Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 9 August 2013

Infographic: The Greatest Security Breaches In Internet History

Posted on 10:13 by Unknown

Infographic of the Day  fastcodesign

Hundreds of millions of people have lost their data to hackers, and it’s all big business’s fault.
Living Social gets hacked, and 50 million people have their name, address, and date of birth stolen. Credit-card information is safe, we’re assured, but it’s of little comfort. Plastic can be replaced. Identity? Not so much.

Yet Living Social is but one of many mega data breaches suffered in the Internet age, a point driven home by World’s Biggest Data Breaches, the latest infographic from David McCandless / Information Is Beautiful. The graphic visualizes all of those vaguely disconcerting security headlines from the past nine years into a tangible timeline of bubbles. So you can quickly spot the biggest breaches--like when Sony lost 77,000,000 user accounts over PSN, or when payment processor Heartland lost 130,000,000 accounts (which subsequently cost them about $140,000,000 in fines and settlements).
Aside from its sheer interest quotient, McCandless and co. added several small touches to keep the information interactive. Hovering over each bubble enlarges it for easy reading, and a click exposes a short story behind the unsettling figures. It’s just a pile of circles, but it’s tactile and explorable, tempting you to dig beneath the surface.

As for what one might learn from the graphic, I cannot say. Video game companies are the worst offenders, while banks seem to have staved off hackers (relatively) respectably. But is anyone going to change their lifestyle--give up Call of Duty or shove money in the mattress because their data may be stolen along with the faceless masses? Of course not.
Security breaches have become the power outage of the information age. They’re inevitable, devastating, and totally worth it for the convenience and pleasure we derive from the services that come under attack. Which is why, if you scroll below, you’ll find my social security number, blood type, mother’s maiden name, and everywhere I’ve ever lived. I’ve also enclosed a few semiclad selfies in case you haven’t checked my Instagram lately.
See more here.
[Hat tip: Mashable]

Mark Wilson

Mark Wilson is a writer who started Philanthroper.com, a simple way to give back every day. His work has also appeared at Gizmodo, Kotaku, PopMech, PopSci
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in James Jones, Security, Security; Identity Management | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • Free Winter ICT Educator Conference Presentations
    The Winter 2013 ICT Educator Conference is January 3-4, 2013 in San Francisco. You can join most presentation sessions for free, from any br...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • California Community College Funding Still Low
    March 26, 2013 Dear California CC, The Public Policy Institute of California released a report this morning that documents the budget imp...
  • CA Career Briefs - Preparing for Change
    October 30, 2012 Prepare for Change ...
  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • State Schools Chief Tom Torlakson Applauds Senate Ed Committee Approval of New Era of Student Assessment
    REL#13-66 FOR IMMEDIATE RELEASE June 26, 2013 CONTACT: Pam Slater E-MAIL: pslater@cde.ca.gov                SACRAMENTO—The Senate Education...
  • Free CCC Automated Website Assessment Tool
    WRITTEN BY JAYME JOHNSON, TechEDge THURSDAY, 25 OCTOBER 2012 The High Tech Center Training Unit of the California Community Colleges system ...
  • Icann launches brand database for trademarks
    26 March 2013 Last updated at 10:09 ET BBC News Firms are concerned that new web addresses will damage their brands Net address regula...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ►  November (41)
    • ►  October (53)
    • ►  September (44)
    • ▼  August (21)
      • CSSIA Linux Professional Institute Train-the-Train...
      • Mouse Squad of California
      • California Career Briefs: Get Acquainted
      • LabSim Courseware Instructor Access Opportunity
      • Free CyberWatch West CAE Meeting at CSU San Bernar...
      • Google outage across search, Gmail and Talk causes...
      • National Cyber League (NCL) Fall 2013 Schedule Ann...
      • CCC JSPAC Conference - December 3-4, 2013
      • President Barack Obama Recognizes DVC and DVC Stud...
      • Infographic: The Greatest Security Breaches In Int...
      • Wadhwani Foundation Educational Technology ICT Del...
      • Resistance greets pumped-up effort to streamline c...
      • BAVC Bridges at City College of San Francisco
      • ITIF: How Much Will PRISM Cost U.S. Cloud Computi...
      • Hadoop: A Government Primer
      • Los Angeles public housing residents to receive di...
      • 2013 National Cyber League (NCL) Fall Season Annou...
      • Pluralsight Technology Training and Education Grants
      • Identity Week: Burlingame, CA; Nov 11-15
      • Alliance for California Computing Education for St...
      • Educause: Top-Ten IT Issues, 2013: Welcome to the...
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile