SlideShare a Scribd company logo
THE BIGGEST
DATA BREACHES
OF 2016
AND HOW WE CAN AVOID THEM IN 2017
YAHOO!
IN SEPTEMBER 2016, YAHOO ANNOUNCED THE NAMES, EMAIL
ADDRESSES, PHONE NUMBERS, BIRTHDAYS, HASHED
PASSWORDS AND IN SOME CASES, SECURITY QUESTION
ANSWERS OF USERS WERE HACKED. THANKFULLY, NO
PAYMENT INFORMATION WAS COMPROMISED. IT WAS
ASSUMED YAHOO KNEW ABOUT THE ATTACK AS EARLY AS
AUGUST, CALLING FOR TOUGHER LEGISLATION REGARDING
DISCLOSURE OF KNOWN BREACHES.
500MILLION ACCOUNTS
COMPROMISED
LINKEDIN
IT WAS BELIEVED IN 2012 THAT RUSSIAN HACKERS STOLE 6.5
MILLION ENCRYPTED PASSWORDS FROM USERS OF THE
PROFESSIONAL NETWORKING SITE. FLASH FORWARD TO
2016 AND THAT NUMBER INCREASED TO 167 MILLION. AFTER
DOING SO IN 2012, LINKEDIN ONCE AGAIN URGED ALL IT'S
MEMBERS TO CHANGE THEIR PASSWORDS IN 2016.
167MILLION ACCOUNTS
COMPROMISED
TRUMP HOTELS
PRIOR TO BECOMING THE 45TH PRESIDENT OF THE UNITED
STATES, DONALD TRUMP'S HOTEL CHAIN AGREED TO A
$50,000 SETTLEMENT AND A MASSIVE REVAMP OF IT'S DATA
SECURITY POLICIES AFTER 70,000 CREDIT CARD NUMBERS OF
GUESTS WERE COMPROMISED. THE BREACH ACTUALLY TOOK
PLACE IN 2014, BUT IT WASN'T UNTIL 2016 WHEN HUNDREDS
OF FRAUDULENT CREDIT CARD TRANSACTIONS WERE
UNCOVERED. THE ONE SIMILARITY BETWEEN ALL VICTIMS?
THEY STAYED AT A TRUMP HOTEL.
70,000
CREDIT CARDS
COMPROMISED
WENDY'S
WENDY'S POINT OF SALES SYSTEMS AT 1,025 LOCATIONS
WERE INFECTED WITH MALWARE DURING A 5-MONTH
PERIOD. IN FEBRUARY, PATRONS BEGAN TO DISCOVER
UNUSUAL CREDIT CARD ACTIVITY, WHILE THE MALWARE
BEHIND THE BREACH WASN'T DISABLED UNTIL MAY.
ADDITIONAL MALWARE WAS DISCOVERED AND REMOVED IN
DECEMBER. CREDIT CARD NUMBERS, NAMES AND
EXPIRATION DATES WERE STOLEN, BUT CVV CODES WERE
NOT AFFECTED.
1,025
LOCATIONS HAD
CUSTOMER
CREDIT CARDS
COMPROMISED
WEEBLY
HACKERS WERE ABLE TO OBTAIN USERNAMES, PASSWORDS,
EMAILS AND IP INFORMATION FROM WEEBLY USERS IN
FEBRUARY, WITH THE ATTACK BECOMING PUBLIC IN
OCTOBER. HACKERS WERE UNABLE TO LOG IN TO USER
WEBSITES THANKS TO BYCRYPT HASHING PASSWORD
PROTECTION MEASURES. FINANCIAL INFORMATION WAS
NOT STOLEN, AS WEEBLY DOES NOT STORE THAT DATA ON
ITS SERVERS.
43MILLION ACCOUNTS
COMPROMISED
ADULTFRIENDFINDER
THIS ATTACK MADE THE ASHLEY MADISON BREACH OF 2015
SEEM AS INNOCENT AS A KISS. THE SITE WHICH HELPS
ADULTS FIND FRIENDS (TO GET COFFEE WITH, OF COURSE)
STORED USER PASSWORDS IN PLAIN VISIBLE FORMAT,
MAKING IT AN EASY TARGET FOR  HACKERS WHO
COMPROMISED THE INFO ON 412 MILLION USERS. THE HACK
REVEALED OVER A MILLION SITE USERS LOGGED IN WITH
"123456" AS THEIR PASSWORD. THAT'S PROBABLY WORSE
THAN BEING ON THE SITE IN THE FIRST PLACE.
412MILLION ACCOUNTS
COMPROMISED
THE IRS
THE IRS' "GET TRANSCRIPT" SYSTEM WAS HACKED BY WHAT
THEY BELIEVE TO BE A SOPHISTICATED RUSSIAN OPERATION
WHO USED INFORMATION ON OVER 700,000 TAX PAYERS TO
FILE FRAUDULENT RETURNS. IN 2015 IT WAS BELIEVED THE
ATTACK HAD ONLY AFFECTED 100,000 AMERICANS.
700,000
TAX PAYERS
COMPROMISED
INFORMATION ON
SNAPCHAT
A PHISHING SCAM FOOLED 700 SNAPCHAT EMPLOYEES INTO
EMAILING PRIVATE INFORMATION TO AN UNKNOWN
HACKER WHO POSED AS A SNAPCHAT EXECUTIVE, ASKING
EMPLOYEES FOR THEIR SOCIAL SECURITY NUMBER AND
PAYROLL DATA. 
700EMPLOYEES FOOLED
BY PHISHING
BE SMARTER ABOUT DATA PROTECTION IN 2017
EDUCATION IS THE MOST IMPORTANT FACTOR IN STOPPING CYBER CRIME IN 2017.
IS YOUR SMALL BUSINESS PROTECTED? VISIT TRY.THROTTLENET.COM
TO LEARN HOW WE CAN HELP.
No Business is too large or too small to fall victim to a data breach or phishing
attack. 
Simple passwords just don't work for users, either. 
For Businesses, ALWAYS encrypt passwords and confidential data. Use an SSL
and enable 2-factor authentication. 
Be sure you have malware, spyware and anti-virus protection on ALL network
connected devices. 
NEVER send credit card numbers, social security numbers or other confidential
data over email even if you believe you trust the source. Hackers are more
sophisticated than ever before.
In the aftermath of a data breach, rekindling the trust of users and customers is
often the biggest challenge businesses and organizations face. 

More Related Content

What's hot

The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault
Mimecast
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
Tanish Khilani
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
NormShield
 
Securing Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat IntelligenceSecuring Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat Intelligence
Inman News
 
Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017
bcilondonforum
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
Practical Vision Network
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
CBIZ Risk & Advisory Services
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
Wiley
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Internet scams
Internet scamsInternet scams
Internet scams
Surashree Sahasrabudhe
 
Securing Your Digital Assets slides NYC July 14, 2015
Securing Your Digital Assets slides NYC July 14, 2015Securing Your Digital Assets slides NYC July 14, 2015
Securing Your Digital Assets slides NYC July 14, 2015
Darrell W. Gunter
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
AvishekMondal15
 
Detecting Spoof Domains
Detecting Spoof DomainsDetecting Spoof Domains
Detecting Spoof Domains
Digital Shadows
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
Sendio
 
Forter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivForter - NOAH19 Tel Aviv
Forter - NOAH19 Tel Aviv
NOAH Advisors
 

What's hot (19)

The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Securing Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat IntelligenceSecuring Real Estate Transactions through Threat Intelligence
Securing Real Estate Transactions through Threat Intelligence
 
Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Securing Your Digital Assets slides NYC July 14, 2015
Securing Your Digital Assets slides NYC July 14, 2015Securing Your Digital Assets slides NYC July 14, 2015
Securing Your Digital Assets slides NYC July 14, 2015
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Detecting Spoof Domains
Detecting Spoof DomainsDetecting Spoof Domains
Detecting Spoof Domains
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Forter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivForter - NOAH19 Tel Aviv
Forter - NOAH19 Tel Aviv
 

Similar to Biggest Data Breaches of 2016

Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
Zachary Shaw
 
Identity is Eating the World!
Identity is Eating the World!Identity is Eating the World!
Identity is Eating the World!
Prabath Siriwardena
 
[WSO2Con USA 2018] Identity is Eating the World!
[WSO2Con USA 2018] Identity is Eating the World![WSO2Con USA 2018] Identity is Eating the World!
[WSO2Con USA 2018] Identity is Eating the World!
WSO2
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QAFest
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
Laurent Pacalin
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
Protected Harbor
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
- Mark - Fullbright
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
Guardian Analytics
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
Konica Minolta
 
COncept of Phishing
COncept of PhishingCOncept of Phishing
COncept of Phishing
Rahul Singh
 
Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
Abuser Stories: Thinking Like the Bad Guy to Reduce Software VulnerabilitiesAbuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
ProjectCon
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 
Stolen identities
Stolen identitiesStolen identities
Stolen identities
CyberX-Labs
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Forcepoint LLC
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 

Similar to Biggest Data Breaches of 2016 (20)

Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
 
Identity is Eating the World!
Identity is Eating the World!Identity is Eating the World!
Identity is Eating the World!
 
[WSO2Con USA 2018] Identity is Eating the World!
[WSO2Con USA 2018] Identity is Eating the World![WSO2Con USA 2018] Identity is Eating the World!
[WSO2Con USA 2018] Identity is Eating the World!
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
It act
It actIt act
It act
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
COncept of Phishing
COncept of PhishingCOncept of Phishing
COncept of Phishing
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
Abuser Stories: Thinking Like the Bad Guy to Reduce Software VulnerabilitiesAbuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Stolen identities
Stolen identitiesStolen identities
Stolen identities
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 

More from ThrottleNet, Inc

Hiring an IT Consultant
Hiring an IT ConsultantHiring an IT Consultant
Hiring an IT Consultant
ThrottleNet, Inc
 
Cyber Security Myths
Cyber Security MythsCyber Security Myths
Cyber Security Myths
ThrottleNet, Inc
 
Simplify Managing IT
Simplify Managing ITSimplify Managing IT
Simplify Managing IT
ThrottleNet, Inc
 
Making the Most of Your IT Budgeting
Making the Most of Your IT BudgetingMaking the Most of Your IT Budgeting
Making the Most of Your IT Budgeting
ThrottleNet, Inc
 
The Biggest Technology Trends to Watch in 2018
The Biggest Technology Trends to Watch in 2018The Biggest Technology Trends to Watch in 2018
The Biggest Technology Trends to Watch in 2018
ThrottleNet, Inc
 
Starting a Career in IT
Starting a Career in ITStarting a Career in IT
Starting a Career in IT
ThrottleNet, Inc
 
Engaging and Retaining App Users
Engaging and Retaining App UsersEngaging and Retaining App Users
Engaging and Retaining App Users
ThrottleNet, Inc
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
ThrottleNet, Inc
 
6 Bad Social Media Habits
6 Bad Social Media Habits6 Bad Social Media Habits
6 Bad Social Media Habits
ThrottleNet, Inc
 
5 Soft Skills for IT
5 Soft Skills for IT5 Soft Skills for IT
5 Soft Skills for IT
ThrottleNet, Inc
 

More from ThrottleNet, Inc (10)

Hiring an IT Consultant
Hiring an IT ConsultantHiring an IT Consultant
Hiring an IT Consultant
 
Cyber Security Myths
Cyber Security MythsCyber Security Myths
Cyber Security Myths
 
Simplify Managing IT
Simplify Managing ITSimplify Managing IT
Simplify Managing IT
 
Making the Most of Your IT Budgeting
Making the Most of Your IT BudgetingMaking the Most of Your IT Budgeting
Making the Most of Your IT Budgeting
 
The Biggest Technology Trends to Watch in 2018
The Biggest Technology Trends to Watch in 2018The Biggest Technology Trends to Watch in 2018
The Biggest Technology Trends to Watch in 2018
 
Starting a Career in IT
Starting a Career in ITStarting a Career in IT
Starting a Career in IT
 
Engaging and Retaining App Users
Engaging and Retaining App UsersEngaging and Retaining App Users
Engaging and Retaining App Users
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
6 Bad Social Media Habits
6 Bad Social Media Habits6 Bad Social Media Habits
6 Bad Social Media Habits
 
5 Soft Skills for IT
5 Soft Skills for IT5 Soft Skills for IT
5 Soft Skills for IT
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Biggest Data Breaches of 2016

  • 1. THE BIGGEST DATA BREACHES OF 2016 AND HOW WE CAN AVOID THEM IN 2017
  • 2. YAHOO! IN SEPTEMBER 2016, YAHOO ANNOUNCED THE NAMES, EMAIL ADDRESSES, PHONE NUMBERS, BIRTHDAYS, HASHED PASSWORDS AND IN SOME CASES, SECURITY QUESTION ANSWERS OF USERS WERE HACKED. THANKFULLY, NO PAYMENT INFORMATION WAS COMPROMISED. IT WAS ASSUMED YAHOO KNEW ABOUT THE ATTACK AS EARLY AS AUGUST, CALLING FOR TOUGHER LEGISLATION REGARDING DISCLOSURE OF KNOWN BREACHES. 500MILLION ACCOUNTS COMPROMISED
  • 3. LINKEDIN IT WAS BELIEVED IN 2012 THAT RUSSIAN HACKERS STOLE 6.5 MILLION ENCRYPTED PASSWORDS FROM USERS OF THE PROFESSIONAL NETWORKING SITE. FLASH FORWARD TO 2016 AND THAT NUMBER INCREASED TO 167 MILLION. AFTER DOING SO IN 2012, LINKEDIN ONCE AGAIN URGED ALL IT'S MEMBERS TO CHANGE THEIR PASSWORDS IN 2016. 167MILLION ACCOUNTS COMPROMISED
  • 4. TRUMP HOTELS PRIOR TO BECOMING THE 45TH PRESIDENT OF THE UNITED STATES, DONALD TRUMP'S HOTEL CHAIN AGREED TO A $50,000 SETTLEMENT AND A MASSIVE REVAMP OF IT'S DATA SECURITY POLICIES AFTER 70,000 CREDIT CARD NUMBERS OF GUESTS WERE COMPROMISED. THE BREACH ACTUALLY TOOK PLACE IN 2014, BUT IT WASN'T UNTIL 2016 WHEN HUNDREDS OF FRAUDULENT CREDIT CARD TRANSACTIONS WERE UNCOVERED. THE ONE SIMILARITY BETWEEN ALL VICTIMS? THEY STAYED AT A TRUMP HOTEL. 70,000 CREDIT CARDS COMPROMISED
  • 5. WENDY'S WENDY'S POINT OF SALES SYSTEMS AT 1,025 LOCATIONS WERE INFECTED WITH MALWARE DURING A 5-MONTH PERIOD. IN FEBRUARY, PATRONS BEGAN TO DISCOVER UNUSUAL CREDIT CARD ACTIVITY, WHILE THE MALWARE BEHIND THE BREACH WASN'T DISABLED UNTIL MAY. ADDITIONAL MALWARE WAS DISCOVERED AND REMOVED IN DECEMBER. CREDIT CARD NUMBERS, NAMES AND EXPIRATION DATES WERE STOLEN, BUT CVV CODES WERE NOT AFFECTED. 1,025 LOCATIONS HAD CUSTOMER CREDIT CARDS COMPROMISED
  • 6. WEEBLY HACKERS WERE ABLE TO OBTAIN USERNAMES, PASSWORDS, EMAILS AND IP INFORMATION FROM WEEBLY USERS IN FEBRUARY, WITH THE ATTACK BECOMING PUBLIC IN OCTOBER. HACKERS WERE UNABLE TO LOG IN TO USER WEBSITES THANKS TO BYCRYPT HASHING PASSWORD PROTECTION MEASURES. FINANCIAL INFORMATION WAS NOT STOLEN, AS WEEBLY DOES NOT STORE THAT DATA ON ITS SERVERS. 43MILLION ACCOUNTS COMPROMISED
  • 7. ADULTFRIENDFINDER THIS ATTACK MADE THE ASHLEY MADISON BREACH OF 2015 SEEM AS INNOCENT AS A KISS. THE SITE WHICH HELPS ADULTS FIND FRIENDS (TO GET COFFEE WITH, OF COURSE) STORED USER PASSWORDS IN PLAIN VISIBLE FORMAT, MAKING IT AN EASY TARGET FOR  HACKERS WHO COMPROMISED THE INFO ON 412 MILLION USERS. THE HACK REVEALED OVER A MILLION SITE USERS LOGGED IN WITH "123456" AS THEIR PASSWORD. THAT'S PROBABLY WORSE THAN BEING ON THE SITE IN THE FIRST PLACE. 412MILLION ACCOUNTS COMPROMISED
  • 8. THE IRS THE IRS' "GET TRANSCRIPT" SYSTEM WAS HACKED BY WHAT THEY BELIEVE TO BE A SOPHISTICATED RUSSIAN OPERATION WHO USED INFORMATION ON OVER 700,000 TAX PAYERS TO FILE FRAUDULENT RETURNS. IN 2015 IT WAS BELIEVED THE ATTACK HAD ONLY AFFECTED 100,000 AMERICANS. 700,000 TAX PAYERS COMPROMISED INFORMATION ON
  • 9. SNAPCHAT A PHISHING SCAM FOOLED 700 SNAPCHAT EMPLOYEES INTO EMAILING PRIVATE INFORMATION TO AN UNKNOWN HACKER WHO POSED AS A SNAPCHAT EXECUTIVE, ASKING EMPLOYEES FOR THEIR SOCIAL SECURITY NUMBER AND PAYROLL DATA.  700EMPLOYEES FOOLED BY PHISHING
  • 10. BE SMARTER ABOUT DATA PROTECTION IN 2017 EDUCATION IS THE MOST IMPORTANT FACTOR IN STOPPING CYBER CRIME IN 2017. IS YOUR SMALL BUSINESS PROTECTED? VISIT TRY.THROTTLENET.COM TO LEARN HOW WE CAN HELP. No Business is too large or too small to fall victim to a data breach or phishing attack.  Simple passwords just don't work for users, either.  For Businesses, ALWAYS encrypt passwords and confidential data. Use an SSL and enable 2-factor authentication.  Be sure you have malware, spyware and anti-virus protection on ALL network connected devices.  NEVER send credit card numbers, social security numbers or other confidential data over email even if you believe you trust the source. Hackers are more sophisticated than ever before. In the aftermath of a data breach, rekindling the trust of users and customers is often the biggest challenge businesses and organizations face.