A Look at Some of History’s Worst Data Breaches
While data breaches have dominated the InfoSec headlines (and increasingly the mainstream ones, too) for several years, they aren’t a new phenomenon. In fact, one of the first recorded hacks took place way back in 1903, and it involved breaching a Morse code transmission.
Technology has come a long way since then — and, unfortunately, so have hackers, cyber criminals, nation states and other bad actors. And really, it’s not hard to understand why: the demand for technology-led solutions is relentless and never-ending, and a lot of products that make it to market haven’t undergone rigorous security testing. Sadly, there’s no such thing as a truly “bulletproof” technology. Given enough time and resources, hackers will find a way in.
With this in mind, here’s a look at some of history’s worst data breaches:
Yahoo’s 2013 Breach
Yahoo’s 2013 breach is back in the headlines. While the initial reports said that (cue Dr. Evil voice) “1 billion” accounts were hacked, it turns out that ALL 3 billion accounts were hacked. That means everyone was and still might be vulnerable. You, me…heck, even your grandparents who think this whole internet thing is a weird fad, and things were a lot better back when the only mail you had to deal with was the kind that came with a stamp. The stolen data included names, telephone numbers, DOBs, passwords and security questions.
Read the entire article here, A Look at Some of History’s Worst Data Breaches
Via the fine folks at Devolutions.
White Papers
‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper
Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]
Share this:
‘The Citrix Administrator’s Guide to Citrix ICA/HDX’ White Paper
‘The Technical Guide to Migrating from Citrix 6.5 to 7.x and Replacing EdgeSight’ White Paper
Complete Guide to Understanding the Citrix Logon Process
‘Securing IGEL OS Endpoints’ White Paper
‘Managing Java Application Performance in a Citrix Environment’ White Paper