The Internet at the Speed of Thought

Worst Hacking Cyberattacks in History

at 3:08 pm | By

How Safe Are We, Really?

And how tech savvy are you?

In today’s world, everything keeps moving increasingly towards technology — from the simplest of actions like reading or ordering food to more complex processes like transferring money or the majority of tasks across countless industries. Chances are you access the internet constantly throughout the day, or that you rely on technology in both your home and professional life. Are you doing it securely?

It’s not just our computers and phones that are getting smarter. Now we have smart cars, smart televisions, even smart homes, so slowly but surely our entire lives exist on the grid, with all our information—financial, medical, personal—stored out there in supposedly ‘safe’ networks.

But how safe do you feel, really? These examples of some of the scariest hacks in US and world history will make you second guess just how much you rely on the internet and show how vulnerable we really are…

hacking hooded man with binary


If the government can’t outsmart these hackers, your social media passwords don’t stand a chance.

2008 Cyberattack on the United States

hacking dark backlit keyboard


After a USB supposedly found in the parking lot of a US Department of Defense building in the Middle East was inserted into a computer, the malicious code it contained—believed to have been put there by a foreign intelligence agency—spread across DoD systems, opening backdoors and revealing sensitive data. It took the Pentagon 14 months to clean the worm from their networks in what was called Operation Buckshot Yankee.

To this day, it’s considered the “worst breach of US military computers in history,” and it prompted the creation of the US Cyber Command.

2013 Target Hack

hacking target attack storfront


Do you shop at Target? Major retailers are often the ‘target’ of cyberattacks, but in 2013, the credit and debit card info of over 110 million Target customers was compromised and stolen by hackers, and the aftereffects were felt for months.