Talk:List of security hacking incidents
This is the talk page for discussing improvements to the List of security hacking incidents article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1 |
This article was nominated for deletion. Please review the prior discussions if you are considering re-nomination:
|
This article is rated List-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
add 1984 TRW incident
[edit]Something about this should probably be added: https://www.wired.com/story/wired-guide-to-data-breaches/ "One early landmark incident occurred in 1984, when the credit reporting agency TRW Information Systems (now Experian) realized that one of its database files had been breached. The trove was protected by a numeric passcode that someone lifted from an administrative note at a Sears store and posted on an “electronic bulletin board”—a sort of rudimentary Google Doc that people could access and alter using their landline phone connection. From there, anyone who knew how to view the bulletin board could have used the password to access the data stored in the TRW file: personal data and credit histories of 90 million Americans. The password was exposed for a month." DKEdwards (talk) 20:47, 12 January 2021 (UTC)
- It's added.John haxor (talk) 22:26, 5 March 2021 (UTC)
Page name
[edit]What do editors think about renaming this page to List of cybersecurity incidents to widen the scope of this page? Would an incident like this be relevant to this page in its current scope? LondonIP (talk) 01:10, 22 December 2021 (UTC)
- How to start a rename discussion The Crab Who Played With The Sea (talk) 02:24, 26 December 2021 (UTC)
Requested move 6 January 2022
[edit]- The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review after discussing it on the closer's talk page. No further edits should be made to this discussion.
The result of the move request was: not moved. Excluding the several !votes that are not based in policy, we seem to have consensus that, although "cybersecurity" may well be more common than "security hacking", the current title precisely describes the list's scope and prevents redundancy with other lists (e.g. List of cyberattacks). (closed by non-admin page mover) Extraordinary Writ (talk) 16:26, 2 February 2022 (UTC)
List of security hacking incidents → List of cybersecurity incidents – Cybersecurity is a more common term, and it will also broaden the scope of this list. LondonIP (talk) 02:22, 6 January 2022 (UTC) — Relisting. ASUKITE 15:22, 14 January 2022 (UTC)— Relisting. — Coffee // have a ☕️ // beans // 06:13, 26 January 2022 (UTC)
- The Computer_security#Notable_attacks_and_breaches section (the page has a redirect from Cybersecurity) has links to other pages including List_of_cyberattacks. I think one of them, probably the latter, may already be the broader-scope page you're thinking of. Undecided leaning toward "no" for that reason. The Crab Who Played With The Sea (talk) 02:51, 6 January 2022 (UTC)
I am a security expert. the page is good as it is No traceable Username (talk) 19:50, 12 January 2022 (UTC)
- Just an fyi, we generally look for policy or evidence-based reasoning in these replies. Just saying you're an expert will not have any effect on the discussion. If you do have any sources, policy or logic-based arguments you can put forward, that will help. ASUKITE 15:24, 14 January 2022 (UTC)
- Note: WikiProject Computer Security has been notified of this discussion. ASUKITE 15:22, 14 January 2022 (UTC)
- Support. I think "cybersecurity" is a more common term than "security hacking". Rreagan007 (talk) 18:55, 14 January 2022 (UTC)
- While cybersecurity is indeed used much more often per Google Ngrams, it has a broader meaning, and an entry I think is appropriate for that meaning already exists. Given that, I still think precision trumps recognizability. The Crab Who Played With The Sea (talk) 21:51, 26 January 2022 (UTC)
- Support The name feels better to me.Mozzie (talk) 10:53, 17 January 2022 (UTC)
- Oppose per The Crab Who Played With The Sea. I was about to oppose myself due to the fact that the proposed title is too broad as it could include what is already at List of cyberattacks, but then I read the aforementioned editor's comment, and it about sums up my thoughts regarding this move request. If this page is to be moved, the title should to be something with a narrower scope than the proposed title. Steel1943 (talk) 19:24, 25 January 2022 (UTC)
- Oppose (I fell in the direction I was leaning earlier, unsurprisingly). The Crab Who Played With The Sea (talk) 05:25, 26 January 2022 (UTC)
- Oppose The List of cyberattacks could be the broader-scope page you're thinking of, per The Crab Who Played With The Sea. But in either case, one day the article has to be split by years when it grows large enough such as Timeline of the COVID-19 pandemic. 60.250.128.112 (talk) 23:51, 26 January 2022 (UTC)
- I can also argue that Timeline of Internet conflicts may be another better broad scope title to be merged into. 60.250.128.112 (talk) 23:54, 26 January 2022 (UTC)
Russia's compromise of the FBI radios (2012 - 2016) is not listed.
[edit]U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.
U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.
Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”
Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.
Interestingly during that period Putin was accusing then Sectary of State, Hillary Clinton, of fomenting protest against him, by accusing him of using Election Fraud to win his Third Presidential Election. 203.214.51.124 (talk) 10:20, 8 October 2022 (UTC)
A0drul3z
[edit]The article claims that, in 2010, "An advanced malware for Symbian OS is released by hacker A0drul3z". I could not find any mention of the hacker prior to his inclusion on this list. The edit was made by @Steve dexon in 2013 without any citation. Could someone add source? Changeworld1984 (talk) 13:15, 27 March 2024 (UTC)
- His first edit and his second edit. Google hits for word 'A0drul3z' is 56. The first mention that I could find outside of wikipedia is in April 2013, 2 months after it was added wiki. Only one book, Cyber Attacks: are we really secure?, mentions it and the timeline seem to be taken directly from wikipedia. This is causing misinformation. Changeworld1984 (talk) 16:41, 27 March 2024 (UTC)
- The entries should be sourced, especially for such contentious allegations. I've removed it.-- Ponyobons mots 23:01, 27 March 2024 (UTC)
- List-Class Computing articles
- Mid-importance Computing articles
- List-Class Computer networking articles
- Mid-importance Computer networking articles
- List-Class Computer networking articles of Mid-importance
- All Computer networking articles
- List-Class software articles
- Mid-importance software articles
- List-Class software articles of Mid-importance
- All Software articles
- List-Class Websites articles
- Mid-importance Websites articles
- List-Class Websites articles of Mid-importance
- All Websites articles
- List-Class Computer Security articles
- High-importance Computer Security articles
- List-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- High-importance Computing articles
- List-Class history articles
- Low-importance history articles
- WikiProject History articles
- List-Class law articles
- Low-importance law articles
- WikiProject Law articles