• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Talking Points / Cybercrime: The Biggest Breaches in 2018

Cybercrime: The Biggest Breaches in 2018

2019-03-01 by 404TS Team

Cybersecurity is, in fact, a constant race between security experts and cybercriminals. The latter are constantly on the lookout for exploits and vulnerabilities to take advantage of, while the former are constantly looking for ways to plug the holes in our digital world to keep us safer online. But not all cybercrime is created equal. Some forms of cybercrime are as simple as assembling IKEA furniture, others require extensive knowledge that goes beyond sending a deceptive email. Here are the biggest such breaches that occurred in 2018.

 

fingerprint security

 

FIFA

A football federation to rule them all – this is how we could best describe FIFA. And last year, it was involved in one of the biggest breaches of the year (and certainly the biggest in its history). While there is no way to know if we’re speaking of a whistleblower or a hacker leaking the organization’s internal documents, the fact remains: over 3.4 of data – 70 million internal documents – left its offices and ended up in the hands of journalists from the German publication Der Spiegel.

Apparently, the documents were leaked by a Portuguese football fan whose disgust of the corruption in football led to his actions. While he rejected the accusations that he would be a hacker, specialists agree that such a high volume of documents could only be leaked through a cyber attack.

Uber

The problem with many cyber attacks is that companies suffering them often don’t notify their users until years later. This was the case of Uber, the successful ride-hailing service, that has suffered a cyber attack in November 2016 but failed to notify its users and drivers of it. The company’s UK servers were hacked, and several files were stolen from them, including those containing the data of more than 3 million of its users, including their names, phone numbers, email addresses, and the locations where they signed up, as well as the information of its 82,000 drivers. In their case, the information exposed involved weekly pays, daily tips, and in some cases, their drivers’ license information.

Apparently, Uber not only didn’t disclose the attack but also agreed to pay a $100,000 “bug bounty” to the attacker.

T-Mobile

Last summer, T-Mobile – one of the big mobile network operators in the United States – announced its subscribers that it has suffered a major data breach. The number of users affected was around 2 million, and the information stolen included their names, addresses, phone numbers, email addresses, and account types. According to the announcement, sensitive information – like financial data, passwords, and social security numbers – was not compromised.

Have you been affected?

To find out if your data has been involved in a data breach, you can visit an online service called “‘have i been pwned?“. Here, you can search for your email address in their database and find out which data breaches that happened in the last few years have included your personal information.

Filed Under: Talking Points

Trending

  • Why an Eaton UPS Should Be On Your Wish List
    In Going Green, Hardware, Gadgets, and Products
  • Deciding between a responsive site or a mobile app
    In Infographics
  • How to use the Internet for grandparents
    In Infographics

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Troubleshooting time synchronization for domain-joined computers Troubleshooting time synchronization for domain-joined computers
  • 3d rendering circuit cloud for cloud computing technology What Is An Ellucian Migration And Is It Important?
  • Remote monitoring of text messages on a mobile device Remote monitoring of text messages on a mobile device
  • ​Great Tech Tips For Remote Workers ​Great Tech Tips For Remote Workers
  • Ideas That Will Free up MacBook Hard Drive Ideas That Will Free up MacBook Hard Drive
  • Advantages Of Video Conferencing For Small Businesses Advantages Of Video Conferencing For Small Businesses
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • What Is An Ellucian Migration And Is It Important?
  • Remote monitoring of text messages on a mobile device
  • ​Great Tech Tips For Remote Workers

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2021 · Magazine Pro Theme on Genesis Framework · WordPress · Log in