{"id":1102,"date":"2023-10-11T08:38:32","date_gmt":"2023-10-11T08:38:32","guid":{"rendered":"https:\/\/pbscompany.smartwebsitedesign.com\/?p=1102"},"modified":"2023-10-23T13:34:11","modified_gmt":"2023-10-23T13:34:11","slug":"5-spookiest-data-breaches","status":"publish","type":"post","link":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/","title":{"rendered":"5 Spookiest Data Breaches"},"content":{"rendered":"\n

In this age of constant cyber threats, there\u2019s nothing more terrifying for a business than a data breach that results in lost customer records. While there are certainly many more, below are five data breaches that resulted in billions of sensitive information such as social security numbers and credit card numbers being compromised.<\/p>\n\n\n\n

Yahoo \u2013 3 Billion Users Affected<\/strong><\/p>\n\n\n\n

In 2014, Yahoo announced a data breach that resulted in at least 3 billion stolen user accounts!<\/a> According to Yahoo, the cybercriminals obtained account information including names, birth dates, phones, and passwords. Not only that, but hackers were able to obtain private security questions and even backup email addresses listed within an account. With all of this information, cybercriminals would be able to hack plenty of other accounts, not just Yahoo.<\/p>\n\n\n\n

Facebook \u2013 540 Million Accounts Exposed<\/strong><\/p>\n\n\n\n

In 2019, According to cyber security firm<\/a>, UpGuard, a Mexico-based media company exposed over 146 gigabytes of Facebook user data that included account names, IDs, in addition to comment and reaction history.<\/p>\n\n\n\n

Around the same time, a backup file from a third-party Facebook app was exposed to the public that included account and password information for 22,000 users.<\/p>\n\n\n\n

LinkedIn \u2013 167 Million Accounts<\/strong><\/p>\n\n\n\n

Following a data breach in 2012 that saw 6.5 million passwords exposed<\/a>, LinkedIn revealed in 2016 that the same hackers eventually obtained the account information for over 167 million accounts!<\/p>\n\n\n\n

Following the data breach, LinkedIn was forced to pay a $1.25 million settlement to individuals that had purchased LinkedIn premium.<\/p>\n\n\n\n

First American Financial Corp. \u2013 885 Million Records<\/strong><\/p>\n\n\n\n

Even though it was never confirmed that hackers obtained the information<\/a>, First American Financial Corp. had 885 million records filled with social security numbers, bank accounts, tax documents, and more exposed dating all the way back to 2013.<\/p>\n\n\n\n

First American Financial Corp. became aware of a design defect that allowed unauthorized users to access customer data.<\/p>\n\n\n\n

Marriott International \u2013 500 Million Records<\/strong><\/p>\n\n\n\n

In 2019, Marriott announced a data breach that targeted its reservation system and access the personal information of hundreds of millions of guests dating since 2014. Hackers were able to access passwords, passport numbers, and debit or credit card numbers.<\/p>\n\n\n\n

It is believed the breach was the result of a Chinese intelligence-gathering effort.<\/a><\/p>\n\n\n\n

