Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Top 10 Security Incidents and Vulnerabilities of 2014

    By
    Sean Michael Kerner
    -
    December 30, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Top 10 Security Incidents and Vulnerabilities of 2014

      1 - Top 10 Security Incidents and Vulnerabilities of 2014

      by Sean Michael Kerner

      2No. 10: WireLurker Targets Mac OS X and iOS

      2 - No. 10: WireLurker Targets Mac OS X and iOS

      WireLurker, first disclosed in November by Palo Alto Networks’ Unit 42 research group, is an interesting hybrid attack that takes aim at both Apple OS X and iOS users. To be exploited, a user needs to download a malicious file on a Mac OS X machine and then connect to an iOS device.

      3No. 9: Fake ID Vulnerability Takes Aim at Android

      3 - No. 9: Fake ID Vulnerability Takes Aim at Android

      In July, Bluebox Security revealed the Fake ID flaw in Android, which gives an attacker the ability to impersonate a valid app developer.

      4No. 8: POODLE Puts an End to SSL v3

      4 - No. 8: POODLE Puts an End to SSL v3

      The POODLE, or Padding Oracle On Downgraded Legacy Encryption, vulnerability was first disclosed by Google security researchers on Oct. 14. POODLE is a vulnerability in the SSL 3.0 cryptographic protocol that can enable an attacker to access and read encrypted communications.

      5No. 7: Sandworm Goes After Windows

      5 - No. 7: Sandworm Goes After Windows

      Among the many Microsoft vulnerabilities patched in 2014 is one dubbed Sandworm by security firm iSight Partners. The vulnerability, which also is known as CVE-2014-4114, is a flaw in Microsoft’s Object Linking and Embedding (OLE) that was used in attacks against NATO and the European Union.

      6No. 6: Shellshock Shocks Linux

      6 - No. 6: Shellshock Shocks Linux

      The Shellshock vulnerability, first disclosed on Sept. 24, is a flaw in the open-source BASH (Bourne Again SHell). The Shellshock flaw gave an attacker the ability to execute arbitrary commands on vulnerable servers. Adding to the panic surrounding Shellshock was the fact that it took several days for complete patches to emerge that protected users.

      7No. 5: Xen Flaw Reboots the Public Cloud

      7 - No. 5: Xen Flaw Reboots the Public Cloud

      On Oct. 1, the open-source Xen hypervisor project disclosed XSA-108, a security vulnerability that gave access to the resources of other virtual machines on the same host. It’s a flaw that was patched by the major public cloud providers, including Amazon, Rackspace and IBM, before it was first publicly disclosed.

      8No. 4: JPMorgan Attack Exposes 83 Million to Risk

      8 - No. 4: JPMorgan Attack Exposes 83 Million to Risk

      On Oct. 2, financial giant JPMorgan Chase publicly acknowledged that its systems were hacked in an attack that exposed 76 million households and an additional 7 million small businesses to a data compromise.

      9No. 3: Backoff Malware Leads Retailer Assault

      9 - No. 3: Backoff Malware Leads Retailer Assault

      Many big-name retailers were exploited by point-of-sale (POS) retail malware in 2014, including Home Depot, Staples, Neiman Marcus and UPS. One of the leading POS malware attacks in 2014 came from the Backoff malware, which the U.S. Secret service warned in August had impacted more than 1,000 retailers.

      10No. 2: Heartbleed Impact Was Widespread

      10 - No. 2: Heartbleed Impact Was Widespread

      The Heartbleed vulnerability, which was first disclosed on April 7, is a flaw in the open-source OpenSSL cryptographic library. Due to the fact that OpenSSL is widely deployed and embedded within multiple forms of technology, the impact of Heartbleed was widespread, affecting VPNs, Webservers and mobile devices.

      11No. 1: Sony Hack Has International Impact

      11 - No. 1: Sony Hack Has International Impact

      No attack has captured the imagination and attention of the general public as much as the attack on Sony Pictures. First disclosed at the end of November, the Sony Pictures attack shut down many IT operations at the company and led to the accusation by the FBI that North Korea was behind the attack.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.