Security

Changes in Cybersecurity Since the Early Days of the Web

Often, computer users assume that today’s prevalence of viruses, malware, and other threats are a new development. To an extent, this is true — malware has indeed increased in frequency and strength over the years. But hackers and their malicious creations have existed almost since the dawn of the World Wide Web. Indeed, the first online worm was hatched in 1989! As the Internet grew and developed, so did the amount of risks to online users, and cybersecurity was forced to keep pace.

These days, handling the aftermath of a security breach is as important as preventing one. Of course, there are many firewalls, virus detectors, and scanners you can use to ease your mind and stay protected against future malware. However, in 2017, online crime’s sophistication level is so high that these attacks can’t always be predicted. Read on to discover a short history of online threats — and how cybersecurity efforts have battled them!

Read More: These Are the Current Trends in Cybersecurity

1989: The First Worm is Born

Robert Morris designed the world’s first online worm in 1989. His denial-of-service attack (DoS) was so ruthless that it managed to compromise a lot of the web. This initial virus helped create the infrastructure for a first round of cybersecurity. Computer Emergency Response Teams (CERTs) were founded to immediately combat any malicious threats as they appeared. During this time, the earliest virus scans and firewalls started to be developed, too.

1990s: The Earliest Viruses

Remember the viruses called ILOVEYOU and Melissa? By attacking email accounts, this wicked duo infected millions of computers worldwide. In the 1990s, users weren’t as aware of spam attachments and links. So, everyone was more vulnerable to these attacks, since phishing attempts were far more likely to succeed. People were just clicking on whatever landed in their inbox, whether from a friend or an unknown address. In the aftermath of Melissa and ILOVEYOU, improved cybersecurity technology was built to identify viruses before they began wreaking havoc.

2000s: Online Identity Theft

After the new millennium, an onslaught of online identity thefts occurred. Hackers were targeting credit cards, specifically. The effects were devastating, since millions of dollars had to be returned to the affected victims. Since these breaches were largely occurring at American retailers like TJ Maxx and Target, companies had to invest in improved cybersecurity to protect their customers’ transactions. Point-of-sales (POS) are now heavily safeguarded to avoid losing millions of dollars — along with their customers’ hard-earned trust.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago