Tracking Hacking: Visualizing The World's Biggest Data Breaches

Tyler Durden's picture

The graphic below shows a timeline of some of the biggest data breaches on record. As Visual Capitalist's Chris Matei notes, each bubble represents the number of records lost in any given breach, with the most sensitive data clustered toward the right side.

This data visualization comes to us from Information is Beautiful. Go to their site to see the highly-recommended interactive format that visualizes the same data, while providing additional details on each specific hack.

Courtesy of: Visual Capitalist

 

Before 2009, the majority of data breaches were the fault of human errors like misplaced hard drives and stolen laptops, or the efforts of “inside men” looking to make a profit by selling data to the highest bidder. Since then, the volume of malicious hacking (shown in purple) has exploded relative to other forms of data loss.

FROM MILLIONS TO BILLIONS

Increasingly sophisticated hacking has altered the scale of data loss by orders of magnitude. For example, an “inside job” breach at data broker Court Ventures was once one of the world’s largest single losses of records at 200 million.

However, it was eclipsed in size shortly thereafter by malicious hacks at Yahoo in 2013 and 2014 that compromised over 1.5 billion records, and now larger hacks are increasingly becoming the norm.

SMALL BUT POWERFUL

The problems caused by hacks, leaks and other data breaches are not just ones of scale. For example, the accidental 2016 leak of information from spam/email marketing service River City Media stands out at an alarming 1.37 billion records lost. However, sorting by data sensitivity paints a different picture. The River City leak – represented by the larger blue dot below – is surpassed in severity by hacks at Yahoo, at web design platform Weebly, and even at adult video provider Brazzers.

Much of the data lost in the River City hack was made up of long lists of consumer email addresses to be used for spam email distribution, while the other hacks listed compromised items like account passwords, banking information, addresses, phone numbers, or health records. While having your email address become the target for spam exploitation is a serious annoyance, the hacking of much more sensitive personal data has quickly become the norm.

The fact that more and more of our data is being stored “in the cloud” and among devices on the Internet of Things means that increasingly sensitive types of data are now more vulnerable than ever to being hacked. This looks to be even more cause for concern than the rapidly rising volume of records that have been exposed, whether intentionally or by accident.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Kamehameha's picture

Bitcoin is next.

LetThemEatRand's picture

Can't happen.  There are guys with really good beards who say it's safe.

HRClinton's picture

As long as no one hacks my emails, it's all good.

open calender's picture

I'm making over $7k a month working part time. I kept hearing other people tell me how much money they can make online so I decided to look into it. Well, it was all true and has totally changed my life. This is what I do... http://bit.ly/2jdTzrM

ufos8mycow's picture

These hacks pale in comparison to Kathy Griffin

BennyBoy's picture

 

Thsese are only the admitted hacks. Many not admitting they've been hacked.

Plenty more are unaware they've been hacked.

If its online, in the cloud, its hackable.

Praeda2's picture

Retard, you clearly don't know what you just read or how Bitcoin works.

fannyplucker's picture

Yahoo's is the biggest hack. So, what? Marissa Meyer pocketed huge amount in her tenure and on exit. This is without any positive impact on the company.

DoctorFix's picture

This is when you know they were never hired to make things profitable.  Their purpose, their mission, was to bring that firm to its knees.  And in that regard they were successful.  

07564111's picture

Garbage article and the list is shit..where's the banks and CC data ?

FO with ya BS ZH

Praeda2's picture

Garbage comment by a dummy who doesn't know there hasn't been a public breach of a bank let alone one whose number would qualify it for this list. Fuck are there some stupid cunts here. Why are you even here? You don't own anything let alone any equities, just poor as shit Americunt whose going to die broke.

. . . _ _ _ . . .'s picture

"Since then, the volume of malicious hacking (shown in purple) has exploded relative to other forms of data loss."

And you were expecting... less??

Just wait 'til the drones start getting hacked. Gonna' be a brand new renaissance, that will.

just the tip's picture

i've always thought about plugging in a double-back routine.  have it in effect reverse every command it was given.  won't the ground crew be surprised.

silverer's picture

This is awesome. As prevalent as the John Gnagy sketching outfit was years ago. It's like a fun hobby for the whole family.

Youri Carma's picture

During a breach or AMP attack I would recommend the 'French Onion Soup' ;)
http://www.zerohedge.com/news/2017-06-10/next-generation-risks-part-1-su...

Urban Roman's picture

Russian hackers ... Russian hackers ... Russian hackers ...

dat's whut dey keeps tellin me

Atomizer's picture

Catch me if you can. If you don't sign up, they can't find you. Secondly, manage certification, SSL/TLS, use VNP. 

I just went apeshit on VRBO. Owner side platform. Two day's ago. Expedia bought out VRBO, its now turned into a pile of worthless cunts running the corporate show. 

They are data mining. Told them to stop this fucking shit. You have no business in asking questions about a person renting my home. I pay you to advertise. It seem to be suspended. Nothing on new inquiry today. 

Current City


Where will you be traveling from?


Verify now


Facebook Verification


Sign in with Facebook to gain verification


Verify now


About me


Tell the owner a little about you!


Verify now

 

any_mouse's picture

Try breaches are correlated to mass of identity data collected.

Stop collecting identifying data.

Anonymize data before storage.

Or accept that just as everyone can see your twits, they can see everything else about you.

The true high cost of the Uber app? Before you sign up they tell you that your phone number will be used for marketing purposes as Uber sees fit.

It is good on Uber's part the policy is upfront on the current page and clearly stated, not a check box that says you clicked on a link to over-sized T&C document and that you understand and agree with the T&C.

It's a sharing economy party, and you're the drunk girl pulling the train.

navy62802's picture

You should have a bubble labeled "Hillary Clinton."

Mimir's picture

Get off the CLOUD, NOW ! 

BritBob's picture

Someone went deep into Argentina's forbidden vaults and discovered that they've neve rowned the Malvinas. Shock, Horror!

 Falklands- Never Belonged to Argentina (1 page):

https://www.academia.edu/31111843/Falklands_Never_Belonged_to_Argentina

 

I Feel a little Qeasy's picture

Fuck off you stupid trolling English cunt!

Beans's picture

Syrian Army has reached the Iraqi border. End game is near for (((American))) terrorist goals is Syria:

https://www.rt.com/news/391811-syria-iraqi-border-turning-point/

SubjectivObject's picture

Given recent maps I've seen, of the distribution of the various factions, does the distance risk spreading them too thin?