Five Biggest Data Breaches In History (That We Know About)

Identity theft has clearly become the tactic of choice for hackers and cyber criminals. Here are the Top 5.

According to the data collected by Breach Level Index (BLI) database, there were 974 data breaches worldwide in the first half of 2016, up 15 percent from the 844 breaches during the previous six months (July to December 2015), and up sharply from the 766 data breaches in the first half of 2015.

More than 554 million data records were lost or stolen in the first half of 2016, compared with some 424 million lost or stolen during the previous six months. That represents a dramatic increase of 31 percent

Whereas in previous years’ theft of payment and financial data dominated the headlines, think of the Home Depot and Target attacks, for example, the past six months has seen the continuation of a trend that began in 2015 in which the theft of personal identifiable information has dominated.

Here are the 5 biggest and worst verified data breaches that we know of, so far.

Yahoo breach

In late 2014, hackers stole information associated with at least 500 million Yahoo user accounts. This breach was publicly disclosed by Yahoo two years later on September 22, 2016. This data breach is the largest discovered in the history of the Internet. User names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and encrypted passwords were compromised.

Marissa Mayer, the CEO of Yahoo, has known about the data breach since at least July 2016 but withheld the information from people, media, investors, and regulators.

FriendFinder breach

Social adult network service FriendFinder was breached, along with all of its other sites. The FriendFinder Network Inc. (FFN) operates AdultFriendFinder.com, webcam sex-work site cams.com, Penthouse.com and a few others; a total of six databases were reported in the haul.

The hack exposed 412,214,295 accounts, according to breach notification site Leaked Source. The worst part of this leak was that more than 900,000 accounts used the password “123456.”

The website had stored the user data in plain visible format or with the insecure secure hash Algorithm 1 (SHA-1).

Myspace breach

Although Myspace is not that popular anymore, users who had accounts on this social networking site should be aware that their old information could be up for sale online.

Time Inc., which bought the social networking site in February has said that names and passwords from more than 360 million Myspace accounts were compromised.

According to Time, the data was limited to usernames, passwords, and email addresses from the platform prior to June 11, 2013, when the site was relaunched with stronger account security.

Thomas White, a security researcher also known under the pseudonym TheCthulhu, has published the database of 427 million passwords for more than 360 million users of the social network.

LinkedIn breach

The social networking website LinkedIn was hacked on 5 June 2012, and passwords for nearly 6.5 million user accounts were stolen by Russian cybercriminals.

LinkedIn disclosed its 2012 data breach soon after it happened, but password-reset notifications at the time indicated that only 6.5 million user accounts had been affected and the actual number was never disclosed.

We don’t know why LinkedIn did not further investigate the original breach, or to inform more than 100 million affected users, in the intervening four years. According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

Heartland Payment Systems

New Jersey-based payment processor Heartland Payment Systems was breached in 2009. This breach exposed information from approximately 130 million credit and debit cards to cybercriminals.

Malware planted on Heartland’s network recorded card data as it arrived from retailers. Because the company processed payments for more than 250,000 businesses across the country, the impact was huge.

The data stolen included the digital information encoded onto the magnetic stripe built on the backs of credit and debit cards.

An American computer hacker, Albert Gonzalez, was sentenced to 20 years in prison in 2010, the longest sentence ever handed down for computer crime in a US court.

PC Quest:       Review of Organised Cyber Crime:       'Hackers for Hire'- Major Police Effort To Fight Criminal Gangs:     

 

« Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.
Self - Flying Aircraft Take To British Skies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.