Close
Send Us A Tip

Do you have a tip for us? Just like any other popular news site, we accept tips from our readers. It is a quick way to help us find what people are talking about around the globe, what is about to go viral and, of course, what you think should be featured on Bit Rebels.
Please understand that we get hundreds of tips each day, and we can't feature everything. We are dedicatedly looking through all the tips submitted and pick the things we feel will appeal to our audience.

Name * Email *
Website * Related URL *
Subject *
Comment *
Verify That You Are Human... *
+ 3 = 6
Bit Rebels Logo
The Hacking History Timeline Header
Advertisement
CHECK OUT MORE OF OUR ARTICLES

Hacking History – A Timeline Of Hack Tactics [Infographic]

2 Years Ago By Richard Darell

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration. But, the destructive intentions of some hackers have turned this word into something bad. For a better understanding, let’s have a look at the hacking history timeline.

A couple of days ago we were presented with a pretty interesting infographic called “Hacking History – A Timeline Of Hack Tactics” created by SSLs and with the world being full of people that maliciously want to break into your computer today, we knew we just had to present this to you all.

It interesting to see that the hacking history timeline really began back in the 1960s as shortcuts developed to bypass or improve the operation of systems. In our concerned eyes today even this sounds malicious to a lot of people, but back then it was merely intended to quicker evaluate and improve faulty systems that had to be optimized. As we know, that’s not exactly what the word “hacker” stands for today. The word is, however, misused in the broad perspective and should really be replaced by the word “cracking,” which is the correct word used in the hacker subcultures around the world. It basically means to force or bypass security systems that are in place to protect the integrity and information stored within the systems attacked.

This hacking history timeline is a great overview of the world’s most notorious breaches and could serve as a reminder how important it is for all of us to stay up to date with our security updates and passwords in order for our personal information to stay safe.

With mobile devices soon to be the most used and accessible “computer” it’s somewhat worrying to see that we currently care more about the security of our PCs than we care about the security of our mobile devices. After having a look at this hacking history timeline, we are sure you’re going to change your mind about that. 90% of people delete suspicious emails from their PCs but only 56% do the same on their mobile devices. Why is that? It could be contributed to the fact that we trust developers and manufacturers too much these days when it comes to our mobile devices. Even though initially we didn’t see many maliciously intended break-ins into our mobile devices but that has dramatically changed in the past few years of the hacking history timeline.

Are you really doing what you can to make your mobile device more secure? If you have a nagging feeling that the answer to that question is no, then you need to start thinking about it as “hacking” is not going to go away anytime soon. It’s quite simple, as long as the intention is for you to access the app, operation system or system in general, there will always be a way to “access” it for a hacker or cracker as well.

Have a look at this hacking history infographic and become aware of the damages that can be made should a hacker or a cracker find their way into your system. The intentions might not always be malicious, but to have your personal information accessed and viewed when it’s supposed to be safe is a huge concern for most people. Take the appropriate actions to make your data and devices more secure. You won’t regret it.

Hacking History – All The Reasons To Secure Your Devices

Click Infographic To Enlarge

The Hacking History Timeline Infographic

The Hacking History Timeline

Image: Johan Viirok (c)
From Around The Web

7 Comments

Matthew Weber

May 16th, 2014

Great article and interesting topic, and especially timely given today’s climate!

[Reply]

Richard Darell

May 16th, 2014

Thank you, Matthew! Much appreciated! We think it’s important to know the history of hacking in order to fully understand it.

Mary Helen Ferris

May 16th, 2014

Richard Darrell a picture is worth a thousand words…thank you for the informative article.

[Reply]

Richard Darell

May 17th, 2014

Indeed it is, Mary! Our pleasure. :)

Detlev Artelt

May 17th, 2014

cool – love this post. Greetz from Belgium

[Reply]

Richard Darell

May 17th, 2014

Thank you, Detlev! Glad you like it. We absolutely love this infographic! So full of great info!

Scott Wilson

May 30th, 2014

[whistle]… $113 Billion stole through cyber-crime!!… An incredible amount but I guess if 12 computers are hacked per second.. I’m a little astounded by the sheer numbers here.

Great infographic!

[Reply]

Leave A Comment

SUBMIT

css.php