2012: Looking back at the major hacks, leaks and data breaches

2012: Looking back at the major hacks, leaks and data breaches

Summary: ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.

TOPICS: Security, Cloud, Privacy

 |  Image 10 of 20

  • Thumbnail 1
  • Thumbnail 2
  • Thumbnail 3
  • Thumbnail 4
  • Thumbnail 5
  • Thumbnail 6
  • Thumbnail 7
  • Thumbnail 8
  • Thumbnail 9
  • Thumbnail 10
  • Thumbnail 11
  • Thumbnail 12
  • Thumbnail 13
  • Thumbnail 14
  • Thumbnail 15
  • Thumbnail 16
  • Thumbnail 17
  • Thumbnail 18
  • Thumbnail 19
  • Thumbnail 20
  • Password breach hits 1.5 million eHarmony users

    Only a few days after the LinkedIn breach, dating Web site eHarmony was hit with a similar attack that led to the exposure of 1.5 million hashed passwords. The firm's security practices were not as strong. Its security systems only saved the user's password -- despite some users owning multi-case passwords -- in upper-case characters only, further weakening the system.

  • Last.fm next in line to suffer massive password breach

    Next in line to suffer a security breach in June was Last.fm, which after claims of a similar attack on the online music social network. (ZDNet and Last.fm are both owned by CBS).

    It became quickly apparent that the incidents were linked, but led to further widespread criticism of the password encryption standards and security features offered by Web services. In the aftermath, many Web sites and services bolstered their security to prevent such breaches occurring again.

  • July: Yahoo password breach exposes 450,000 user logins

    Yahoo, beleaguered by corporate failures and a revolving door of CEOs, came under fire once again after hackers were able to attack the firm's networks by exploiting a flaw and downloading 450,000 plain-text login credentials.

    While the breach was not as large as others, such as LinkedIn or Global Payments, but details of the breach were soon reported and it became quickly apparent how easy it was to acquire the vast cache of data. Using a union-based SQL injection attack, it showed just how insecure Yahoo's security was.

    Yahoo was subsequently sued for negligence shortly after the hack in a San Jose, California court. The hackers said in a blog post: "We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat." A week later, the former Web portal giant gave the all clear and resumed its operations.

Topics: Security, Cloud, Privacy

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories


Log in or register to join the discussion
  • And yet, we still tout the "security" of "the cloud"

    And yet, we still tout the "security" of "the cloud."

    Truth be known - if you're a cloud provider, you've probably been hacked. And you might not even know it.

    Yet, here we are, in an age where we claim cloud computing is "more secure."

    It's not more secure. In fact, the hacks against the cloud are far more scary and the stolen information far more important than anything we've seen against desktop PCs.

    Hack one person? You get one credit card number. Hack a cloud provider? You get EVERYBODY's credit card number.

    Frankly, it's time to re-think "the cloud" and how to provide security. Maybe "the cloud" isn't such a good idea for everything after all.
    • It's not the cloud.

      It's typical ZDNet propaganda by omission, details were left out. The first thing anyone want's to know in these articles is what OS was hacked. Most problems relate to password breaches, where a single Windows computer was hacked by a "Zero day" or malicious email to get password information and then everything came apart. Administrators can't remember all their information, but keeping it stored on a networked Windows notebook is negligence. For example, like what happened at Google. That's why Google no longer allows Microsoft operating systems to be used by employees. Another ZDNet article without any backbone, specifically for the benefit of MS.
  • It's not the Cloud????

    Funny . . . the servers, OSs, procedures, etc that a Cloud vendor provides is that part of the Cloud on which your corporate data resides but now with it there instead of in-house you have absolutely NO control over it. Plus, as the Cloud vendor expands its customer base, you will start to see the management and maintenance of your data outsourced offshore to the cheapest bidders who most likely will not care about the security of your company's data or or so underpaid that selling your customer database is the only way that the person can provide for their family.
  • Unfortunate Article Format - Poor editorial decision

    I really, really, really, really, really, really, really could have used a 'View as one page' option on this article. In it's present format it is totally useless to me. That also means that I do not have the opportunity to view your ads and sponsors. Think about it.
    Leo Regulus