The scope and frequency of cyber attacks, data breaches, information disclosures, and the sophistication of the tools used to attack companies and individuals has been increasing at a tremendous rate.
It doesn’t strain our memories to come up with numerous prime examples including the deliberate corporate penetration of Sony (which was “easy”) and of Sands Casino (presumably very hard); or the exposure of super-powerful nation state sponsored attack software Regin that helps enable penetration of specific, complex targets. Don’t forget as well, the numerous phishing attacks that were propagated in 2014. And, perhaps just as infamous, the social engineering attacks in which malicious individuals tricked Apple and GoDaddy into revealing sensitive information.
All of these are different attack vectors, with different ultimate purposes, targeting individuals or corporations. All were successful. And the actual, complete list would be too large to publish (and would be impossible to know as more than half of data breaches go unnoticed).
Read the rest of this post »