All the world now depends on the computer. All systems are now computerized, ranging from banking, trading, shopping, telecommunications, and information. It makes us all over the world are highly vulnerable to cyber attacks.
Therefore, cyber warfare triggered by the pressure and the arrest of the founder of the site WikiLeaks quite worrying. The reason is, hackers WikiLeaks supporters then targeting companies such as financial services providers paypai, Mastercard, and Visa, so that financial and trade transactions online through those services could be disrupted.
Following this, the biggest cyber events recorded by history, which is recorded by the Discovery site.
1. Wor attack Stuxnet (2010).
Stuxnet worm attack is viewed by many experts as one of the biggest attack that involves a very complex program code.
This worm attacks that exploit various kinds of gaps exist in the Windows operating system that has not been known, and to target the industrial system that controls a variety of machine tools in installation of electrical pembangkt or in factories.
Nothing wrong when many are suspicious that the worm was masterminded by a major party, even sponsored by major countries, dalalam this is the west country.
"level of attacks like this can only be done by the government of a country, or an entity which is supported by funding extraordinary," said Paul Royal, IT experts from the Georgia Institute of Technology.
Iran became the country's most lots infected by this worm, and many are suspicious, deliberately wanted to paralyze the west of Bushehr nuclear power plant with this worm.
2. Operation Aurora (2009).
In 2009, about 30 big companies including Google and Adobe Systems, reportedly benajdi victim of cyber attacks are very complicated. The hackers managed to steal intellectual property from companies earlier by exploiting security holes in Internet Explorer browser.
Vice President of Threat Research McAfee, Dmitri Alperovitch said that he found the word 'Aurora' in the file directory on a computer attacker, when to do the tracking of infected computers. It is believed, a hacker named the Aurora as the name of this operation.
Inauguration of pages Google in China in April 2006
"In the case of Aurora, they do not want money. They target the repository system is proprietary and intellectual property owned by companies and system source code, which is the most important thing is owned by these companies, "said Alperovitch.
Not only the people who work in multinational companies that have to be careful with this intrusion effort, but some opposition leaders of China are also targeted. From the documents leaked by Wikileaks, this attack is instructed by an official at the Chinese government.
3. U.S. Central Command (2008)
In 2008 the U.S. Defense Department, had an attack. Its source: a USB flash drive that is not authorized tucked into one laptop at a U.S. military base in the Middle East.
Flash disks that contain malicious code that was developed by foreign intelligence and spread through the U.S. Defense Department computer system and cause data to be sent to a foreign server.
Other military attacks carried out via portable media is the event of copying 250 thousand U.S. diplomatic memo data and video Apache helicopter attack U.S. troops against civilians by a group of Private First Class Bradley Manning into Buzzworthy CD from one of the U.S. military headquarters in Iraq.
4. Georgia (2008)
In 2008 Russia and Georgia to the conflict in South Ossetia. Cyberattacks crippling several Georgian government websites and local media sites, after Georgia attacked South Ossetia. This is an attack similar to the attack on Estonia in 2007.
The attack on Georgia was also performed using the method of Distributed Denial of Service. Whoever the mastermind of this attack seems to have developed a botnet, where people can download to assist attacks against Georgian websites.
5. Estonia (2007)
Estonia faced a wave of cyberattacks that hit the country's entire Internet infrastructure, ranging from government websites, banks, until the sites their local newspaper.
This attack coincided with the dispute between Estonia and Russia related to the planned removal of the tomb of Tallinn by the Estonian government. The media analysts call this conflict as the first cyber war. However, the Russians themselves denied that the attacks against Estonia launched by the Russian government.