5 Most Devastating Cyber Attacks Countdown:
Cyber-attacks come in many forms, from all directions, and from incredibly different sources. One thing is for sure – they create serious damage and are not slowing down.
Here are some of our favorites top 5 cyber-attacks:
00:00 Intro
00:13 Successful and Unsuccessful Cyber Attacks
00:29 “Mafiaboy’s” Denial of Service
01:09 Conficker and the worm that exploited Windows’ OS
01:33 Jonathan James (1999) with the US Department of Defense breach
02:05 Sony Pictures hacked by the Guardians of Peace (GOP) using Shamoon malware
02:33 Melissa virus by David Smith aka the discoverer of phishing attacks
03:05 Attacks are inevitable
How to Prevent Cyber Attacks?
Attacks are inevitable. Successful attacks are not. By maintaining line-of-sight of all devices and ensuring security controls are always present and working as intended, the attack surface is reduced and becomes an inhospitable place for attackers.
3 years