ManageEngine

Banner Creative

Evolution of cybersecurity

  • 1971

    World's first computer virus and antivirus

    Bob Thomas creates a computer program named Creeper that moves across networks, leaving the message I'm the Creeper, catch me if you can. In response to this, Ray Tomlinson writes another program Reaper, the first antivirus software to chase Creeper and delete it.

  • 1977

    Invention of RSA

    MIT's Ron Rivest, Adi Shamir, and Leonard Adleman invent "RSA", one of the first public-key cryptosystems, which is still widely used for secure data transmission.

  • 1979

    First break-in

    Sixteen-year-old Kevin Mitnick breaks into Digital Equipment Corporation's computer network.

  • 1981

    First cybercrime convict

    Ian Murphy, AKA Captain Zap, is the first person convicted of a cybercrime. Murphy hacked into the AT&T network and changed internal clocks to charge off-hours rates at peak times.

  • 1982

    First case of cyber warfare

    The CIA dupes the Soviet Union into stealing booby-trapped software, causing a huge explosion in the Siberian Gas pipeline.

  • 1984

    Public exposure of security flaws

    The German Chaos Computer Club exposes the security flaws in the German Bildschirmtext online system and transferred 135,000 DM to a Hamburg bank in favor of the club.

  • 1986

    First cybercrime law

    US Congress passes the Computer Fraud and Abuse Act (CFAA), which makes it a crime to break into computer systems.

  • 1988

    First internet worm

    Robert Tappan Morris, a computer science graduate student at Cornell, releases the first Internet worm and becomes the first person convicted under the 1986 CFAA.

  • 1989

    PC Cyborg: The first ransomware

    A floppy disk is mailed to attendees of the WHO s international AIDS conference. Software on the diskette encrypts the names of all the files on a PC, then asks the user to send $189 to a post office in Panama to decrypt the files.

  • 1995

    First phishing attack

    Using AOHell, hackers stole the passwords and credit card information of AOL users by sending instant messages asking them to enter their username and password to verify their account.

  • 1998

    Beginning of Tor Project

    Employees of the US Naval Research Laboratory develop the "Onion Router," or Tor software, that is a key component of the Dark Web today.

  • 1999

    First mass-mailing macro virus

    The Melissa virus infects more than a million email accounts via a malicious email attachment. The virus creator, David L. Smith, served 20 months in federal prison and was fined $5,000.

  • 2008

    Cyberheist mastermind arrested

    Albert Gonzalez leads a criminal ring to steal information from at least 45.7 million payment cards used by customers of US retailer TJX.

  • 2010

    First cyberweapon

    Security experts discover Stuxnet, the world's first military-grade cyberweapon that corrupts industrial equipment and includes programmable logic controller (PCL) software designed to hide its existence and progress.

  • 2012

    Flame malware discovered

    Flame, which attacks Windows computers, is capable of recording Skype conversations, audio, keyboard activity, network traffic, and screenshots. Flame also has a kill command, wiping out all traces of it from a computer.

  • 2013

    Largest data breach

    All three billion Yahoo user accounts are breached.

  • 2013

    Target targeted

    Forty million credit card and debit card accounts belonging to Target customers are stolen.

  • 2014

    Home depot breached

    Fifty-six million credit cards belonging to Home Depot customers are compromised.

  • 2014

    JP Morgan Chase attacked

    83 million JP Morgan Chase accounts are compromised.

  • 2015

    Anthem breached

    Nearly 80 million Anthem accounts are compromised.

  • 2015

    White House compromised

    Russian hackers gain access to White House and State Department emails. The emails were unclassified, but likely contained sensitive information.

  • 2016

    Birth of Mirai botnet

    Tens of millions of internet-connected consumer devices are infected with Mirai malware. This results in a massive DDoS attacks that make major internet platforms and services unavailable to users.

  • 2017

    WannaCry attack

    The WannaCry ransomware attack, unprecedented in scale, infects more than 230,000 computers in over 150 countries.

  • 2017

    Most devastating cyberweapon

    NotPetya, a cyberweapon and dreaded virus, attacks thousands of computers around the globe and wipes everything off their disks.

  • 2017

    Equifax data breach

    148 million Americans sensitive personal information compromised.

  • 2018

    GDPR

    The General Data Protection Regulation (GDPR), goes into effect.

  • 2018

    CCPA

    The California Consumer Privacy Act (CCPA) is introduced.

  • 2019

    Simjacker discovered

    Simjacker, an SMS-based attack method used by a surveillance vendor to track and monitor individuals, is discovered.

  • 2019

    Notifiable Data Breaches Scheme

    Australia's Notifiable Data Breaches Scheme goes into effect.

  • 2020

    LGPD

    Brazil's General Data Protection Law (LGPD) to come into effect.

Test your cybersecurity awareness

Pick one of the following areas:

Personal

Personal

Workplace

Workplace
  • Digital personality

    Q1. "Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information."


    A key step in a social engineering attack often involves designing an in-depth profile of a target based on their social interactions.


    Which of the following scenarios is closest to the definition above?

    • Your LinkedIn account gets hacked and unsolicited messages are sent to all your connections.
    • You get an email from a prospective client with a seemingly legitimate background asking you to visit a particular website or download an attachment.
    • One of your colleagues has been submitting your email address on various online forms to access resources.
  • Digital personality

    Q2. Which of the following professional information, when added on social media or networking platforms, is most at risk of being used for a social engineering attack?


    • Professional history.
    • Details of meetings with clients and/or partners.
    • Roles and responsibilities in your current organization.
    Next
  • Applications and
    devices

    Q3. What could be the possible security implication of using unlicensed or discontinued applications (such as operating systems, antivirus, and other software)?


    • Attackers might gain access to my organization's critical resources by exploiting vulnerabilities in unlicensed applications, as they do not receive any security updates or patches. This can lead to loss in revenue and/or reputation.
    • The latest features of the application(s) might not be available, the application might crash frequently, and/or it may not support other applications it's required to work with.
    • Unlicensed applications might be detected during audits, resulting in fines for my organization.
    Next
  • Applications and
    devices

    Q4. You lost your work mobile phone last night on the way home from the office. How would you protect the organizational data stored in the applications and browser(s) you use on that phone?


    • I will visit the websites of the apps I use and log out and/or unregister, as well as change my passwords.
    • I will track my device via the "Find my phone" feature. If that doesn't result in retrieval, I will remotely deactivate the device.
    • I will report it to the IT administrator of my organization, informing them about the lost device and the nature of the data stored on the device.
    Next
  • Email Links
    and attachments

    Q5. You have received an email from your business partner containing an attachment of a contract to be signed. The attachment is a PDF file.


    You're uncertain whether this attachment is safe to open. Performing which of the following steps in isolation will verify whether the attachment is safe?


    • Confirm with the sender whether they sent the PDF attachment.
    • Verify the email of the sender. Check for subtle changes in the email address that might make it appear genuine.
    • Scan the attachment for any hidden malware before opening or clicking on it.
    Next
  • Passwords

    Q6. You're the social media manager at your organization. During your annual vacation time, a colleague will be handling a social media campaign in your absence.


    For this purpose, you need to share the access of certain account(s) with them. Which of the following options would ensure that the access to the account(s) is not abused?


    • I will share one-click login access with the password in an encrypted format to ensure that they cannot view the password.
    • I will monitor their session activity and login history.
    • I will share the password using a secure password vault and disable the share option.
    Next
  • Passwords

    Q7. Your role as the events manager of your organization requires you to travel frequently across the country. You use several mobile applications as part of your daily job. You've been wanting to use a password management tool to manage the passwords of all these applications.


    You've started evaluating a few password management tools to decide which one works best for your needs. Which of these feature sets would be best suited for your scenario?


    • The third tool offers a host of features, with a random password generator and multiple form-filling identities being its USP.
    • The first tool offers a host of features, with application password management and secure syncing across multiple devices being its USP.
    • The second tool offers a host of features, with two-factor authentication and secure sharing being its USP.
    Next
  • Privacy

    Q8. You're the talent acquisition manager of your organization. Your company is hiring four software developers with a minimum of five years experience, and you ve shortlisted 100 applicants for the role.


    After the recruitment process, you select two applicants, waitlist five of them, and reject the rest.


    In this scenario, what would be the best way to manage the resumes/applications of all 100 applicants?


    • I will store the resumes of the selected and waitlisted applicants, and securely shred the rest of the resumes.
    • As recruitment requirements keep arising in my organization, I will store the resumes of the rejected candidates for the next time we re hiring.
    • I will share the resumes of the rejected candidates within my network to check if they would be a good fit for any other organization's job requirements.
    Next
  • Privacy

    Q9. Your company's monthly newsletter has been sent with the entire subscriber list added in CC instead of BCC.


    Which of the following privacy violations does this scenario fall under?


    • Breach of consent.
    • Breach of confidentiality.
    • Breach of defined purpose.
  • Your cybersecurity
    awareness score is:

    Cybersecurity Apprentice

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Security Specialist

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Cybersecurity Master

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Cybersecurity Expert

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Try again
  • Digital personality

    Q1. "Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information."


    A key step in a social engineering attack often involves designing an in-depth profile of a target based on their social interactions.


    Which of the following scenarios is closest to the definition above?

    • You get a seemingly legitimate email from the airline you're scheduled to fly with saying that your ticket has been upgraded and you need to confirm your ticket by clicking on a link given in the email.
    • Your Facebook account gets hacked and unsolicited messages are sent to all your friends.
    • After booking a reservation at a restaurant, you start receiving numerous marketing calls.
  • Applications and
    devices

    Q2. What could be the possible security implication of using unlicensed or discontinued applications (such as operating systems, antivirus, and other software)?


    • Attackers might gain access to my personal data and/or other accounts or applications by exploiting vulnerabilities in unlicensed applications, as they do not receive any security updates or patches.
    • The latest features of the application(s) might not be available, the application might crash frequently, and/or it may not support other applications it's required to work with.
    • Using unlicensed applications may lead to fines.
    Next
  • Applications and
    devices

    Q3. You lost your mobile phone last night on the way home from work. How would you protect the personal data stored in the applications and browser(s) you use on that phone?


    • I will file a report at the police station, informing them about the lost device and the nature of the data stored on the device.
    • I will visit the websites of the apps I use and log out and/or unregister, as well as change my passwords.
    • I will track my device via the "Find my phone" feature. If that doesn't result in retrieval, I will remotely deactivate the device.
    Next
  • Email Links
    and attachments

    Q4. You have received an email from your cousin containing a video attachment.


    You're uncertain whether this attachment is safe to open. Performing which of the following steps in isolation will verify whether the attachment is safe?


    • Verify the email of the sender. Check for subtle changes in the email address that might make it appear genuine.
    • Scan the attachment for any hidden malware before opening or clicking on it.
    • Confirm with the sender whether they sent the video attachment.
    Next
  • Email Links
    and attachments

    Q5. You receive a seemingly legitimate email from the airline company you last flew with to update your air miles before they expire. The email contains a URL which has a bunch of special characters.


    You're not sure whether the link is secure. What would you do to ensure you can safely visit the site?


    • I'll try to decode the link and find out the true nature of the destination URL before clicking on it.
    • I'll open the link in a secure browser to protect myself from attacks.
    • I'll scan the link to check for possible malware attacks or phishing attacks the link might contain.
    Next
  • Passwords

    Q6. You recently attended your sister's wedding, and you want to share the pictures of the wedding with your friend.


    Which of the following options would be the most secure way to give them access to the photos?


    • I will give them view-only access to a drive for a limited period, during which I will ensure that no other personal files are added to that same drive.
    • I will copy the photos on a password-protected pen drive and share it with my friends.
    • I will upload the photos on social media and share the album with my friends.
    Next
  • Passwords

    Q7. You access multiple applications and accounts (e.g., social media, banking services, and online streaming services) every day. With so many applications and services, it gets difficult to remember each password that you use.


    In this situation, what would be a good strategy to manage so many passwords?


    • I would use a set of common passwords across multiple services and store these passwords in a secure vault.
    • I would use a different password for each service and store all passwords in a password-protected file.
    • I would save all my different passwords in a file; when I need one, I can easily retrieve it.
    Next
  • Privacy

    Q8. After your most recent purchase from an e-commerce website, you've started receiving many promotional emails from that e-commerce company. You do not remember signing up for any such promotional emails.


    What would the ideal response be in this situation?


    • I will unsubscribe from the promotional emails so I don't receive any further unsolicited communication.
    • I will delete the emails and mark them as spam.
    • I will report it to the concerned authorities and ensure that the company is held accountable for this breach of privacy.
    Next
  • Privacy

    Q9. You recently took a blood test at your doctor s office. You find out that the office's data center has been hacked and the diagnostic reports have been leaked.


    Which of the following scenarios would increase the severity of the breach?


