Skip to content

TechRepublic

Trending Now

use-loom-record
Image: fizkes/Adobe Stock
Article

How to use Loom to record and share quick videos for colleagues

linux-nas-users-groups-tutorial
Image: MuzzyCo/Adobe Stock
Article

How to add users and groups in openmediavault

hp-system76-dev-laptop
Image: Sundry Photography/Adobe Stock
Article

System76 lands a deal with HP to bring about a new developer-centric laptop, the HP Dev One

pivotchart-buttons-tutorial
Image: PixieMe/Adobe Stock
Article

How to convert a Microsoft Excel slicer into a series of filtering buttons on a PivotChart in Excel

  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Data Centers

The 18 most frightening data breaches

By Fox Van Allen October 28, 2015, 12:04 PM PDT

Image
1
of 18
Previous Next

tr-data-breaches-clinton.jpg
tr-data-breaches-clinton.jpg
The 18 most frightening data breaches

Democratic National Committee (2016)

Democratic National Committee (2016)

All data breaches are scary, but some just have that extra scream factor.

On July 22, 2016, Wikileaks published 19,252 emails and 8,034 attachments belonging to top-level staffers at the Democratic National Committee, exposing donor information and an anti-Bernie Sanders bias. U.S. intelligence agencies strongly believe Russia to be behind the attack, The New York Times reports.

There is no evidence that the hacker’s intent was to influence the 2016 Presidential election. That said, the emails likely had a damaging effect on Ms. Clinton’s chances considering Wikileaks released a second batch of 8,263 emails less than 48 hours before Election Day.

Also see: The 18 scariest computer viruses of all time

tr-data-breaches-myspace.jpg
tr-data-breaches-myspace.jpg
The 18 most frightening data breaches

Myspace (2016)

Myspace (2016)

In May 2016, once-popular social networking site Myspace announced that it was the victim of one of the largest data breaches in history. Over 360 million accounts were compromised, including the email addresses and passwords of past users. It is not known when the initial breach occurred.

Singer Justin Timberlake purchased an undisclosed stake in Myspace in 2011. The site was sold to Time Inc. in early 2016.

tr-data-breaches-yahoo.jpg
tr-data-breaches-yahoo.jpg
The 18 most frightening data breaches

Yahoo (2016)

Image: Jason Doiy, Getty Images

Yahoo (2016)

In late 2014, a “state-sponsored actor” hacked former Internet giant Yahoo, compromising a record 500 million accounts. The criminals made off with names, email addresses, telephone numbers, dates of birth, encrypted passwords, and the answers to users’ security questions. No financial data was stolen.

The hack was not disclosed publicly until September 2016, putting the company’s recently proposed sale to Verizon in serious jeopardy.

Image: Jason Doiy, Getty Images
techrepublic-scary-data-breaches-ashley-madison.jpg
techrepublic-scary-data-breaches-ashley-madison.jpg
The 18 most frightening data breaches

Ashley Madison (2015)

Image: Chris Wattie/Reuters/Corbis

Ashley Madison (2015)

In arguably the most embarrassing data breach of the bunch, a group calling itself “The Impact Team” stole 37 million records from adultery website Ashley Madison in 2015, including many records that customers had paid to have deleted.

Virtually all of the company’s data was stolen in the hack, including records that suggest most female accounts on the site are fake, and that the company used female chat bots to trick men into spending money.

Image: Chris Wattie/Reuters/Corbis
techrepublic-scary-data-breaches-livingsocial.jpg
techrepublic-scary-data-breaches-livingsocial.jpg
The 18 most frightening data breaches

LivingSocial (2013)

Image: Rick Gomez/Blend Images/Corbis

LivingSocial (2013)

Daily deals company LivingSocial had its network compromised in 2013, with hackers stealing roughly 50 million names, email addresses, birthdays, and encrypted passwords from its SQL database.

Image: Rick Gomez/Blend Images/Corbis
techrepublic-scary-data-breaches-sony-playstation.jpg
techrepublic-scary-data-breaches-sony-playstation.jpg
The 18 most frightening data breaches

Sony PlayStation Network (2011)

Image: Christopher Jue/epa/Corbis

Sony PlayStation Network (2011)

Game over, man. In April 2011, hackers raided Sony’s PlayStation Network (PSN) service, stealing personally identifiable information from more than 77 million gamers.

Sony was further criticized for delaying the release of public information about the theft and for storing customer data in an unencrypted form.

The attack took Sony’s PSN out of service for 23 days.

Image: Christopher Jue/epa/Corbis
techrepublic-scary-data-breaches-irs.jpg
techrepublic-scary-data-breaches-irs.jpg
The 18 most frightening data breaches

Internal Revenue Service (2015)

Image: Jonathan Ernst/Reuters/Corbis

Internal Revenue Service (2015)

Nigerian scammers pilfered more than $50 million from the U.S. Treasury via an embarrassingly simple 2015 hack of the Internal Revenue Service website.

Information scraped from previous data hacks was used to steal Americans’ identities and request copies of past tax returns on the IRS website. The crooks then filed new tax returns with falsified data, requesting big refunds.

The hack caused massive nightmares for the estimated 334,000 people whose records were stolen before the IRS shut down the transcript request service.

Image: Jonathan Ernst/Reuters/Corbis
techrepublic-scary-data-breaches-target.jpg
techrepublic-scary-data-breaches-target.jpg
The 18 most frightening data breaches

Target (2013)

Image: Carlo Allegri/Reuters/Corbis

Target (2013)

Hackers installed point-of-sale malware on Target’s computer network sometime in 2013, resulting in the theft of more than 70 million customer records. Stolen data included payment card numbers, expiration dates, and CVV codes.

The retailer reached out to affected customers by offering free data monitoring (standard practice) and a 10% off discount on a future shopping trip. But it was too little, too late; same-store sales slid in the quarter following the hack.

Image: Carlo Allegri/Reuters/Corbis
techrepublic-scary-data-breaches-anthem.jpg
techrepublic-scary-data-breaches-anthem.jpg
The 18 most frightening data breaches

Anthem (2015)

Image: Michael Nelson/epa/Corbis

Anthem (2015)

Anthem, the United States’ second largest for-profit health insurer, disclosed in February 2015 that it had lost 78.8 million unencrypted customer records to criminals. Names, social security numbers, email addresses, and income data was stolen.

The rare piece of good news: Financial and medical records were not affected.

Image: Michael Nelson/epa/Corbis
techrepublic-scary-data-breaches-adobe.jpg
techrepublic-scary-data-breaches-adobe.jpg
The 18 most frightening data breaches

Adobe (2013)

Image: John G. Mabanglo/epa/Corbis

Adobe (2013)

Adobe revealed in October 2013 that hackers had stolen 38 million active customer IDs and passwords, forcing the company to send out a wave of password reset warnings.

Weeks after, the news got worse for the company: The thieves also made off with the source code for its popular Adobe Photoshop software.

Image: John G. Mabanglo/epa/Corbis
techrepublic-scary-data-breaches-ebay.jpg
techrepublic-scary-data-breaches-ebay.jpg
The 18 most frightening data breaches

eBay (2014)

Image: Paul Stewart/Demotix/Corbis

eBay (2014)

Talk about an inside job: In 2004, online auction house eBay suffered the largest hack in U.S. history, losing 145 million login credentials to a hacker using an internal eBay corporate account.

Names, email and street addresses, phone numbers, and birth dates were compromised, but thankfully, passwords were stored in encrypted form.

Image: Paul Stewart/Demotix/Corbis
techrepublic-scary-data-breaches-home-depot.jpg
techrepublic-scary-data-breaches-home-depot.jpg
The 18 most frightening data breaches

Home Depot (2014)

Image: Alan Schein Photography/Corbis

Home Depot (2014)

In September 2014, Home Depot admitted that it fell prey to hackers who installed antivirus-evading malware on its self-checkout registers. An estimated 56 million sets of customer payment card data were stolen in the attack.

The company’s losses related to the event are expected to top $1 billion when all of the lawsuits are finally settled. Only $100 million of that will be covered by insurance.

Image: Alan Schein Photography/Corbis
techrepublic-scary-data-breaches-jp-morgan-chase.jpg
techrepublic-scary-data-breaches-jp-morgan-chase.jpg
The 18 most frightening data breaches

JP Morgan Chase (2014)

Image: Richard Levine/Demotix/Corbis

JP Morgan Chase (2014)

The September 2014 breach of JP Morgan Chase proved that even the largest U.S. banks are vulnerable to data theft. Online banking login details were not stolen, but crooks did get their hands on 76 million sets of names, emails, addresses, and phone numbers of bank customers, creating serious phishing concerns.

A group of Russian hackers is believed to be responsible for the attack.

Image: Richard Levine/Demotix/Corbis
techrepublic-scary-data-breaches-online-photos-cvs.jpg
techrepublic-scary-data-breaches-online-photos-cvs.jpg
The 18 most frightening data breaches

PNI Digital Media (2015)

Image: Mike Segar/Reuters/Corbis

PNI Digital Media (2015)

PNI Digital Media, the company that handles online photo printing for CVS, Walgreens, Rite Aid, Costco, and many more national chains, lost an unknown number of customer records to hackers in 2015.

Given that the company boasted more than 18 million transactions in 2014, it’s likely that this breach affected tens of millions of Americans.

Image: Mike Segar/Reuters/Corbis
techrepublic-scary-data-breaches-payment-terminal.jpg
techrepublic-scary-data-breaches-payment-terminal.jpg
The 18 most frightening data breaches

Heartland (2008)

Image: David Shopper/Corbis

Heartland (2008)

Credit and debit card processing firm Heartland Payment Systems became one of the largest data breach victims in U.S. history when hackers compromised more than 130 million accounts in 2008.

The criminal ring involved in the Heartland data theft was also found to be responsible for the 2005 hack of TJX Companies involving 94 million records.

Image: David Shopper/Corbis
techrepublic-scary-data-breaches-tjmaxx-tjx.jpg
techrepublic-scary-data-breaches-tjmaxx-tjx.jpg
The 18 most frightening data breaches

TJX Companies (2005)

Image: Jessica Rinaldi/Reuters/Corbis

TJX Companies (2005)

In a 2005 scheme dubbed “Operation Get Rich or Die Tryin,” a group of hackers used an unsecured Wi-Fi network at a Marshalls store to break into parent TJX Companies’ computer system and steal 94 million customer records, including payment card data.

Albert Gonzalez, the ringleader of the hack, is serving a 20-year sentence in Leavenworth.

Image: Jessica Rinaldi/Reuters/Corbis
techrepublic-scary-data-breaches-us-office-of-personnel-management.jpg
techrepublic-scary-data-breaches-us-office-of-personnel-management.jpg
The 18 most frightening data breaches

U.S. Office of Personnel Management (2015)

Image: Gary Cameron/Reuters/Corbis

U.S. Office of Personnel Management (2015)

Earlier this year, the United States Office of Personnel Management admitted that hackers had taken 21.5 million records belonging to those who had undergone government background checks or otherwise applied for federal employment. The hackers stole a wealth of sensitive data, including security clearance information and fingerprint data belonging to secret agents.

The Washington Post reported that the attack is believed to have originated in China.

Image: Gary Cameron/Reuters/Corbis
techrepublic-scary-data-breaches-zappos.jpg
techrepublic-scary-data-breaches-zappos.jpg
The 18 most frightening data breaches

Zappos (2012)

Image: James Leynse/Corbis

Zappos (2012)

In January 2012, online shoe retailer Zappos stated that cybercriminals had stolen data of 24 million customers, including names, addresses, and the last four digits of their payment cards.

After the announcement, Zappos had to disconnect its phone lines to keep upset customers from calling in and overloading its phone system.

Also see: The 18 scariest computer viruses of all time

Image: James Leynse/Corbis
  • Data Centers
  • Security
  • Account Information

    Share with Your Friends

    The 18 most frightening data breaches

    Your email has been sent

Share: The 18 most frightening data breaches
Image of Fox Van Allen
By Fox Van Allen
Fox Van Allen is a Los Angeles-based writer for CBS Interactive covering technology, tech lifestyle and gaming topics for GameSpot, CNET, ZDNet and TechRepublic. He has previously worked as a news and feature writer for a number of other sites, inclu
  • Account Information

    Contact Fox Van Allen

    Your message has been sent

  • |
  • See all of Fox Van's content

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a Security Analyst

    Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for a ...

    Downloads
    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 2:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Membership
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice