Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The biggest hacks, data breaches of 2020 (so far)

5 of 9 NEXT PREV
  • Microsoft

    Microsoft

    In January, Microsoft disclosed a data breach occurring through one of the tech giant's internal customer support databases. 

    Microsoft said anonymized user analytics, contained in roughly 250 million entries, were exposed. This included email and IP addresses.

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • US cannabis users

    US cannabis users

    In the same month, researchers found a leaky AWS bucket exposed online that contained the personally identifiable information (PII) of 30,000 individuals linked to the medical and recreational marijuana, including patients. 

    It is thought that the database belonged to a PoS provider for legal dispensaries across the US.

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Estée Lauder

    Estée Lauder

    Moving on to February, Estée Lauder was embroiled in a data breach in which 440 million records were compromised, including the exposure of internal company emails and non-consumer email addresses. 

    Via: Essential Retail

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • T-Mobile

    T-Mobile

    In March, T-Mobile revealed a security incident in which cyberattackers were able to successfully infiltrate the firm's email services, leading to the compromise of T-Mobile customer and employee information, as well as staff email accounts.

    Names, addresses, phone numbers, account numbers, plan information, and billing information may have been stolen.

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Marriott

    Marriott

    A total of 5.2 million hotel guests were impacted by a data breach in March. Hackers were able to access two accounts belonging to Marriott employees who had access to customer information relating to the hotel chain's loyalty scheme. 

    A range of PII including names, genders, phone numbers, travel information, and loyalty program data was accessed.

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Whisper

    Whisper

    In March, Whisper, an anonymous secret-sharing app, was alerted to a security failure that exposed user content and profile information in connection to messages -- including nicknames, stated ages, location data, and group memberships -- caused by a database left open and exposed online. 

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • SBA emergency business loan applicants

    SBA emergency business loan applicants

    The US Small Business Administration (SBA) said in April that approximately 8,000 individuals who had applied for emergency business loans due to COVID-19 disruption were affected by a data breach.

    The portal used to apply for the loans may have leaked applicant names, Social Security numbers, physical and email addresses, dates of birth, citizen status, and insurance information. 

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Nintendo

    Nintendo

    At the end of April, Nintendo revealed an account hijacking scheme that compromised roughly 160,000 users. Customers claimed that cyberattackers were using their accounts to fraudulently purchase games and Fortnite virtual currency. 

    A legacy login system, now disabled, was to blame. 

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • easyJet

    easyJet

    On May 19, budget airline easyJet said that information belonging to nine million customers may have been exposed, including over 2,200 credit card records, following a cyberattack.

    easyJet is now facing an £18 billion class-action lawsuit due to the incident. 

    Via: ZDNet

    Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

5 of 9 NEXT PREV
Charlie Osborne

By Charlie Osborne | June 1, 2020 -- 05:00 GMT (22:00 PDT) | Topic: Security

  • Microsoft
  • US cannabis users
  • Estée Lauder
  • T-Mobile
  • Marriott
  • Whisper
  • SBA emergency business loan applicants
  • Nintendo
  • easyJet

Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.

Read More Read Less

Marriott

A total of 5.2 million hotel guests were impacted by a data breach in March. Hackers were able to access two accounts belonging to Marriott employees who had access to customer information relating to the hotel chain's loyalty scheme. 

A range of PII including names, genders, phone numbers, travel information, and loyalty program data was accessed.

Via: ZDNet

Published: June 1, 2020 -- 05:00 GMT (22:00 PDT)

Caption by: Charlie Osborne

5 of 9 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | June 1, 2020 -- 05:00 GMT (22:00 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums