-
Paper published by John von Nuemann believed to be foundation of study of viruses
-
Bob Thomas, created the first virus called the Creeper. The Creeper was self-contained.
-
Ray Tomlinson, colleague to Bob Thomas (creator of the first virus, The Creeper) developed the first antivirus ,the Reaper to eradicate the Creeper. Like the Creeper, the Reaper was self-contained.
-
During the 1980s and 1990s, the term hackers became associated for criminal activity. The origin of 'black hat hacker' was attributed to Richard Stallman.
-
NYT described white hat activities as part of a "mischievous but perversely positive 'hacker' tradition".
-
First virus spread in the wild. Targeted Apple II computers.
-
First PC virus in the wild, Brain, was discovered in 1986.
-
McAfee, G Data, and ESET all create first antivirus software in 1987.
-
Created by Joseph Popp, AIDS trojan was the first ransomware. Once installed, it would count each time you booted up your computer, and after 90 times, it would hide all of your files and demand a letter with $189 to "renew your license".
-
Packet filtering firewalls were born.
-
An Isreali based security company released the world's first stateful inspections based firewall
-
Stateful inspection firewalls became much more mainstream and supported VPN and other functions.
-
Although the concept has been around longer, the phrase 'ethical hacking' was first used in 1995 by John Patrick, IBM Vice President at the time.
-
The first email based virus, Melissa, was the first to use social engineering.
-
-
The unified threat management (UTM) theory was introduced. This combined traditional firewalls, intrusion detection, antivirus, email filtering, and other functions into a firewall.
-
The internet offers new opportunities to ransomware.
-
-
-
NGFW focused on performance degradation when enabling multiple functions and also allowed for better management of users.
-
First example of attackers file encryption and attackers demanding money for decryption.
-
First example of locker ransomware.
-
-
Stronger Encryption: The emergence of CryptoLocker.
-
First global campaigns of ransomware.
-
First purpose-built internal firewall. Stateful layer 7 firewall protection to prevent lateral movement and other attack vectors specific to internal network of on-premise, hybrid, and multi-cloud environments.