The World’s Biggest Data Breaches in One Stunning Visualization

Jul 24, 2013 By carolineb



Major data breaches, leaks and hacks often consume the news, but the sheer numbers involved — 6 million records or 300,000 leaked passwords — may be hard to conceptualize, especially in comparison to other attacks.

The team at Information is Beautiful assembled a fascinating visualization of the world’s biggest data breaches, highlighting some of the most high-profile attacks. It’s eye-opening and frankly, rather terrifying.

Among the most massive recent attacks include those into companies like Evernote, LivingSocial, Facebook, LinkedIn, Yahoo and Twitter.

But technology companies aren’t the only ones at risk.Video gaming sites and organizations have suffered the most

Video gaming sites and organizations have suffered the most,” David McCandless, who runs Information is Beautiful, toldMashable. “In terms of sheer numbers of records breached, they really get owned.”

The healthcare industry has also faced its fare share of serious issues, which is alarming considering the sensitivity of the data. Although many major hacks are widely reported on — such as the huge T.J. Maxx security breach in 2007 that put more than 45 million credit and debit card users at risk — many slip under the radar.

“Some companies such as Twitter are upfront and transparent about getting the news out as soon as they are hacked, while others like Apple are super uncommunicative,” McCandless said.

If the number of data breaches alone doesn’t leave you speechless, you can click on each attack to learn more about what happened. Click here to check it out — and get ready to feel vulnerable.

View Source

The following two tabs change content below.


Latest posts by carolineb (see all)

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.