignal20aug17
  6. https://www.wired.com/story/donald-trump-charlottesville-press-conference-white-supremacy/?mbid=nl_81617_p3&CNDID=50121752
  7. https://www.wired.com/story/the-robots-will-be-soft-and-cuddly-and-heal-their-own-wounds/?mbid=nl_81817_p1&CNDID=50121752
  8. https://www.wired.com/story/how-to-get-the-perfect-eclipse-shot-using-your-smartphone/?mbid=nl_82017_p1&CNDID=50121752
  9. http://wired.us8.list-manage2.com/track/click?u=d6a9b4ef731bfa16b27259de6&id=1c0d349a0f&e=beaf9ada01
  10. https://www.wired.com/story/spacex-launches-its-12th-resupply-mission-to-the-iss/?mbid=nl_81417
  11. https://www.wired.com/story/malware-dna-hack/?mbid=nl_81017_p1&CNDID=50121752
  12. https://www.wired.com/2017/08/6-great-laptops-tablets-school/?mbid=nl_81217_p1&CNDID=50121752
  13. http://wired.us8.list-manage.com/track/click?u=d6a9b4ef731bfa16b27259de6&id=2c0a58f35b&e=beaf9ada01
  14. http://wired.us8.list-manage2.com/track/click?u=d6a9b4ef731bfa16b27259de6&id=06cb025634&e=beaf9ada01wired.com/story/your-phone-is-your-most-vulnerable-gadget-protect-it-now/
  15. http://www.bbc.co.uk/news/world-europe-40471310
  16. http://www.bbc.co.uk/news/technology-40367628
  17. http://www.france24.com/en/20170627-historic-cyber-attack-hits-ukraine-government-businesses
  18. http://www.france24.com/en/20170624-british-parliament-hit-cyber-security-attack
  19. http://www.reuters.com/finance/stocks/overview?symbol=BBVA.MC
  20. https://www.bbva.com/en/us/
  21. https://en.wikipedia.org/wiki/Banco_Bilbao_Vizcaya_Argentaria
  22. https://finance.yahoo.com/news/dla-piper-hit-cyber-attack-105502732.html
  23. https://finance.yahoo.com/news/apos-apos-nightmare-apos-dla-060542108.html
  24. https://finance.yahoo.com/news/ransomware-attack-dla-piper-serves-055402314.html
  25. https://bbva.es/particulares/index.jsp
  26. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
  27. http://abcnews.go.com/topics/news/cyber-attack.htm
  28. https://www.wired.com/story/us-farms-could-suffer-as-the-arctic-heats-up/?mbid=nl_71017_p3&CNDID=
  29. https://www.wired.com/story/strange-noise-in-gravitational-wave-data-sparks-debate/
  30. http://abcnews.go.com/topics/news/cyber-attack.htm
  31. http://abcnews.go.com/Technology/wireStory/hackers-strike-europe-sparking-widespread-disruption-48301067
  32. http://abcnews.go.com/International/massive-cyberattack-strikes-europe/story?id=48303592
  33. https://www.usatoday.com/story/news/2017/06/24/british-parliaments-email-system-hit-cyber-attack/426047001/
  34. https://www.wired.com/story/why-incarceration-is-skyrocketing-in-rural-america?mbid=nl_61317_p1&CNDID=50121752
  35. https://www.wired.com/story/apple-podcasts-app-revolutionary/?mbid=nl_61317_p2&CNDID=50121752
  36. https://www.wired.com/story/view-the-eclipse-with-this-simple-homemade-gadget/
  37. https://www.wired.com/story/give-me-a-bundle-for-cord-cutters/
  38. https://www.wired.com/story/when-exactly-will-the-eclipse-happen/
  39. https://www.wired.com/story/phoenix-flights-canceled-heat?mbid=nl_62117_p6&CNDID=50121752
  40. https://www.wired.com/story/petya-ransomware-outbreak-eternal-blue?mbid=nl_62717_p2&CNDID=50121752
  41. https://www.wired.com/story/check-out-junos-stirring-closeups-of-jupiters-big-red-spot/?mbid=nl_71317_p1&CNDID=50121752
  42. https://www.wired.com/story/xiaoxiao-xu-aeronautics-in-the-backyard?mbid=nl_71317_p2&CNDID=50121752
  43. https://www.gq.com/campaigns/glenlivetsweeps/?dclid=CNKC06CH59UCFRZFGwod2MoKOA
  44. https://www.wired.com/story/xiaoxiao-xu-aeronautics-in-the-backyard?mbid=nl_71317_p2&CNDID=50121752
  45. https://www.wired.com/story/new-super-nes-classic-continues-nintendos-retro-renaissance?mbid=nl_62717_p6&CNDID=50121752
  46. https://www.wired.com/story/supreme-court-travel-ban-injunction/?mbid=nl_62717_p4&CNDID=50121752
  47. https://www.wired.com/story/petya-ransomware-outbreak-eternal-blue?mbid=nl_62717_p2&CNDID=50121752
  48. https://www.wired.com/story/congress-autonomous-self-driving-car-regulations/?mbid=nl_62117_p8&CNDID=50121752
  49. https://www.wired.com/story/timeline-uber-crises?mbid=nl_62117_p3&CNDID=50121752
  50. https://www.wired.com/story/quantum-computing-factory-taking-on-google-ibm?mbid=nl_62117_p2&CNDID=50121752
  51. https://www.wired.com/story/inside-microsofts-ai-comeback/?mbid=nl_62117_p1&CNDID=50121752
  52. https://www.wired.com/story/the-unknown-startups-fueling-aerospace-with-fancy-tech?mbid=nl_61317_p3&CNDID=50121752
  53. https://www.wired.com/story/apple-podcasts-app-revolutionary/?mbid=nl_61317_p2&CNDID=50121752
  54. https://www.wired.com/story/jill-tarter-never-found-aliensbut-her-successors-might/?mbid=nl_7517_p1&CNDID=
  55. http://www.cbsnews.com/live/video/barcelona-train-crash-injures-dozens/?ftag=CNM15cf32c
  56. http://wired.us8.list-manage.com/track/click?u=d6a9b4ef731bfa16b27259de6&id=be6e3de040&e=beaf9ada01
  57. https://www.wired.com/2017/06/silicon-valley-still-doesnt-care-work-life-balance/?mbid=nl_6417_p1&CNDID=50121752