<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

In this age of constant cyber threats, there\u2019s nothing more terrifying for a business than a data breach that results in lost customer records. While there are certainly many more, below are five data breaches that resulted in billions of sensitive information such as social security numbers and credit card numbers being compromised. Yahoo \u2013Continue reading “5 Spookiest Data Breaches”<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"\n5 Spookiest Data Breaches - Preferred Business Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Spookiest Data Breaches - Preferred Business Systems\" \/>\n<meta property=\"og:description\" content=\"In this age of constant cyber threats, there\u2019s nothing more terrifying for a business than a data breach that results in lost customer records. While there are certainly many more, below are five data breaches that resulted in billions of sensitive information such as social security numbers and credit card numbers being compromised. Yahoo \u2013Continue reading "5 Spookiest Data Breaches"\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Preferred Business Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PBSMakingITSimple\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-11T08:38:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T13:34:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"reachuniversal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:site\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"reachuniversal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\"},\"author\":{\"name\":\"reachuniversal\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\"},\"headline\":\"5 Spookiest Data Breaches\",\"datePublished\":\"2023-10-11T08:38:32+00:00\",\"dateModified\":\"2023-10-23T13:34:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\"},\"wordCount\":353,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\",\"url\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\",\"name\":\"5 Spookiest Data Breaches - Preferred Business Systems\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png\",\"datePublished\":\"2023-10-11T08:38:32+00:00\",\"dateModified\":\"2023-10-23T13:34:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png\",\"width\":1200,\"height\":630,\"caption\":\"data-breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wp.pbscompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Spookiest Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wp.pbscompany.com\/#website\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"name\":\"Preferred Business Systems\",\"description\":\"Making IT Simple Since 1997!\",\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wp.pbscompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\",\"name\":\"Preferred Business Systems\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Preferred Business Systems\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PBSMakingITSimple\",\"https:\/\/x.com\/pbscompany\",\"https:\/\/www.linkedin.com\/company\/pbscompany\",\"https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\",\"name\":\"reachuniversal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"caption\":\"reachuniversal\"},\"sameAs\":[\"https:\/\/reachuniversal.com\"],\"url\":\"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Spookiest Data Breaches - Preferred Business Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"5 Spookiest Data Breaches - Preferred Business Systems","og_description":"In this age of constant cyber threats, there\u2019s nothing more terrifying for a business than a data breach that results in lost customer records. While there are certainly many more, below are five data breaches that resulted in billions of sensitive information such as social security numbers and credit card numbers being compromised. Yahoo \u2013Continue reading \"5 Spookiest Data Breaches\"","og_url":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/","og_site_name":"Preferred Business Systems","article_publisher":"https:\/\/www.facebook.com\/PBSMakingITSimple","article_published_time":"2023-10-11T08:38:32+00:00","article_modified_time":"2023-10-23T13:34:11+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","type":"image\/png"}],"author":"reachuniversal","twitter_card":"summary_large_image","twitter_creator":"@pbscompany","twitter_site":"@pbscompany","twitter_misc":{"Written by":"reachuniversal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#article","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/"},"author":{"name":"reachuniversal","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c"},"headline":"5 Spookiest Data Breaches","datePublished":"2023-10-11T08:38:32+00:00","dateModified":"2023-10-23T13:34:11+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/"},"wordCount":353,"commentCount":0,"publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/","url":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/","name":"5 Spookiest Data Breaches - Preferred Business Systems","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","datePublished":"2023-10-11T08:38:32+00:00","dateModified":"2023-10-23T13:34:11+00:00","breadcrumb":{"@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#primaryimage","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","width":1200,"height":630,"caption":"data-breach"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.pbscompany.com\/blog\/5-spookiest-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.pbscompany.com\/"},{"@type":"ListItem","position":2,"name":"5 Spookiest Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/wp.pbscompany.com\/#website","url":"https:\/\/wp.pbscompany.com\/","name":"Preferred Business Systems","description":"Making IT Simple Since 1997!","publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.pbscompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wp.pbscompany.com\/#organization","name":"Preferred Business Systems","url":"https:\/\/wp.pbscompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","width":"1024","height":"1024","caption":"Preferred Business Systems"},"image":{"@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PBSMakingITSimple","https:\/\/x.com\/pbscompany","https:\/\/www.linkedin.com\/company\/pbscompany","https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw"]},{"@type":"Person","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c","name":"reachuniversal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","caption":"reachuniversal"},"sameAs":["https:\/\/reachuniversal.com"],"url":"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/"}]}},"jetpack_featured_media_url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/data-breach.png","_links":{"self":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1102"}],"collection":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":2,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1102\/revisions"}],"predecessor-version":[{"id":1167,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1102\/revisions\/1167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media\/1103"}],"wp:attachment":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}