World Wide Web – The journey from 1990
This year on my birthday, family and friends sent me gifts and flowers bought from online stores. Even my cake was ordered online! I wondered, “How would things have been without the World Wide Web?”
August 1, 2017 was the 26th birthday of the World Wide Web and this is the right opportunity to thank its creators, and this service for all that it has made possible.
The World Wide Web (we know it better as the www that precedes all web addresses) was the brain-child of Tim Berners-Lee and Robert Cailliau, and was born in August 1990 at CERN in Switzerland. Very soon this service became the magic portal that gave access to infinite resources online – something our previous generation would have thought possible only in science fiction.
A year later in August 1991, the first website was published, and today there are more than one billion websites in existence!
How many times do you use the browser service each day? Take a guess-10, 20, 30? Almost everything you do online requires you to use a browser – whether it’s using Google for information, watching movies and shows online, checking social media accounts, making online transactions or even communicating through WhatsApp. Well, that makes it how many times??
Cyber criminals have created bugs that can attack systems, crash devices, steal files, and disrupt organizational functioning and services. As responsible netizens, we should therefore be aware of the potential cyber threats and use a reputed security software to keep us and our family safe online.
The theory of a computer bug or virus was introduced long before the first virus was developed. In 1983, Fred Cohen demonstrated a program that could replicate itself multiple times. The first worm to create global disruption was the ‘Morris Worm’. Developed by Robert Morris, it leveraged the vulnerabilities in the UNIX system and replicated itself regularly, massively slowing down computers. This attack has the dubious distinction of being the first global multi-platform attack and raised awareness about the need for cybersecurity.
The exponential growth of internet users, businesses and services online has given ample opportunities for cyber criminals to launch targeted attacks, to fulfil various ends. Modern hackers are becoming increasingly sophisticated using social engineering and phishing to target gullible users.
Some notable global cyber-attacks include:
- 2004: Netsky and Sasser worm attacks
- 2006: Operation Shady Rat
- 2008: Project Chanology
- 2009: Yahoo attack (Operation Aurora)
- 2010: Stuxnet worm
- 2011: Sony PlayStation Hack
- 2012: Flame
- 2013: Spamhaus Project
- 2017: #Wannacry and #Petya ransomware
Though we use the terms Virus, Worms, Trojan Horses interchangeably, they are in fact not quite the same. While a virus needs a host file to spread from one computer to another; a worm is a self-replicating program that can create copies of itself and send to all on the user’s contact list. A Trojan horse pretends to be a genuine software but actually contains a malicious code.
Being aware is the first step towards cyber safety and what better way to observe World Wide Web day than by being a safe surfer? Here’s how you can ensure your safety while browsing:
- Use a well-known security software, like McAfee LiveSafe or McAfee Total Protection
- Always install OS updates, don’t keep it for later
- Disable Auto-run of attachments in your e-mail program
- Be very suspicious of .exe files
- Scan all apps, devices, files and software before use
- Use McAfee WebAdvisor to identify safe sites to visit
Here’s looking forward to the achievement of the Digital India vision where every citizen will know how to browse safely and lead a secure digital life and encourage their family to do so.
The rise in ransomware attacks has directed global attention towards cyber insurance and we shall be exploring this in our next blog. See you next time!
More antivirus and malware news?
- Lenovo settles lawsuits with 32 states over Superfish
- Survey finds faith in Internet trust system fading fast
- Megaupload case near collapse
- Resolved: php.scripts.psu.edu service disruption
- Security Manager’s Journal: Shrinking staff, and a time crunch
- Business-driven data protection
- macOS RAT Uses 0-Day for Root Access
- US judge dismisses challenge to border laptop searches
- F**CKWIT – the video!
- Silk Road bitcoin-stealing Secret Service agent re-arrested