{"id":59,"date":"2014-04-23T08:44:23","date_gmt":"2014-04-23T08:44:23","guid":{"rendered":"http:\/\/ssls.com\/blog?p=59"},"modified":"2023-09-14T06:45:21","modified_gmt":"2023-09-14T13:45:21","slug":"hacking-history","status":"publish","type":"post","link":"https:\/\/www.ssls.com\/blog\/hacking-history\/","title":{"rendered":"Hacking History: A Timeline of Hack&nbsp;Tactics"},"content":{"rendered":"<pre>Hacking is an epidemic. In 2013, Twitter, Facebook, Adobe, Target and NBC were all the victims of high-profile <a href=\"https:\/\/www.ssls.com\/blog\/can-an-ssl-be-hacked\/\">security<\/a> breaches \u2013 and they weren't alone.<\/pre>\n<p>It&#8217;s estimated that 30,000 websites are hacked every single day, ranging from small company blogs to social media behemoths. However, hacking wasn&#8217;t always the premise of criminals seeking to defraud companies. Hacking originally emerged in the 50s and 60s, and the earliest hacks were typically shortcuts invented to bypass or improve computer systems.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/www.ssls.com\/\">SSLs.com<\/a> has performed thorough research and put together an infographic of hacking history. The timeline spans some of the most iconic moments in the history of computer hacking, from John Draper&#8217;s infamous blue boxes to the blocked extradition of Gary McKinnon.<\/p>\n<p><a href=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/04\/SSL_Info_HackTimeline_01-04-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-50\" src=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/04\/SSL_Info_HackTimeline_01-04-14.jpg\" alt=\"Hacking History Infographic\" width=\"960\" height=\"8045\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking is an epidemic. In 2013, Twitter, Facebook, Adobe, Target and NBC were all the victims of high-profile security breaches \u2013 and they weren&#8217;t alone. It&#8217;s estimated that 30,000 websites are hacked every single day, ranging from small company blogs to social media behemoths. However, hacking wasn&#8217;t always the premise of criminals seeking to defraud [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[14,24,17],"class_list":["post-59","post","type-post","status-publish","format-standard","hentry","category-news","tag-infographic","tag-security","tag-tech"],"_links":{"self":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":30,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"predecessor-version":[{"id":2568,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/59\/revisions\/2568"}],"wp:attachment":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}