Five Biggest Data Breaches In History (That We Know About)

Identity theft has clearly become the tactic of choice for hackers and cyber criminals. Here are the Top 5.

According to the data collected by Breach Level Index (BLI) database, there were 974 data breaches worldwide in the first half of 2016, up 15 percent from the 844 breaches during the previous six months (July to December 2015), and up sharply from the 766 data breaches in the first half of 2015.

More than 554 million data records were lost or stolen in the first half of 2016, compared with some 424 million lost or stolen during the previous six months. That represents a dramatic increase of 31 percent

Whereas in previous years’ theft of payment and financial data dominated the headlines, think of the Home Depot and Target attacks, for example, the past six months has seen the continuation of a trend that began in 2015 in which the theft of personal identifiable information has dominated.

Here are the 5 biggest and worst verified data breaches that we know of, so far.

Yahoo breach

In late 2014, hackers stole information associated with at least 500 million Yahoo user accounts. This breach was publicly disclosed by Yahoo two years later on September 22, 2016. This data breach is the largest discovered in the history of the Internet. User names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and encrypted passwords were compromised.

Marissa Mayer, the CEO of Yahoo, has known about the data breach since at least July 2016 but withheld the information from people, media, investors, and regulators.

FriendFinder breach

Social adult network service FriendFinder was breached, along with all of its other sites. The FriendFinder Network Inc. (FFN) operates AdultFriendFinder.com, webcam sex-work site cams.com, Penthouse.com and a few others; a total of six databases were reported in the haul.

The hack exposed 412,214,295 accounts, according to breach notification site Leaked Source. The worst part of this leak was that more than 900,000 accounts used the password “123456.”

The website had stored the user data in plain visible format or with the insecure secure hash Algorithm 1 (SHA-1).

Myspace breach

Although Myspace is not that popular anymore, users who had accounts on this social networking site should be aware that their old information could be up for sale online.

Time Inc., which bought the social networking site in February has said that names and passwords from more than 360 million Myspace accounts were compromised.

According to Time, the data was limited to usernames, passwords, and email addresses from the platform prior to June 11, 2013, when the site was relaunched with stronger account security.

Thomas White, a security researcher also known under the pseudonym TheCthulhu, has published the database of 427 million passwords for more than 360 million users of the social network.

LinkedIn breach

The social networking website LinkedIn was hacked on 5 June 2012, and passwords for nearly 6.5 million user accounts were stolen by Russian cybercriminals.

LinkedIn disclosed its 2012 data breach soon after it happened, but password-reset notifications at the time indicated that only 6.5 million user accounts had been affected and the actual number was never disclosed.

We don’t know why LinkedIn did not further investigate the original breach, or to inform more than 100 million affected users, in the intervening four years. According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

Heartland Payment Systems

New Jersey-based payment processor Heartland Payment Systems was breached in 2009. This breach exposed information from approximately 130 million credit and debit cards to cybercriminals.

Malware planted on Heartland’s network recorded card data as it arrived from retailers. Because the company processed payments for more than 250,000 businesses across the country, the impact was huge.

The data stolen included the digital information encoded onto the magnetic stripe built on the backs of credit and debit cards.

An American computer hacker, Albert Gonzalez, was sentenced to 20 years in prison in 2010, the longest sentence ever handed down for computer crime in a US court.

PC Quest:       Review of Organised Cyber Crime:       'Hackers for Hire'- Major Police Effort To Fight Criminal Gangs:     

 

« Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.
Self - Flying Aircraft Take To British Skies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.