    • The leaked data includes the first names and test reports of the individuals.
    • The leaked data includes only the test reports of the individuals.
    • The leaked data includes full names, email addresses, and entire test reports of the individuals.
  • Your cybersecurity
    awareness score is:

    Cybersecurity Apprentice

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Security Specialist

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Cybersecurity Master

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Your cybersecurity
    awareness score is:

    Cybersecurity Expert

    Get your certificate of awareness

    Certificate Download

    Let s take a look at some of the dos and
    don t we should keep in mind: Download

    Cybersecurity awareness free poster: Download

    Try again

31 movies on cybersecurity

A movie a day for the entire month!

Bolster your cybersecurity knowledge with some of the must-see movies, documentaries, and television shows that explore various themes like famous hacks, possible consequences of advancing technology, data privacy, and much more.

  • Algorithm (2014)

    Algorithm (2014)

    A computer hacker hacks a government contractor and discovers a mysterious computer program, inadvertently starting a revolution.

    #Hacking #Cybersecurity
  • Blackhat (2015)

    Blackhat (2015)

    A cyberterrorism movie in which hacking plays a pivotal role in the story. In what is arguably one of the most realistic depictions of hacking on-screen, Blackhat shines light on one of the most common hacking techniques: foreign USB devices.

    #Devices #Hacking #Cyberwarfare
  • Breach (2007)

    Breach (2007)

    Breach is a docudrama that expertly tells the tale of "possibly the worst intelligence disaster in US history." The movie shows the events leading up to the capture of real-life FBI agent Robert Hanssen, who served as a mole for the Russians for 22 years.

    #Cyberespionage #Cyberterrorism #Cybersecurity
  • Citizenfour (2014)

    Citizenfour (2014)

    A gripping documentary that reveals the circumstances which led Edward Snowden to expose the NSA's mass surveillance tactics.

    #Surveillance #Cybersecurity
  • Deep Web (2015)

    Deep Web (2015)

    Deep Web provides an eye-opening overview of how different groups operate undetected on the deep web, and then recounts the tale of Ross Ulbricht, alleged creator of the notorious "Silk Road" online bazaar.

    #Hacking #DeepWeb #Cybersecurity
  • Disconnect (2013)

    Disconnect (2013)

    From identity theft to cyberbullying, Disconnect attempts to shed light on the various dangers of the digital world. This gripping movie weaves a cautionary tale of becoming too entrenched in cyberspace.

    #Devices #Applications #DigitalPersonality #Privacy
  • Enemy of the State (1998)

    Enemy of the State (1998)

    Another movie that attacks the surveillance regime of the US government, Enemy of the State follows the story of a lawyer who comes into possession of a videotape containing footage of a congressman's murder, and the game of cat and mouse that follows soon after.

    #Surveillance #Devices #Cybersecurity
  • Hacker (a.k.a. Anonymous) (2016)

    Hacker (a.k.a. Anonymous) (2016)

    Hacker shows the birth of a young hacker who turns to a life of cybercrime and identity theft.

    #Cybercrime #Privacy #Cybersecurity
  • The Imitation Game (2014)

    The Imitation Game (2014)

    Though not a full-fledged cybersecurity movie, The Imitation Game follows the life of renowned mathematician Alan Turing and his fellow mathematicians as they work on cracking the famous German Enigma code.

    #Espionage #Decrypting
  • Mr. Robot (2015)

    Mr. Robot (2015)

    This gripping TV series portrays the life of hacker Elliot Alderson, and how he uses his skills to change the world for good.

    #Hacking #Devices #Privacy #Cybersecurity
  • Nerve (2016)

    Nerve (2016)

    A high school senior is enmeshed in an online reality game where every move of hers is manipulated by an anonymous community of "watchers."

    #Devices #Applications #Privacy
  • Office Space (1999)

    Office Space (1999)

    An entertaining comedy that brings attention to insider threats, Office Space follows the life of three computer programmers who hate their jobs and bosses. They proceed to create a scheme to embezzle small amounts of money from their company, but a turn of events results in a bigger theft than planned.

    #Devices #Cybersecurity
  • Risk (2017)

    Risk (2017)

    Risk, a companion-piece to Citizenfour, takes an intimate look at the life of Julian Assange and the birth of Wikileaks.

    #Cybersecurity
  • Searching (2018)

    Searching (2018)

    When 16-year-old Margot goes missing, her widowed father David resorts to analyzing her social media activity and tracks her digital footprints to find his missing daughter.

    #DigitalPersonality #Cybersecurity
  • The Secret History of Hacking (2001)

    The Secret History of Hacking (2001)

    A documentary that focuses on the phreaking, computer hacking, and social engineering that took place between the 1970s and 1990s.

    #Hacking #DigitalPersonality #Cybersecurity
  • Shut Up and Dance (2016)

    Shut Up and Dance (2016)

    A part of the TV series Black Mirror, Shut Up and Dance takes viewers on a gripping journey as it shows the havoc that malware can cause.

    #Privacy #DigitalPersonality #Surveillance #Cybersecurity
  • Sneakers (1992)

    Sneakers (1992)

    A team of security system testers who discover a top-secret black box that can crack any encryption must keep the box from falling into the wrong hands.

    #Cybersecurity #Hacking
  • Terms and Conditions May Apply (2013)

    Terms and Conditions May Apply (2013)

    An eye-opening documentary on the effects of the erosion of privacy that most of us legally accept every time we sign up for a new app or internet service.

    #DigitalPersonality #Privacy #Devices #Applications
  • The Great Hack (2019)

    The Great Hack (2019)

    This gripping documentary reveals the dark side of social media as it shows the insider account of Cambridge Analytica's illegal social profiling activities.

    #DigitalPersonality #Privacy
  • We Are Legion: The Story of the Hacktivists (2012)

    We Are Legion: The Story of the Hacktivists (2012)

    A documentary that sheds light on the birth and rise of the hacker group Anonymous.

    #Cybersecurity #Hacking
  • Zero Days (2016)

    Zero Days (2016)

    A cyberwarfare documentary that portrays the birth of Stuxnet, a computer virus program allegedly developed as a joint effort between the US and Israel, and how it was used to attack Iran's nuclear program.

    #Cyberwarfare #Cybersecurity #Devices
  • Revolution OS (2001)

    Revolution OS (2001)

    Revolution OS explores the story of the hackers who rebelled against Microsoft and created GNU/Linux and the open-source movement.

    #Hacking #Cybersecurity
  • The Internet's Own Boy

    The Internet's Own Boy: The Story of Aaron Swartz (2014)

    Brian Knappenberger explores the life of Aaron Swartz, a programming prodigy and freedom of information activist whose work has had far-reaching effects on copyright laws and how the right to information is perceived.

    #Hacking #Cybersecurity
  • Freedom Downtime (2001)

    Freedom Downtime (2001)

    A thought-provoking documentary that takes a deep look at Kevin Mitnick's harrowing experience at the hands of the law for multiple charges of hacking.

    #Hacking #Cybercrime #Cybersecurity
  • TPB AFK (2013)

    TPB AFK (2013)

    A documentary based on the lives of the three founders of The Pirate Bay: Peter Sunde, Fredrik Neij and Gottfrid Svartholm. This movie explores the rise and fall of the world s biggest file sharing website.

    #Cybersecurity
  • In The Realm of Hackers (2003)

    In The Realm of Hackers (2003)

    This documentary reveals how two Australian teenager hackers, Electron and Phoenix, stole a restructured computer security list and used it to break into some of the world s most classified and secure computer systems.

    #Cybersecurity #Cybercrime #Hacking
  • Hacking Democracy (2006)

    Hacking Democracy (2006)

    Hacking Democracy examines the voting malpractices that occurred during the 2000 and 2004 US elections, and exposes how the electronic voting machines and the Diebold voting systems were hacked and tampered with during the elections.

    #Hacking #Cybersecurity #Cybercrime
  • Code 2600 (2011)

    Code 2600 (2011)

    Code 2600 is an enlightening documentary portraying the history of computer hacking as told by some of its principal participants.

    #Hacking #Cybersecurity #Cybercrime
  • Live Free or Die Hard (2007)

    Live Free or Die Hard (2007)

    John McClane, tasked with tracking down a hacker, enlists the help of an ethical hacker who helps him deal with the cybercriminals.

    #Hacking #Cybersecurity
  • Pi (1998)

    Pi (1998)

    A tortured man who believes that mathematics is the language of the universe gets embroiled in a dangerous game as he discovers a mysterious number that he believes can be used to beat the stock market.

    #Cybersecurity #Cybercrime
  • Open Windows (2014)

    Open Windows (2014)

    A blogger wins a dinner date with his favorite actress. After the date gets cancelled, he starts to get manipulated into doing increasingly horrific things by a man posing as the actress' campaign manager.

    #Cybercrime #Devices #Applications #Hacking

More

Loading ...