  58. https://www.wired.com/story/uber-lyft-crisis?mbid=nl_61417_p3&CNDID=50121752

https://www.wired.com/story/ibm-z-mainframe-encryption?mbid=nl_71717_p1&CNDID=50121752

  1. https://www.wired.com/story/president-trumps-lies-and-untruths/?mbid=nl_7217_p1&CNDID=
  2. https://www.wired.com/story/tesla-model-s-crash-test-safety-iihs?mbid=nl_7717_p1&CNDID=
  3. https://www.wired.com/story/congress-trump-power-grid-malware-letter/?mbid=nl_62217_p3&CNDID=
  4. https://www.wired.com/story/russian-hackers-attack-ukraine?mbid=nl_62017_p1&CNDID=
  5. https://www.wired.com/story/congress-trump-power-grid-malware-letter/?mbid=nl_62217_p3&CNDID=
  6. http://thehill.com/homenews/news/339307-uk-parliament-hit-by-cyber-attack
  7. http://uk.businessinsider.com/r-uk-lawmakers-hit-by-cyber-security-attack-media-reports-2017-6?r=US&IR=T
  8. https://www.theguardian.com/politics/2017/jun/25/cyber-attack-on-uk-parliament-russia-is-suspected-culprit
  9. https://www.organicfacts.net/home-remedies/best-foods-for-healthy-weight-loss.html
  10. https://www.yahoo.com/news/latest-ryan-faith-mcconnell-save-143552960.html?soc_trk=gcm&soc_src=247b0a11-b86c-3f9e-9c65-cafeb511106c&.tsrc=notification-brknews
  11. https://www.wired.com/story/congress-trump-power-grid-malware-letter/?mbid=nl_62217_p3&CNDID=
  12. https://www.theguardian.com/politics/2017/jun/24/cyber-attack-parliament-email-access
  13. https://www.thesun.co.uk/news/3875981/cyber-attack-westminster-security-shut-down/
  14. https://www.rt.com/uk/393898-cyber-attack-westminster-uk/
  15. https://www.wikiwand.com/en/Timeline_of_computer_viruses_and_worms
  16. https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/
  17. http://fortune.com/2016/03/12/malware-bangladesh-bank-heist/
  18. https://www.wikiwand.com/en/List_of_bank_robbers_and_robberies
  19. https://www.wikiwand.com/en/Bangladesh_Bank_robbery
  20. http://archive.dhakatribune.com/bangladesh/2016/mar/11/anatomy-bank-robbery
  21. https://www.wikiwand.com/en/Bangladesh_Bank_robbery
  22. https://www.wired.com/story/russia-election-hacking-playbook?mbid=nl_6917_p2&CNDID=
  23. https://www.wired.com/2017/04/the-cure-for-pain/?mbid=nl_61017_p2&CNDID=
  24. https://www.wired.com/story/apple-campus/?mbid=nl_61017_p1&CNDID=
  25. https://en.wikipedia.org/wiki/July_2009_cyberattacks
  26. https://www.cnet.com/news/botnet-worm-in-dos-attacks-could-wipe-data-out-on-infected-pcs/
  27. http://www.csmonitor.com/World/Asia-Pacific/2009/0709/p06s23-woap.html
  28. https://web.archive.org/web/20090712051234/
  29. http://www.reuters.com/article/bigMoney/idUS292302408420090709
  30. https://www.pri.org/stories/2009-07-11/cyberattack-rocks-south-korea
  31. https://web.archive.org/web/20090711054452/
  32. http://www.koreatimes.co.kr/www/news/biz/2009/07/123_48203.html
  33. https://www.organicfacts.net/yoga.html?utm_source=onesignal21jun17
  34. https://www.yahoo.com/news/deliberations-milwaukee-police-shooting-enter-second-day-052037880.html?soc_trk=gcm&soc_src=6d5f98a9-30da-3e21-bf79-2d16fde5d3d4&.tsrc=notification-brknews
  35. https://www.yahoo.com/news/un-slams-staggering-loss-civilian-life-raqa-163954662.html
  36. http://www.mayoclinic.org/diseases-conditions/high-blood-pressure/basics/risk-factors/con-20019580
  37. https://www.wired.com/story/russian-hackers-attack-ukraine?mbid=nl_62017_p1&CNDID=
  38. https://www.yahoo.com/news/pence-tells-catholics-prayer-breakfast-trump-back-164909680.html
  39. https://www.yahoo.com/news/aid-convoy-besieged-area-comes-under-fire-syria-110259988.html
  40. https://www.yahoo.com/news/michigan-airport-evacuated-police-officer-injured-144544805.html
  41. https://www.wired.com/story/russia-election-hacking-playbook?mbid=nl_6917_p2&CNDID=
  42. https://www.wired.com/2017/04/the-cure-for-pain/?mbid=nl_61017_p2&CNDID=
  43. https://www.wired.com/story/apple-campus/?mbid=nl_61017_p1&CNDID=
  44. https://web.archive.org/web/20090716043909/
  45. https://www.google.com/hostednews/ap/article/ALeqM5jO5PtkM_1FjwMZjh3LS74g26yiUQD99CRCO80
  46. https://web.archive.org/web/20110615004758/
  47. http://www.networkworld.com/news/2009/071409-uk-not-north-korea-source.html?ap1=rcb
  48. http://english.yonhapnews.co.kr/northkorea/2009/10/30/0401000000AEN20091030002200315.HTML
  49. https://en.wikipedia.org/wiki/July_2009_cyberattacks
  50. https://www.theguardian.com/world/2009/jul/11/south-korea-blames-north-korea-cyber-attacks
  51. https://www.organicfacts.net/home-remedies/best-foods-for-healthy-weight-loss.html?utm_source=onesignal7jun17
  52. https://www.organicfacts.net/organic-products/organic-food/health-benefits-of-organic-food.html?utm_source=OneSignalJune52017
  53. https://uk.news.yahoo.com/nigel-farage-apos-vindicated-apos-155700974.html
  54. http://www.msn.com/en-gb/news/uknews/mass-brawl-involving-50-people-breaks-out-on-beach-as-temperatures-soared-leaving-teenage-boy-with-head-injury/ar-BBBAhqx?li=AAmiR2Z&ocid=spartandhp
