Five Biggest Data Breaches In History (That We Know About)

Identity theft has clearly become the tactic of choice for hackers and cyber criminals. Here are the Top 5.

According to the data collected by Breach Level Index (BLI) database, there were 974 data breaches worldwide in the first half of 2016, up 15 percent from the 844 breaches during the previous six months (July to December 2015), and up sharply from the 766 data breaches in the first half of 2015.

More than 554 million data records were lost or stolen in the first half of 2016, compared with some 424 million lost or stolen during the previous six months. That represents a dramatic increase of 31 percent

Whereas in previous years’ theft of payment and financial data dominated the headlines, think of the Home Depot and Target attacks, for example, the past six months has seen the continuation of a trend that began in 2015 in which the theft of personal identifiable information has dominated.

Here are the 5 biggest and worst verified data breaches that we know of, so far.

Yahoo breach

In late 2014, hackers stole information associated with at least 500 million Yahoo user accounts. This breach was publicly disclosed by Yahoo two years later on September 22, 2016. This data breach is the largest discovered in the history of the Internet. User names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and encrypted passwords were compromised.

Marissa Mayer, the CEO of Yahoo, has known about the data breach since at least July 2016 but withheld the information from people, media, investors, and regulators.

FriendFinder breach

Social adult network service FriendFinder was breached, along with all of its other sites. The FriendFinder Network Inc. (FFN) operates AdultFriendFinder.com, webcam sex-work site cams.com, Penthouse.com and a few others; a total of six databases were reported in the haul.

The hack exposed 412,214,295 accounts, according to breach notification site Leaked Source. The worst part of this leak was that more than 900,000 accounts used the password “123456.”

The website had stored the user data in plain visible format or with the insecure secure hash Algorithm 1 (SHA-1).

Myspace breach

Although Myspace is not that popular anymore, users who had accounts on this social networking site should be aware that their old information could be up for sale online.

Time Inc., which bought the social networking site in February has said that names and passwords from more than 360 million Myspace accounts were compromised.

According to Time, the data was limited to usernames, passwords, and email addresses from the platform prior to June 11, 2013, when the site was relaunched with stronger account security.

Thomas White, a security researcher also known under the pseudonym TheCthulhu, has published the database of 427 million passwords for more than 360 million users of the social network.

LinkedIn breach

The social networking website LinkedIn was hacked on 5 June 2012, and passwords for nearly 6.5 million user accounts were stolen by Russian cybercriminals.

LinkedIn disclosed its 2012 data breach soon after it happened, but password-reset notifications at the time indicated that only 6.5 million user accounts had been affected and the actual number was never disclosed.

We don’t know why LinkedIn did not further investigate the original breach, or to inform more than 100 million affected users, in the intervening four years. According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

According to LeakedSource, just 50 easily guessed passwords (123456) made up more than 2.2 million of the 117 million encrypted passwords exposed in the breach.

Heartland Payment Systems

New Jersey-based payment processor Heartland Payment Systems was breached in 2009. This breach exposed information from approximately 130 million credit and debit cards to cybercriminals.

Malware planted on Heartland’s network recorded card data as it arrived from retailers. Because the company processed payments for more than 250,000 businesses across the country, the impact was huge.

The data stolen included the digital information encoded onto the magnetic stripe built on the backs of credit and debit cards.

An American computer hacker, Albert Gonzalez, was sentenced to 20 years in prison in 2010, the longest sentence ever handed down for computer crime in a US court.

PC Quest:       Review of Organised Cyber Crime:       'Hackers for Hire'- Major Police Effort To Fight Criminal Gangs:     

 

« Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.
Self - Flying Aircraft Take To British Skies »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

ISGroup S.r.l

ISGroup S.r.l

ISGroup is your trusted partner for Network Penetration Testing, operating under internationally recognized standards and a strong focus on research.