094 90 48200     Get SUPPORT

Aniar IT Services Blog

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.



Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.


Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.


DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 


Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.



Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 


Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 


Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.


Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.


Network Solutions - The world’s oldest domain name provider has been exposed in a hack. Millions of individuals’ data that included names, addresses, phone numbers, email addresses, and service information was compromised.



Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 


Disney Plus - The brand-spanking-new Disney+ streaming service had new user account information hijacked by hackers. Login credentials wound up on the Dark Web soon after. 

Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 


State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.


Macy’s - Macy’s had their ecommerce site hacked. Hackers embedded malicious code into their checkout page and put a skimming code on the company’s Wallet page. The malware retrieved names, addresses, phone numbers, email addresses, payment card numbers, card security codes, and card expiration dates.


T-Mobile - T-Mobile had over a million customers’ information accessed by a hacker. Information accessed included names, billing addresses, phone numbers, rates, and calling features.

Unknown - An unsecured server containing over 622 million email addresses and 50 million phone numbers, and millions of pieces of other information was discovered. It is unknown what organization this data is tied to as the time of writing.

With hundreds of millions of records being exposed each month, it’s hard to feel confident about giving your personal or financial information to anyone in the current threat landscape. If your business needs help trying to be secure, call us today at 094 90 48200 .

Facebook and Your Privacy (Part 1)
Protect Smartphones Like Any Other Computer


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 02 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Productivity Privacy Cloud Workplace Tips Innovation User Tips Email Internet Microsoft Data Software Network Security Hosted Solutions Hardware Hackers Data Recovery Google Data Backup Efficiency IT Support Tech Term Smartphones IT Services Windows 10 Mobile Devices Managed IT Services Communication Small Business Cybersecurity Communications VoIP Phishing Cloud Computing Computer Gadgets Collaboration Business Android Malware Users Backup Mobile Device Artificial Intelligence Smartphone Outsourced IT Network Internet of Things Windows Business Continuity Miscellaneous Saving Money Business Management Facebook BDR Server Browser Information Upgrade Spam Router Chrome How To Office 365 Managed Service Social Media Holiday Word Cybercrime Passwords Computers Applications Microsoft Office Windows 7 Blockchain Automation BYOD Paperless Office Mobile Device Management Two-factor Authentication Ransomware Telephone System Remote Monitoring Settings Connectivity Data Security Money Virtualization Apps Display Managed IT Encryption Data Storage Human Resources Infrastructure History Quick Tips Networking Staff Bandwidth Disaster Recovery Data Breach Vulnerability Operating System Data Protection Patch Management Save Money Avoiding Downtime Google Drive Education Managed Services Provider Identity Theft Servers Wi-Fi Comparison Private Cloud IT Plan Vendor OneNote Google Docs Help Desk Augmented Reality Sports Machine Learning Access Control Law Enforcement Digital Signage Unsupported Software CES Telephony Cryptocurrency Training Fraud Scam Software as a Service Update Business Intelligence Content Management Keyboard Botnet VPN Big Data Spam Blocking Website Processor Password Bring Your Own Device Government Managed IT services Virtual Assistant Business Technology Redundancy Voice over Internet Protocol IT Management App Telephone Systems HIPAA Meetings Social Engineering Criminal Firewall Cabling Fiber Optics Downtime Sync Multi-Factor Security Password Management Social Saving Time Windows 10s Millennials MSP Net Neutrality Digital Signature WiFi Bing Messaging Screen Mirroring Business Mangement Smart Tech Bitcoin Audit Physical Security Electronic Medical Records Wire Excel Entertainment Warranty GDPR Employer-Employee Relationship Digitize Google Apps Employee Addiction Unified Threat Management Cables Trend Micro Root Cause Analysis Online Shopping NIST Procurement Value Workforce File Sharing ISP OLED Using Data Credit Cards PDF Flash HVAC SMS Cast Gmail Batteries Data Management Tip of the week Printer 5G Remote Computing IT Assessment Workers Specifications Compliance Employee/Employer Relationship Public Cloud Mobile Computing Default App Shopping Evernote Cleaning Trending Cryptomining Hacker Biometric Security Information Technology HaaS The Internet of Things Virtual Machine AI Recycling Devices Google Search Virtual Private Network Computer Fan Windows Server 2008 YouTube Mouse Windows Server 2008 R2 OneDrive Data loss Authentication Software Tips Cache HBO Smart Office IT Infrastructure Social Network Practices Safe Mode Security Cameras Telecommuting Remote Worker Database Manufacturing Computing Amazon Shortcuts Hypervisor Remote eWaste Thought Leadership Save Time Remote Workers FENG Computer Care Microchip Cortana Copiers Alert Wireless Internet Outlook Document Management Camera Investment Printing Charger Hosted Computing Skype Smartwatch Travel Remote Work Wiring Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Vendor Management Going Green Legal Work/Life Balance Proactive IT Managed IT Service Search Engine Hard Drive Development Password Manager Nanotechnology Tools Project Management Solid State Drive USB Frequently Asked Questions Recovery Printers Wireless ROI Personal Wireless Charging Inventory Start Menu Health Twitter Windows 10 Fun Public Speaking Personal Information Presentation Lithium-ion battery Financial Tech Support Wireless Technology Safety Hard Drives IBM Marketing Search Productivity Budget Regulation Competition Customer Relationship Management IP Address CrashOverride Company Culture Emergency Customer Service Mobile Office Managed Service Provider Managing Stress Domains Hiring/Firing