  55. https://uk.finance.yahoo.com/news/battered-oil-fights-back-sterling-hit-mays-poll-084339186--finance.html
  56. https://uk.news.yahoo.com/best-wild-swimming-spots-near-090000670.html
  57. https://uk.finance.yahoo.com/news/tech-industry-dominated-5-big-213712374.html
  58. https://uk.news.yahoo.com/police-identify-suspect-double-killing-oregon-train-152527015.html
  59. http://uk.businessinsider.com/samsung-galaxy-s8-apple-iphone-google-pixel-smartphone-2017-4?r=US&IR=T
  60. https://uk.finance.yahoo.com/news/ee-vodafone-uk-worst-mobile-060120664.html
  61. http://www.standard.co.uk/lifestyle/travel/8-of-the-best-sandy-beaches-near-london-a3241551.html
  62. https://uk.sports.yahoo.com/news/apos-maybe-won-apos-t-083039973.html
  63. http://www.standard.co.uk/lifestyle/travel/8-of-the-best-sandy-beaches-near-london-a3241551.html
  64. https://www.eurowings.com/en/booking/offers/flights-from/GB.html?gwc=add2_b810_YahooNetzwerkUK_5212_84705_70648
  65. https://uk.news.yahoo.com/nhs-trauma-centres-told-prepare-potential-terror-attack-171900435.html
  66. http://www.dictionary.com/slideshows/10-weather-words-you-need-to-know?param=DcomSERP#Amazing-Weather-Words
  67. https://www.organicfacts.net/health-benefits/green-tea.html?utm_source=Onesignal28may2017
  68. https://www.organicfacts.net/home-remedies/home-remedies-for-amenorrhea.html?utm_source=OneSignal29may2017
  69. https://uk.yahoo.com/news/eight-hurt-drunk-britons-plough-pedestrians-marbella-hit-122800308.html
  70. https://uk.yahoo.com/finance/news/rolls-royce-might-most-expensive-163402139.html
  71. https://uk.yahoo.com/news/olivia-newton-john-confirms-breast-cancer-returned-002000900.html
  72. https://www.organicfacts.net/health-benefits/other/epsom-salts.html?utm_source=OneSignalJune12017
  73. https://www.theguardian.com/politics/live/2017/jun/08/general-election-results-2017-uk-live-labour-tories-corbyn-may-election-results-live-news-line
  74. https://en.wikipedia.org/wiki/July_2009_cyberattacks
  75. http://www.bbc.co.uk/news/technology-12646052
  76. https://www.yahoo.com/tech/cyberattack-major-cyber-attacks-over-past-10-years-154337949.html
  77. https://www.organicfacts.net/health-benefits/other/health-benefits-of-exercise.html?utm_source=OneSignal30may2017
  78. https://uk.yahoo.com/news/olivia-newton-john-confirms-breast-cancer-returned-002000900.html
  79. https://www.organicfacts.net/home-remedies/15-ways-to-lose-belly-fat.html?utm_source=OneSignalJune32017
  80. http://www.bigbeadlittlebead.com/guides_and_information/history_of_czech_glass_beads.php
  81. https://www.organicfacts.net/health-benefits/other/health-benefits-of-laughter.html?utm_source=OneSignalJune22017
  82. https://www.organicfacts.net/home-remedies/home-remedies-for-baldness.html?utm_source=OneSignalJune42017
  83. https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
  84. https://www.organicfacts.net/health-benefits/herbs-and-spices/moringa-tea.html?utm_source=OneSignalJune62017
  85. http://www.bbc.co.uk/news/technology-12646052
  86. http://www.thefullwiki.org/July_2009_cyber_attacks
  87. https://www.defensetech.org/2009/07/13/us-ignored-warnings-of-cyber-attack/
  88. https://www.dhs.gov/sites/default/files/publications/Cyber%20Storm%20II%20Final%20Report.pdf
  89. https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
  90. http://www.mashpedia.com/SQL_injection
  91. https://nakedsecurity.sophos.com/2012/01/31/tinkode-arreste/
  92. http://blog.csdn.net/lanbingkafei/article/details/8866558
  93. https://www.isnare.com/
  94. https://it.slashdot.org/story/10/11/08/1515214/royal-navy-website-hacked-passwords-revealedhttps://en.wikipedia.org/wiki/SQL_injection
  95. https://www.organicfacts.net/tobacco-addiction.html?utm_source=OneSignal31May2017
  96. https://en.wikipedia.org/wiki/SQL_injection
  97. https://www.revolvy.com/topic/SQL%20injection&item_type=topic
  98. http://www.wow.com/wiki/SQL_injection
  99. https://en.wikipedia.org/wiki/July_2009_cyber_attacks
  100. https://en.wikipedia.org/wiki/Titan_Rain#Attackers
  101. https://web.archive.org/web/20061222110758/http://www.breitbart.com/news/2005/12/12/051212224756.jwmkvntb.html
  102. https://en.wikipedia.org/wiki/Reverse_Deception
  103. https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
  104. http://news.bbc.co.uk/1/hi/technology/7208511.stm
  105. http://www.darkreading.com/blog/archives/2009/03/authoritatively.html
  106. https://www.theguardian.com/world/2007/may/17/topstories3.russia
  107. http://www.economist.com/node/16478792
  108. http://gzt.ru/world/2008/02/07/220025.html
  109. http://error.talktalk.co.uk/main?ParticipantID=nmum6rqpq5q6gkm3933n3nf9s76onu6r&FailedURI=http%3A%2F%2Fwww.smoney.ru%2Farticle.shtml%3F2007%252F05%252F28%252F3004%3D&FailureMode=1&Implementation=&AddInType=4&Version=pywr1.0&Referer=https%3A%2F%2Fen.wikipedia.org%2F&ClientLocation=uk
  110. http://www.smoney.ru.
  111. https://www.veracode.com/security/sql-injection
  112. https://www.acunetix.com/websitesecurity/sql-injection/
  113. https://www.w3schools.com/sql/sql_injection.asp
  114. http://www.xsql.com/products/sql_server_data_compare/
  115. https://shop.secpoint.com/shop/cloud-penetrator-s7-419p.html
  116. https://www.systematix.co.uk/sql-database-programming-training/microsoft-sql-server-training-courses/
  117. https://www.wikiwand.com/en/SQL_injection
  118. https://mybroadband.co.za/news/security/211576-telkom-systems-crippled-by-wannacry-ransomware.html
  119. https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
  120. http://www.focus.de/digital/es-ist-ein-technischer-fehler-aufgetreten-nutzer-koennen-twitter-nicht-aufrufen_id_7156840.html
  121. http://www.haz.de/Nachrichten/Wirtschaft/Deutschland-Welt/WannaCry-Kundendienst-von-O2-ausgefallen
  122. https://en.wikipedia.org/wiki/Lazarus_Group
  123. http://www.politico.com/story/2014/12/fbi-rejects-alternate-sony-hack-theory-113893
  124. http://www.bbc.co.uk/news/technology-40010996
  125. http://www.inss.org.il/uploadImages/systemFiles/No.%20646%20-%20Gabi%20and%20Dudi%20for%20web.pdf
  126. https://en.wikipedia.org/wiki/Sony_Pictures_hack
  127. http://www.cbsnews.com/videos/the-attack-on-sony/
  128. http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/
  129. http://www.cbsnews.com/news/north-korean-cyberattack-on-sony-60-minutes/
  130. https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
  131. https://en.wikipedia.org/wiki/Lazarus_Group
  132. http://www.politico.com/story/2014/12/fbi-rejects-alternate-sony-hack-theory-113893
  133. http://www.bbc.co.uk/news/technology-40010996
  134. http://www.inss.org.il/uploadImages/systemFiles/No.%20646%20-%20Gabi%20and%20Dudi%20for%20web.pdf
  135. https://en.wikipedia.org/wiki/Sony_Pictures_hack
  136. http://www.cbsnews.com/videos/the-attack-on-sony/
  137. http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/
  138. http://www.cbsnews.com/news/north-korean-cyberattack-on-sony-60-minutes/
  139. https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
  140. https://en.wikipedia.org/wiki/July_2009_cyber_attacks
  141. https://en.wikipedia.org/wiki/ILOVEYOU
  142. https://kb.iu.edu/d/aioe
  143. http://computer.howstuffworks.com/worst-computer-viruses2.htm
  144. http://www.symantec.com/avcenter/venc/data/tuxissa-hoax.html
  145. http://www.sophos.com/virusinfo/hoaxes/tuxissa.html
  146. http://humorix.org/articles/1999/03/tuxissa/
  147. http://www.f-secure.com/v-descs/april1j.shtml
  148. http://www.techrepublic.com/article/security-alert-no-love-in-iloveyou-worm/
  149. https://images.search.yahoo.com/search/images;_ylt=AwrBT9hHFCtZWrIA3ylXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--?p=worm+and+ILOVEYOU&fr=yset_chr_cnewtab
  150. https://www.symantec.com/security_response/writeup.jsp?docid=2000-122113-1425-99
  151. https://web.archive.org/web/20080803094019/http://www.csail.mit.edu/biographies/PI/bioprint.php?PeopleID=301
  152. https://en.wikipedia.org/wiki/July_2009_cyber_attacks
  153. https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
  154. https://en.wikipedia.org/wiki/July_2009_cyber_attacks
  155. https://en.wikipedia.org/wiki/Morris_worm
  156. https://www.cert.org/historical/advisories/CA-2001-26.cfm
  157. https://en.wikipedia.org/wiki/Nimda
  158. https://web.archive.org/web/20110722192419/http://www.eeye.com/Resources/Security-Center/Research/Security-Advisories/AL20010717
  159. https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
  160. https://en.wikipedia.org/wiki/ILOVEYOU
  161. https://en.wikipedia.org/wiki/Melissa_(computer_virus)
  162. https://en.wikipedia.org/wiki/ILOVEYOU
  163. https://kb.iu.edu/d/aioe
  164. https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
  165. http://computer.howstuffworks.com/worst-computer-viruses2.htm
  166. http://www.symantec.com/avcenter/venc/data/tuxissa-hoax.html
  167. http://www.sophos.com/virusinfo/hoaxes/tuxissa.html
  168. http://humorix.org/articles/1999/03/tuxissa/
  169. http://www.f-secure.com/v-descs/april1j.shtml
  170. http://www.techrepublic.com/article/security-alert-no-love-in-iloveyou-worm/
  171. https://images.search.yahoo.com/search/images;_ylt=AwrBT9hHFCtZWrIA3ylXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--?p=worm+and+ILOVEYOU&fr=yset_chr_cnewtab
  172. https://www.symantec.com/security_response/writeup.jsp?docid=2000-122113-1425-99
  173. https://web.archive.org/web/20080803094019/http://www.csail.mit.edu/biographies/PI/bioprint.php?PeopleID=301
  174. https://en.wikipedia.org/wiki/Morris_worm
  175. https://www.cert.org/historical/advisories/CA-2001-26.cfm
  176. https://en.wikipedia.org/wiki/Nimda
  177. https://web.archive.org/web/20110722192419/http://www.eeye.com/Resources/Security-Center/Research/Security-Advisories/AL20010717
  178. https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
  179. https://en.wikipedia.org/wiki/ILOVEYOU
  180. https://en.wikipedia.org/wiki/Melissa_(computer_virus)
  181. https://en.wikipedia.org/wiki/AIDS_%28Trojan_horse%29
  182. https://en.wikipedia.org/wiki/AIDS_(computer_virus)
  183. http://www.bbc.co.uk/news/live/world-40069977
  184. http://www.symantec.com/security_response/writeup.jsp?docid=2004-020909-2916-99
  185. https://r.search.yahoo.com/_ylt=AwrC1CnNaylZgwoAZx7QtDMD;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--/RV=2/RE=1495915597/RO=10/RU=https%3a%2f%2fwww.yahoo.com%2fnews%2fbritish-airways-chaos-computer-systems-103024552.html/RK=1/RS=bDFJTu_VBzE3B2amcDQ6fI0Tsk4-
  186. https://www.yahoo.com/news/british-airways-says-computer-outage-causing-global-delays-102858395.html
  187. https://en.wikipedia.org/wiki/Mimail
  188. https://www.yahoo.com/tech/british-airways-apologises-apos-systems-105600900.html
  189. http://edition.cnn.com/2004/TECH/internet/01/28/mydoom.spreadwed/
  190. https://en.wikipedia.org/wiki/Mydoom#Timeline
  191. https://en.wikipedia.org/wiki/Doomjuice
  192. https://www.symantec.com/security_response/writeup.jsp?docid=2003-080109-2046-99
  193. https://en.wikipedia.org/wiki/Mimail
  194. https://www.wired.com/2009/07/mydoom/
  195. http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002
  196. http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
  197. https://www.usatoday.com/story/tech/news/2017/03/08/wikileaks-cia-cyberwar-pearl-harbor-cyberweapons/98878016/
  198. https://en.wikipedia.org/wiki/WannaCry
  199. https://www.forbes.com/sites/kevinmurnane/2017/05/13/how-to-protect-yourself-from-the-global-wanacry-ransomware-attack/
  200. http://webcache.googleusercontent.com/search?q=cache:http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html&gws_rd=cr&ei=anEdWb6hIeLYgAa4tJ_QAw
  201. http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
  202. http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
  203. http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
  204. http://webcache.googleusercontent.com/search?q=cache:http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html&gws_rd=cr&ei=CW8dWfayHMuNgAb5mI7QBQ
  205. https://www.svt.se/nyheter/inrikes/timra-kommun-drabbat-av-utpressningsattack
  206. https://m.tempo.co/read/news/2017/05/17/058876241/pemda-pastikan-suplai-dan-harga-pangan-aman-di-sultra-aman
  207. http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
  208. https://www.timeanddate.com/time/zones/wib
  209. https://www.timeanddate.com/time/zones/edt
  210. http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
  211. https://www.timeanddate.com/time/zones/edt
  212. https://www.timeanddate.com/time/zones/wib
  213. http://internacional.elpais.com/internacional/2017/05/15/actualidad/1494855826_022843.html
  214. https://en.wikipedia.org/wiki/Sberbank_of_Russia
  215. http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html
  216. https://www.svoboda.org/a/28483898.html
  217. http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
  218. http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024
  219. http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
  220. http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
  221. https://www.timeanddate.com/time/zones/est
  222. https://www.timeanddate.com/time/zones/sgt
  223. https://www.timeanddate.com/time/zones/ist
  224. http://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806
  225. http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
  226. http://www.koreaherald.com/view.php?ud=20170515000574
  227. http://www.cbc.ca/news/canada/sudbury/cambrian-college-ransomware-hack-1.4093634
  228. http://uk.businessinsider.com/r-kremlin-says-ukraines-accusation-of-cyber-attack-groundless-2017-5?yptr=yahoo
  229. https://www.theguardian.com/society/2017/may/13/jeremy-hunt-ignored-warning-signs-before-cyber-attack-hit-nhs
  230. https://www.theguardian.com/technology/2017/may/15/wannacry-ransomware-north-korea-lazarus-group
  231. https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
  232. http://www.hackmageddon.com/category/security/cyber-attacks-timeline/
  233. http://thehill.com/policy/cybersecurity/333575-nsa-leakers-that-lead-to-wanna-cry-to-offer-wine-of-the-month-club-for
  234. http://bgr.com/2017/05/15/wanna-cry-ransomware-virus-windows-wannacry-explainer/
  235. http://buy-static.norton.com/norton/ps/bb/ukhard/hybrid/3up_navb_ns1_ns_uk_en_hybrid60_tw_nbfr.html?om_sem_cid=hho_sem_sy:gb:bng:en:e
  236. https://origin-nyi.thehill.com/policy/technology/333732-ransomware-attack-inflames-intelligence-scrutiny
  237. https://www.theguardian.com/technology/2017/may/15/wannacry-ransomware-north-korea-lazarus-group
  238. https://uk.yahoo.com/finance/news/over-europe-people-suddenly-stopped-115501848.html
  239. https://uk.yahoo.com/news/polands-commitment-rule-law-gets-eu-member-state-114406632.html
  240. https://uk.yahoo.com/news/general-election-2017-briefing-everything-071026962.html
  241. https://uk.finance.yahoo.com/topic/brexit
  242. https://uk.style.yahoo.com/sweden-apos-eurovision-act-slams-090955997.html
  243. https://www.kaspersky.co.uk/products-services/acqlp-3up-nb?ksid=607f9373-6a54-4e61-91e7-3fb49d2b9494&ksprof_id=465&ksaffcode=48924&ksdevice=c
  244. http://www.hackmageddon.com/2016/11/10/16-31-october-2016-cyber-attacks-timeline/
  245. https://www.theguardian.com/technology/2017/may/14/cyber-attack-escalate-working-week-begins-experts-nhs-europol-warn
  246. http://www.news.com.au/technology/online/hacking/cyber-attack-in-australia-2017-business-hit-by-ransomware/news-story/598e9382bcff0c12ca3e84f960ed8dc1
  247. http://www.bbc.co.uk/news/uk-39912825
  248. http://www.telegraph.co.uk/technology/2017/05/15/nhs-cyber-attack-latest-authorities-warn-day-chaos-ransomware/
  249. http://www.msn.com/en-gb/news/other/labours-barry-gardiner-in-angry-clash-with-nick-robinson-over-sun-frontpage/ar-BBB2PVb
  250. http://www.msn.com/en-gb/news/techandscience/cyberattacks-how-can-you-protect-yourself/ar-BBB8ywQ?li=AAmiR2Z&ocid=spartandhp
  251. https://twitter.com/AmjedShacker/status/863749329017868293
  252. https://nakedsecurity.sophos.com/2017/05/14/wannacry-benefits-from-unlearned-lessons-of-slammer-conficker/
  253. https://twitter.com/AmjedShacker/status/863749329017868293
  254. https://nakedsecurity.sophos.com/2017/05/14/wannacry-benefits-from-unlearned-lessons-of-slammer-conficker/
  255. http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024
  256. http://www.libertatea.ro/stiri/exclusiv-roasa-de-saracie-o-mama-si-ingropat-fiul-curtea-casei-povestea-unei-batrane-de-89-de-ani-dintr-un-sat-maramuresean-care-nu-vrut-sa-duca-cu-ea-mormant-un-secret-cutremurator-1838662
  257. http://www.news.com.au/technology/online/hacking/massive-cyber-attack-creates-chaos-around-the-world/news-story/b248da44b753489a3f207dfee2ce78a9
  258. http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
  259. https://www.svoboda.org/a/28483898.html
  260. http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
  261. http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
  262. http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
  263. http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
  264. http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html
  265. https://www.blognone.com/node/92406
  266. https://www.facebook.com/th.bns/photos/a.184801638679603.1073741828.177204056106028/222434488249651/
  267. https://www.theguardian.com/society/2017/may/12/global-cyber-attack-nhs-trusts-malware
  268. https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3
  269. http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html
  270. http://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-kampt-nog-steeds-met-ransomware-aanval.html?redirect=1
  271. http://www.nu.nl/131841/video/accu-laadt-elektrische-auto-in-vijf-minuten-op.html
  272. http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/
  273. http://observador.pt/2017/05/15/revelada-a-identidade-do-heroi-acidental-que-travou-ciberataque-com-10-euros/
  274. http://stirileprotv.ro/stiri/actualitate/atacul-informatic-global-ar-fi-afectat-si-uzina-dacia-de-la-mioveni-reactia-ministrului-comunicatiilor-augustin-jianu.html
  275. http://stirileprotv.ro/stiri/actualitate/liviu-dragnea-s-a-imbracat-in-costum-popular-pentru-a-contribui-la-intrarea-nasaudului-in-cartea-recordurilor-foto.html
  276. https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/
  277. http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
  278. http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
  279. http://www.wow.com/wiki/Cyber_attacks
  280. https://uk.news.yahoo.com/westminster-attack-funeral-held-romanian-woman-died-falling-133200693.html
  281. https://uk.news.yahoo.com/weirdest-election-ever-201719000.html
  282. https://uk.news.yahoo.com/corbyns-car-accidentally-runs-over-112258876.html
  283. https://uk.news.yahoo.com/north-korea-fires-missile-days-south-korea-leader-012518694.html
  284. http://observador.pt/2017/05/15/revelada-a-identidade-do-heroi-acidental-que-travou-ciberataque-com-10-euros/
  285. http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/
  286. http://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-kampt-nog-steeds-met-ransomware-aanval.html?redirect=1
  287. https://www.timeanddate.com/time/zones/ist
  288. http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms
  289. https://en.wikipedia.org/wiki/2015_sandalwood_smugglers_encounter_in_Andhra_Pradesh
  290. http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms
  291. http://www.chicagotribune.com/news/local/breaking/ct-midlothian-hacker-ransom-met-20150220-story.html
  292. http://hvg.hu/tudomany/20170512_wannacry_zsarolovirus_aldozatok_magyar_ceg
  293. http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
  294. http://www.france24.com/en/20170512-cyberattack-ransomware-renault-worldwide-british-hospitals
  295. http://www.faz.net/aktuell/wirtschaft/unternehmen/hacker-angriff-weltweite-cyberattacke-trifft-computer-der-deutschen-bahn-15013583.html
  296. http://www.wired.co.uk/article/wanna-decryptor-ransomware
  297. http://www.lawleyinsurance.com/cybersecurity-attack-landscape-2017/
  298. http://www.lawleyinsurance.com/business-insurance/paypal-apple-pay-google-wallet-understand-mobile-payments-risks-business/
  299. http://www.foxnews.com/tech/2017/05/12/cyber-attack-spreads-across-12-countries-some-uk-hospitals-crippled.html
  300. https://www.theguardian.com/politics/live/2017/may/14/general-election-2017-may-promises-homes-for-generation-rent-politics-live
  301. https://www.yahoo.com/tech/cyberattack-major-cyber-attacks-over-past-10-years-154337949.html
  302. https://www.wsj.com/articles/english-hospitals-hit-by-suspected-cyberattack-1494603884
  303. http://www.cbsnews.com/news/internet-disrupted-dyn-hit-by-ddos-cyberattack/
  304. http://www.nbcnews.com/news/world/national-health-service-cyberattack-hits-english-hospitals-hackers-demand-bitcoin-n758516
  305. https://en.wikipedia.org/wiki/2011_PlayStation_Network_outage
  306. https://www.playstation.com/en-gb/
  307. http://kotaku.com/5804318/welcome-back-psn-the-winners
  308. http://www.telegraph.co.uk/technology/sony/8476757/PlayStation-hack-top-five-data-thefts.html
  309. https://blog.us.playstation.com/2011/05/14/play-on-%E2%80%93-psn-restoration-begins-now/
  310. https://blog.us.playstation.com/2011/05/14/ps3-system-software-update/
  311. https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
  312. https://finance.yahoo.com/news/global-cyber-attack-fuels-concern-214754533.html;_ylt=AwrBT9EgWRZZccwAf5xXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--
  313. https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
  314. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  315. https://uk.yahoo.com/news/nhs-braces-weekend-chaos-cyberattack-045400386.html
  316. http://news.sky.com/story/live-cyberattack-fears-as-nhs-systems-go-down-10874343
  317. http://news.sky.com/story/biggest-ransomware-attack-in-history-targets-almost-100-countries-10874647
  318. http://news.sky.com/story/anatomy-of-a-hack-and-the-anonymous-hero-who-stopped-it-10875234
  319. http://www.nasdaq.com/article/global-cyberattack-disrupts-shipper-fedex-uk-health-system-20170512-00968/amp
  320. https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs
  321. https://www.theguardian.com/football/2017/may/12/chelsea-win-premier-league-title-west-bromwich-albion-match-report
  322. https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs
  323. https://www.theguardian.com/society/live/2017/may/12/england-hospitals-cyber-attack-nhs-live-updates
  324. http://news.sky.com/story/live-cyberattack-fears-as-nhs-systems-go-down-10874343
  325. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  326. https://www.theguardian.com/us-news/2017/may/12/michelle-obama-trump-school-lunches-childhood-obesity
  327. http://www.nasdaq.com/article/global-cyberattack-disrupts-shipper-fedex-uk-health-system-20170512-00968/amp
  328. https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
  329. http://itlaw.wikia.com/wiki/Computer_Virus_Attacks
  330. https://www.yahoo.com/tech/russias-interior-ministry-says-computers-hit-virus-attack-212133477.html
  331. https://www.investing.com/news/technology-news/suspected-russia-backed-hackers-target-baltic-energy-networks-483145
  332. https://www.bing.com/images/search?q=Reed
  333. http://abc7.com/archive/7659840/
  334. http://www.dailymail.co.uk/news/article-193396/Millions-hit-virus.html
  335. https://home.mcafee.com/virusinfo/global-virus-map?ctst=1
  336. https://cybermap.kaspersky.com/
  337. https://home.mcafee.com/VirusInfo/Threat-Activity
  338. https://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/
  339. http://timesofindia.indiatimes.com/world/uk/british-hospitals-say-hit-by-suspected-national-cyber-attack/articleshow/58647516.cms
  340. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
  341. http://www.zerohedge.com/news/2015-07-08/what-first-world-cyber-war-looks-global-real-time-cyber-attack-map
  342. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
  343. http://timesofindia.indiatimes.com/world/uk/british-hospitals-say-hit-by-suspected-national-cyber-attack/articleshow/58647516.cms
  344. https://www.theguardian.com/world/2017/jan/31/czech-cyber-attack-russia-suspected-of-hacking-diplomats-emails
  345. https://www.techopedia.com/definition/24748/cyberattack
  346. https://en.wikipedia.org/wiki/Cyber-attack
  347. http://www.hackmageddon.com/2015/08/10/july-2015-cyber-attacks-statistics/
  348. https://en.wikipedia.org/wiki/WannaCry
  349. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2765010
  350. http://www.hackmageddon.com/2015/08/10/july-2015-cyber-attacks-statistics/
  351. https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/#7aee0717e599
  352. http://www.bbc.co.uk/news/health-39899646
  353. https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
  354. https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
  355. https://www.theguardian.com/politics/2017/may/12/15m-oldsters-in-their-graves-could-swing-second-eu-vote-says-ian-mcewan
  356. https://www.theguardian.com/us-news/2017/may/12/donald-trump-threatens-james-comey-fbi-tapes
  357. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  358. https://digital.nhs.uk/article/1491/Statement-on-reported-NHS-cyber-attack
  359. https://motherboard.vice.com/en_us/article/a-massive-ransomware-explosion-is-hitting-targets-all-over-the-world
  360. http://www.bbc.co.uk/news/uk-england-humber-37863949
  361. http://thelincolnite.co.uk/2016/11/delays-still-expected-at-lincolnshire-hospitals-cyber-attack/
  362. https://www.scmagazineuk.com/updated-ransomware-attack-on-40-nhs-trusts-all-over-the-uk/article/658864/
  363. http://thelincolnite.co.uk/2016/11/delays-still-expected-at-lincolnshire-hospitals-cyber-attack/
  364. http://www.bbc.co.uk/news/live/uk-england-lincolnshire-37833078
  365. https://www.scmagazineuk.com/breaking-nhs-trust-crippled-by-cyberattack/article/570117/
  366. http://www.lincolnshirelive.co.uk/disruption-for-patients-as-systems-go-down-at-lincoln-county-hospital-after-massive-nhs-cyber-attack/story-30329254-detail/story.html
  367. https://www.pressandjournal.co.uk/fp/news/aberdeen/828084/nhs-grampian-faces-outbreak-of-cyber-attacks/
  368. https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
  369. http://www.desinerd.co.in/wannacry-ransomware-hits-spain-italy-portugal-russia-and-ukraine/
  370. https://twitter.com/JakubKroustek/status/863045197663490053
  371. https://www.telefonica.com/es
  372. https://www.telefonica.com/es/web/shareholders-investors/calendario?p_p_id=122_INSTANCE_WlzkF2O3JKJf&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view&p_p_col_id=_118_INSTANCE_pJnMvwVf6Mbn__column-2&p_p_col_count=1&p_r_p_564233524_resetCur=true&p_r_p_564233524_categoryId=123453735%2C311118
  373. http://www.nhs.uk/pages/home.aspx
  374. https://twitter.com/nhs
  375. http://www.nhsonline.org/
  376. https://uk.news.yahoo.com/u-k-national-health-hit-153708430.html
  377. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  378. https://www.theguardian.com/world/2017/may/12/popularity-of-sushi-has-brought-rise-in-parasitic-infections-warn-doctors-anisakiasis
  379. https://www.theguardian.com/politics/live/2017/may/12/general-election-2017-no-more-handholding-trump-corbyn-politics-live
  380. http://www.ibtimes.co.uk/telefonica-hack-ransomware-attack-internal-network-forces-computer-shut-down-1621350?utm_source=yahoo&utm_medium=referral&utm_campaign=rss-related&utm_content=/rss/yahoous/news
  381. http://www.ibtimes.co.uk/nhs-cyberattack-ransomware-assault-paralyses-uk-hospitals-putting-thousands-risk-1621375
  382. http://www.bbc.co.uk/news/health-37186455
  383. http://www.bbc.co.uk/news/health-39899646
  384. http://www.bbc.co.uk/news/world-europe-39870460
  385. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  386. https://uk.news.yahoo.com/telef-nica-hack-ransomware-attack-131624307.html
  387. http://ex.ibt.uk/tv/promotion?utm_source=ibtimes&utm_campaign=ibtuk&utm_medium=IBT
  388. http://www.ibtimes.co.uk/3d-printing-future-f1-racing-1615985
  389. https://finance.yahoo.com/news/spanish-companies-hit-ransomware-cyber-132052215.html
  390. http://www.bbc.co.uk/news/health-39899646
  391. https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
  392. https://teiss.co.uk/2017/05/12/telefonica-ransomware-attack-employees-asked-pull-plug-computers/
  393. http://www.bbc.co.uk/news/health-39899646
  394. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=0
  395. http://www.bbc.com/news/technology-38934822
  396. http://www.zdnet.com/article/nomx-the-most-secure-email-service-can-be-easily-hacked/
  397. https://www.infosecurity-magazine.com/news/nomx-researchers-defend-unfair-test/
  398. https://www.scmagazineuk.com/updated-nomx-secure-email-server-challenged-by-british-researchers/article/653222/
  399. http://www.msn.com/en-sg/money/technology/massive-cyber-attack-grinds-liberias-internet-to-a-halt/ar-AAjSeBP
  400. http://www.telegraph.co.uk/technology/2016/11/04/unprecedented-cyber-attack-takes-liberias-entire-internet-down/
  401. https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddos-hack-botnet
  402. http://www.telegraph.co.uk/technology/2016/11/04/how-a-cyber-attack-could-sabotage-the-us-election/
  403. http://europe.newsweek.com/hackers-take-down-liberias-internet-series-cyberattacks-517141?rm=eu
  404. http://www.telegraph.co.uk/technology/2016/11/04/how-a-cyber-attack-could-sabotage-the-us-election/
  405. http://www.rappler.com/technology/news/151338-cyber-attack-disrupts-internet-liberia
  406. http://www.nst.com.my/news/2016/11/186023/huge-cyber-attack-disupts-internet-liberia
  407. http://themarketghana.com/news/technology/12784/Massive_CyberAttack_Grinds_Liberias_Internet
  408. https://amp.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised-everyday-devices-with-malware-to-mount-assault
  409. https://www.cnbc.com/amp/2016/10/21/major-websites-across-east-coast-knocked-out-in-apparent-ddos-attack.html
  410. http://www.onenewspage.com/video/20161021/5839140/FBI-Is-Investigation-Cyber-Attack-on-Internet-Infrastructure.htm
  411. http://www.41nbc.com/2016/10/24/cyber-attacks-now-closer-to-your-home-than-ever/
  412. http://finance.yahoo.com/news/companies-urged-multiple-vendors-wake-014037572.html;_ylt=AwrBT9YN.w1Yq.gA02NXNyoA;_ylu=X3oDMTEyaHZjYzhtBGNvbG8DYmYxBHBvcwMxBHZ0aWQDQjE4NzlfMQRzZWMDc2M-
  413. http://www.nbcnews.com/tech/security/amp/internet-outage-shows-how-sophisticated-attacks-can-target-your-home-n671561
  414. https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
  415. http://www.pcmag.com/article2/0,2817,2396611,00.asp
  416. http://www.theregister.co.uk/2014/08/27/nowegian_oil_hack_campaign/
  417. https://nakedsecurity.sophos.com/2014/08/28/massive-cyber-attack-on-oil-and-energy-industry-in-norway/
  418. http://www.scmagazineuk.com/hundreds-of-norwegian-energy-companies-hit-by-cyber-attacks/article/368539/
  419. http://www.csoonline.com/article/2599258/cyber-attacks-espionage/50-norweigian-oil-companies-suffer-cyber-attack.html
  420. http://www.digitaljournal.com/internet/anonymous-norway-claim-massive-cyber-attack-on-norwegian-banks/article/389030
  421. https://www.yahoo.com/tech/twitter-netflix-slow-return-reported-163619988.html
  422. http://www.thenational.ae/uae/technology/uae-is-vulnerable-to-cyber-attacks
  423. https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
  424. http://baltimore.cbslocal.com/2016/10/22/cyber-attack-affects-major-websites-culprit-still-to-be-named/
  425. https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
  426. http://baltimore.cbslocal.com/2016/10/22/cyber-attack-affects-major-websites-culprit-still-to-be-named/
  427. http://www.foxnews.com/tech/2016/10/21/major-disruptions-online-as-cyber-attack-hits-internet-services-company.html
  428. http://baltimore.cbslocal.com/2016/10/23/baltimore-city-officer-does-the-juju-on-that-beat-dance/?e=mPHwhqydQAK1LA
  429. http://baltimore.cbslocal.com/2016/10/21/big-questions-after-cyber-attacks-cripple-east-coast/?e=lKbN-K*JDwCUXw
  430. http://baltimore.cbslocal.com/2016/10/21/naval-academy-to-break-ground-for-new-cybersecurity-building/?e=lKbN-K*JDwH4RQ
  431. https://www.ready.gov/cyber-attack
  432. https://www2.fireeye.com/PPC-security-predictions-for-2016-threat-research.html?utm_source=google&utm_medium=Security_Predictions_2016&utm_keyword=cyberattacks&utm_campaign=General
  433. http://www.nbcnews.com/tech/security/cyber-attack-power-grid-could-cost-1-trillion-report-n388581
  434. https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
  435. http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME
  436. https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
  437. https://en.wikipedia.org/wiki/Dyn_(company)
  438. https://en.wikipedia.org/wiki/Dyn_(company)#Distributed-Denial-of-Service_attack
  439. http://www.tech.com.pk/2016/10/waves-cyber-attacks-hit-netflix-spotify-twitter.html
  440. http://www.bbc.co.uk/news/technology-37728015
  441. https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/
  442. http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained
  443. http://www.informationsecuritybuzz.com/hacker-news/__trashed-2/
  444. http://europe.newsweek.com/hackers-take-down-liberias-internet-series-cyberattacks-517141?rm=eu
  445. https://en.wikipedia.org/wiki/Zeus_(malware)
  446. https://malwaretips.com/blogs/zeus-trojan-virus/
  447. http://www.reuters.com/article/us-internet-attack-idUSN1638118020070717
  448. https://www.organicfacts.net/running-weight-loss.html?utm_source=onesignal20jun17
  449. https://www.yahoo.com/news/driver-plows-crowd-outside-london-102245091.html?soc_trk=gcm&soc_src=1edaf5ad-f8e3-33a4-ab91-3935dbff04a7&.tsrc=notification-brknews
  450. http://www.bbc.co.uk/news/technology-37859678
  451. https://krebsonsecurity.com/2016/11/did-the-mirai-botnet-really-take-liberia-offline/
  452. http://www.information-age.com/liberias-internet-hacked-123463064/
  453. http://www.myrtlebeachonline.com/news/nation-world/world/article112624328.html
  454. https://metroble.com/news/no-hackers-apparently-didnt-take-down-the-entire-liberian-internet#.WCrIfhqLTcs
  455. https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddos-hack-botnet
  456. http://www.bbc.co.uk/news/technology-37859678
  457. https://krebsonsecurity.com/2016/11/did-the-mirai-botnet-really-take-liberia-offline/
  458. http://allafrica.com/stories/201611081145.html
  459. https://fronteranews.com/news/africa/kenya-fears-an-even-bigger-cyber-attack-is-coming/
  1. https://www.wired.com/2017/07/inside-cubas-diy-internet-revolution/?mbid=nl_72617_EIC_p1&CNDID=50121752
  2. http://click.hpnews.hp.com/?qs=6801c2c1c8dae64bf2e40657f266f11f220fb2259cb517096a7b4db3607292a38fa6fb449817e3ff0d4e3176c891d3f90d647da730495ad9
  3. https://www.wired.com/story/what-is-ray-kurzweil-up-to-at-google-writing-your-emails/?mbid=nl_8317_p3&CNDID=50121752
  4. https://www.wired.com/story/best-black-hat-defcon-talks/?mbid=nl_73117_p1&CNDID=50121752
  5. https://www.wired.com/story/canceling-your-model-3-deposit-dont-count-on-a-timely-refund/?mbid=nl_73117_p3&CNDID=50121752
  6. https://www.wired.com/story/goodbye-ipod-and-thanks-for-all-the-tunes/?mbid=nl_72817_p3&CNDID=50121752
  7. https://www.wired.com/story/tesla-model-3-more-than-electric/?mbid=nl_72817_p1&CNDID=50121752
  8. https://www.wired.com/story/wannacry-malwaretech-arrest/
  9. https://www.wired.com/story/our-minds-have-been-hijacked-by-our-phones-tristan-harris-wants-to-rescue-them/?mbid=nl_72717_p3&CNDID=50121752
  10. https://www.wired.com/story/tesla-model-3-electric-market/?mbid=nl_72717_p1&CNDID=50121752
  11. https://www.wired.com/story/tesla-model-3-electric-market/?mbid=nl_72717_p1&CNDID=50121752
  12. https://www.wired.com/story/adobe-finally-kills-flash-dead/?mbid=nl_72617_p1&CNDID=50121752

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.