REQUEST INFO
Information leaks throughout history

12 Security Breaches that Shaped History

By DeVry University

+


From Target Corp.’s data system hack to Edward Snowden’s NSA leaks, information security breaches seem to be commonplace in today’s technology-centric world. In 2013 alone, there were an estimated 130 million software programs in existence designed to steal personal information online.[1]

Today, the Internet may be facing its largest data hacking bug to-date, Heartbleed.[2] The vulnerability in OpenSSL, the Internet’s most basic and free cryptographic library used by thousands of websites, means encrypted data dating back to 2012 may be susceptible to hackers.[3] Learn how to protect your personal information with cyber security tips.  

 

While the reach of information security breaches may be greater today thanks to the amount of information stored online, information leaks are nothing new. We assembled a list of some of history’s most memorable information leaks to understand their criminal past: 

historys-top-info-security-breaches-bdy1

1. THE GUNPOWDER PLOT

historys-top-info-security-breaches-bdy4

2. WEST POINT SECRETS

historys-top-info-security-breaches-bdy5

3. THE ENIGMA MACHINE

historys-top-info-security-breaches-bdy7

4. THE WATERGATE SCANDAL

historys-top-info-security-breaches-bdy8

5. THE IRAN-CONTRA AFFAIR

historys-top-info-security-breaches-bdy9

6. THE X-MEN ORIGINS: WOLVERINE LEAK

historys-top-info-security-breaches-bdy10

7. WIKILEAKS

historys-top-info-security-breaches-bdy11

8. THE STUXNET VIRUS

historys-top-info-security-breaches-bdy13

9. THE SONY PLAYSTATION NETWORK BREACH

historys-top-info-security-breaches-bdy15

10. THE KT CORPORATION HACK

historys-top-info-security-breaches-bdy16

11. EDWARD SNOWDEN NSA LEAKS

historys-top-info-security-breaches-bdy17

12. TARGET DATA BREACH

As history has clearly demonstrated, there is a need for skilled professionals to maintain the safety of sensitive information and to counteract security breaches. And in today’s world, that need is greater than ever. Cyber security jobs are growing at one of the fastest rates in the country.[22]  Perhaps the positive job outlook will help change the course of history in the years to come.

Become a cyber-crusader. If preventing online information security breaches is a career path that interests you, contact DeVry University to learn about degree programs that can help you get there.

 

_____________________________________________________________________________________



[1] http://www.usatoday.com/story/money/personalfinance/2013/04/14/identity-theft-growing/2082179/
[2] http://www.npr.org/blogs/alltechconsidered/2014/04/09/301006236/what-to-do-now-that-the-heartbleed-bug-exposed-the-internet
[3] http://time.com/59390/heartbleed-internet-security-routers/
[4] http://www.bizjournals.com/washington/breaking_ground/2013/01/watergate-hotel-owners-estimate-spring.html
[5] http://money.ca.msn.com/savings-debt/gallery/forbes/gallery.aspx?cp-documentid=24265589&page=1
[6] http://www.boxofficemojo.com/movies/?id=wolverine.htm
[7] http://www.bbc.com/news/world-middle-east-11612731
[8] http://www.forbes.com/sites/andygreenberg/2012/07/05/wikileaks-announces-its-largest-release-yet-in-the-syria-files-2-4-million-emails-from-syrian-officials-and-companies/
[9] http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/
[10] http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
[11] http://content.usatoday.com/communities/gamehunters/post/2011/04/security-experts-playstation-network-breach-one-of-largest-ever/1
[12] http://www.huffingtonpost.com/2011/05/06/playstation-theft-sony-hack_n_858355.html
[13] http://www.bbc.com/news/technology-19048494
[14] http://www.pcworld.com/article/260520/south_korea_telcos_launch_worlds_first_volte.html
[15] source: http://www.politico.com/story/2013/06/edward-snowden-nsa-leaker-glenn-greenwald-barton-gellman-92505.html#ixzz2VrPnKjNf
[16] http://www.nationaljournal.com/defense/highest-ranking-u-s-military-officer-says-snowden-s-security-breach-will-cost-billions-20140306
[17] http://www.huffingtonpost.com/2014/04/01/edward-snowden-support_n_5071938.html
[18] source: https://corporate.target.com/discover/article/Important-Notice-Unauthorized-access-to-payment-ca
[19] http://www.npr.org/2014/03/13/289836952/report-target-missed-its-chance-to-prevent-data-breach
[20] http://money.cnn.com/2014/01/10/news/companies/target-hacking/
[21] http://www.shreveporttimes.com/article/20140330/NEWS05/303300023/Kim-Komando-upside-Target-hack
[22] http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm