Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 9 August 2013

Infographic: The Greatest Security Breaches In Internet History

Posted on 10:13 by Unknown

Infographic of the Day  fastcodesign

Hundreds of millions of people have lost their data to hackers, and it’s all big business’s fault.
Living Social gets hacked, and 50 million people have their name, address, and date of birth stolen. Credit-card information is safe, we’re assured, but it’s of little comfort. Plastic can be replaced. Identity? Not so much.

Yet Living Social is but one of many mega data breaches suffered in the Internet age, a point driven home by World’s Biggest Data Breaches, the latest infographic from David McCandless / Information Is Beautiful. The graphic visualizes all of those vaguely disconcerting security headlines from the past nine years into a tangible timeline of bubbles. So you can quickly spot the biggest breaches--like when Sony lost 77,000,000 user accounts over PSN, or when payment processor Heartland lost 130,000,000 accounts (which subsequently cost them about $140,000,000 in fines and settlements).
Aside from its sheer interest quotient, McCandless and co. added several small touches to keep the information interactive. Hovering over each bubble enlarges it for easy reading, and a click exposes a short story behind the unsettling figures. It’s just a pile of circles, but it’s tactile and explorable, tempting you to dig beneath the surface.

As for what one might learn from the graphic, I cannot say. Video game companies are the worst offenders, while banks seem to have staved off hackers (relatively) respectably. But is anyone going to change their lifestyle--give up Call of Duty or shove money in the mattress because their data may be stolen along with the faceless masses? Of course not.
Security breaches have become the power outage of the information age. They’re inevitable, devastating, and totally worth it for the convenience and pleasure we derive from the services that come under attack. Which is why, if you scroll below, you’ll find my social security number, blood type, mother’s maiden name, and everywhere I’ve ever lived. I’ve also enclosed a few semiclad selfies in case you haven’t checked my Instagram lately.
See more here.
[Hat tip: Mashable]

Mark Wilson

Mark Wilson is a writer who started Philanthroper.com, a simple way to give back every day. His work has also appeared at Gizmodo, Kotaku, PopMech, PopSci
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in James Jones, Security, Security; Identity Management | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ►  November (41)
    • ►  October (53)
    • ►  September (44)
    • ▼  August (21)
      • CSSIA Linux Professional Institute Train-the-Train...
      • Mouse Squad of California
      • California Career Briefs: Get Acquainted
      • LabSim Courseware Instructor Access Opportunity
      • Free CyberWatch West CAE Meeting at CSU San Bernar...
      • Google outage across search, Gmail and Talk causes...
      • National Cyber League (NCL) Fall 2013 Schedule Ann...
      • CCC JSPAC Conference - December 3-4, 2013
      • President Barack Obama Recognizes DVC and DVC Stud...
      • Infographic: The Greatest Security Breaches In Int...
      • Wadhwani Foundation Educational Technology ICT Del...
      • Resistance greets pumped-up effort to streamline c...
      • BAVC Bridges at City College of San Francisco
      • ITIF: How Much Will PRISM Cost U.S. Cloud Computi...
      • Hadoop: A Government Primer
      • Los Angeles public housing residents to receive di...
      • 2013 National Cyber League (NCL) Fall Season Annou...
      • Pluralsight Technology Training and Education Grants
      • Identity Week: Burlingame, CA; Nov 11-15
      • Alliance for California Computing Education for St...
      • Educause: Top-Ten IT Issues, 2013: Welcome to the...
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile