Difference between revisions of "Template:Hacking in the 2010s"
Jump to navigation
Jump to search
imported>Dsimic (Article renamed) |
imported>Rezonansowy (split some content to a ''Vulnerabilities'' section, add some new items) |
||
Line 5: | Line 5: | ||
| listclass = hlist | | listclass = hlist | ||
| state = {{{state|autocollapse}}} | | state = {{{state|autocollapse}}} | ||
− | |||
| titleclass = | | titleclass = | ||
| image = | | image = | ||
Line 26: | Line 25: | ||
* [[Operation Tovar]] (2014) | * [[Operation Tovar]] (2014) | ||
* [[iCloud leaks of celebrity photos]] (2014) | * [[iCloud leaks of celebrity photos]] (2014) | ||
− | |||
− | |||
− | |||
* [[Sony Pictures Entertainment hack]] (2014) | * [[Sony Pictures Entertainment hack]] (2014) | ||
* [[Office of Personnel Management data breach]] (2015) | * [[Office of Personnel Management data breach]] (2015) | ||
* [[Hacking Team#2015 data breach|Hacking Team]] (2015) | * [[Hacking Team#2015 data breach|Hacking Team]] (2015) | ||
− | * [[Ashley Madison data breach | + | * [[Ashley Madison data breach]] (2015) |
− | * [[ | + | * [[VTech#2015 data breach|VTech data breach]] (2015) |
− | |||
| group2 = [[Hacker group|Groups]] | | group2 = [[Hacker group|Groups]] | ||
Line 74: | Line 69: | ||
* [[weev]] | * [[weev]] | ||
− | | group4 = [[ | + | | group4 = [[Vulnerability (computing)|Vulnerabilities]] <br />discovered |
| list4 = | | list4 = | ||
+ | * [[Heartbleed| Heartbleed]] (2014) | ||
+ | * [[Shellshock (software bug)|Shellshock]] (2014) | ||
+ | * [[POODLE]] (2014) | ||
+ | * [[JASBUG]] (2015) | ||
+ | * [[Stagefright (bug)|Stagefright]] (2015) | ||
+ | * [[DROWN attack|DROWN]] (2015) | ||
+ | |||
+ | | group5 = [[Malware]] | ||
+ | | list5 = | ||
* [[Careto (malware)|Careto / The Mask]] | * [[Careto (malware)|Careto / The Mask]] | ||
* [[CryptoLocker]] | * [[CryptoLocker]] | ||
Line 90: | Line 94: | ||
* [[Stars virus]] | * [[Stars virus]] | ||
* [[Stuxnet]] | * [[Stuxnet]] | ||
− | |||
}}<includeonly> | }}<includeonly> | ||
{{main other|[[Category:Hacking in the 2010s]]}} | {{main other|[[Category:Hacking in the 2010s]]}} |