Network Threats Timeline
ARPANET, the first Internet, is established.
No serious security threats were made, just researchers with access to the internet playing harmless pranks on each other through the network.
Hit film WarGames popularizes the term “hacker”. Few serious steps taken by government to limit the damage.
First automated worm appeared, the “Morris Worm”, leaders in the network decided to begin developing countermeasures
Immediately after the Worm hits, the Computer Emergency Response Team (CERT) is formed.
First generation firewalls, then named packet filter firewalls, were developed.1
The Michelangelo worm threatens to wipe machines around the world. The damage is minimal, but due to the media frenzy that surrounded the topic, the public profile of malware is raised.
More advanced malware such as the Happy99 virus, the Melissa worm, and Kak worm are released.2
ILOVEYOU Virus spread, which replaced several files with copies of itself, and has a password-stealing application. Caused $5.5-8.7 billion in damages.
Leap-A virus which uses iChat to spread across vulnerable Mac computers, which prevent affected applications from launching. This shows how even a Mac computer, which is partially protected from virus attacks can still be attacked.
Storm Worm – a Trojan Horse Program that turns computers into bots and zombies, which baited users to click on the program through fake links, which included “230 dead as storm batters Europe”, hence the name.3
Shellshock and Heartbleed – separate incidents, but both are security bugs that can be easily exploited by attackers.
Google publishes vulnerability in Windows 8.1 two days before a fix was due to be released by Microsoft.4
To be solved, numerous network threats could easily be patched out, however, it is always the period between the discovery of the issue and the patch that can be costly for users.
Good thing there are zero-day discoveries, where network security companies detect the threat and solve it before it becomes a problem.
MEC Networks Corporation can provide you with quality network security products that take care of the threat before it becomes a problem for you.