Data leaks: The most common sources
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...
January: A database used by the Department of Homeland Security's Office of the Inspector General was confirmed breached in January, affecting over 247,167 and former employees and individuals associated with the department's previous investigations. The breach marked the first one of the first intrusions this year.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
February: A company acquired by FedEx leaked thousands of customer records, thanks to a leaking Amazon S3 bucket. The data included names, addresses, and phone numbers.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: The travel booking site said about 880,000 payment cards, or about two years' worth of data, was stolen by a hacker, thanks to a security vulnerability in the travel site's legacy booking system.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: India's national ID database, claimed by the government to be secure, leaked data on potentially every Indian citizen -- some 1.1 billion people -- who signed up to the database, including their names and information about services they are connected to, such as their bank details.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: French weekly news magazine L'Express left a server containing a database of its readers exposed online for weeks without a password. Even after the Paris-based magazine was warned of the exposure, the database wasn't secured for another month
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: The controversial Trump campaign-linked data was suspended from Facebook for using the data to determine who voters might choose at the ballot box. In the end, more than 80 million people were affected by the data exposure.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: Twitter admitted that user passwords were briefly stored in plaintext, and might have been exposed to the company's internal tools and staff. The company said it fixed the bug and that an investigation "shows no indication of breach or misuse" by anyone.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: An exposed and unauthenticated API on T-Mobile's website let anyone access the personal account details of any customer with just their cell phone number. The returned data included a customer's full name, postal address, billing account number, and in some cases information about tax identification numbers.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: A major TV network, a UK cell giant, and one US government agency are among the companies affected by this new class of attacks that allows hackers to pivot quickly and easily inside a company's cloud infrastructure.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: Rail Europe, a site used by Americans to buy train tickets in Europe, has revealed a three-month data breach of credit cards and debit cards, which resulted in credit card numbers, expiration dates, and card verification codes swiped from its servers -- everything needed by a fraudster to carry out unauthorized purchases.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: A data breach at a federally funded active shooter training center has exposed the personal data of thousands of US law enforcement officials. Not only that, the leaked data revealed that many police departments are unable to respond in an active shooter situation.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: Some 340 million records were stolen from a server run by Exactis, a company you've likely never heard of, after the data was found on a publicly accessible system. Each record contains a huge amount of data, including contact information and public records, to "more than 400 variables on a vast range of specific characteristics."
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: Sports clothing maker Adidas said that its website was hacked, and data -- including contact information, usernames, and hashed passwords -- were stolen in the breach.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: A recent breach at Ticketmaster was just "the tip of the iceberg" of a wider, massive credit card skimming operation, research has found. By targeting suppliers of third-party code installed on e-commerce websites -- like Ticketmaster -- the hackers were able to in some cases get "nearly 10,000 victims instantly."
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: The fitness tracking app, Polar Flow, allowed anyone to access a user's fitness activities over several years -- simply by modifying the browser's web address. That location data revealed the home addresses of intelligence officers -- even when their profiles were set to private.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: Thousands of credentials for accounts associated with New Zealand-based file storage service Mega have been published online. Their accounts had been improperly accessed and file names scraped. One of the accounts in the file contained file listings for what described child abuse content.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: Usernames, email addresses,and social media tokens -- used to log into accounts -- for 21 million users were stolen from the social media app -- with over 4.7 million phone numbers also taken. Timehop later said that genders and dates of birth were also taken in the breach. None of the data was protected with two-factor, the company said.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: The government of Singapore described the attack as "deliberate, targeted, well-planned." Even the country's prime minister had his data stolen in the breach, which affected 1.5 million patients who visited SingHealth's outpatient clinics over a three year period.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
Dozens of breaches, over a billion affected.
May: An exposed and unauthenticated API on T-Mobile's website let anyone access the personal account details of any customer with just their cell phone number. The returned data included a customer's full name, postal address, billing account number, and in some cases information about tax identification numbers.
Caption by: Zack Whittaker
Data leaks: The most common sources
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...
Facebook's worst privacy scandals and data disasters
Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.
The best VPN services: Our 10 favorite vendors for protecting your privacy
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...
How to avoid being phished during holiday shopping season
Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...
Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security
Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...
Cybercrime and malware, 2019 predictions
Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.
Apricorn Aegis Fortress L3 portable storage drive
If you're looking for a fast, ultra-rugged, secure encrypted portable storage drive that's available in both HDD and SSD flavors, look no further than Apricorn's new Aegis Fortress ...
Join Discussion