text
stringlengths 0
118
|
---|
Dawn Kawamoto, TD Ameritrade’s 6 Million Customers Hit with Security Breach, CNET, |
(Nov. 26, 2007), https://www.cnet.com/news/td-ameritrades-6-million-customers-hit-with- |
security-breach/. |
10. |
Data Breaches Soar in 2008, 2009 Computer Fraud & Security 3 (Jan. 1, 2009), |
https://www.sciencedirect.com/science/article/pii/S1361372309700028. |
11. |
Linda McGlasson, Bank of NY Mellon Breach Much Bigger than First Announced, Bank |
InfoSecurity, (Aug. 29, 2008), https://www.bankinfosecurity.com/bank-ny-mellon-breach- |
much-bigger-than-first-announced-a-952. |
12. |
Andy Greenberg, The Year of the Mega Data Breach, Forbes, (Nov. 24, 2009), |
https://www.forbes.com/2009/11/24/security-hackers-data-technology-cio-network- |
breaches.html#12bb7035d038. |
13. |
A&L Goodbody, European Commission Passes New E-Privacy Directive Requiring Mandatory |
Data |
Breach |
Notification |
by |
Public |
Communications |
Providers, |
https://www.lexology.com/library/detail.aspx?g=c3d22861-a43c-4cd0-9294-b89664984101. |
14. |
Michael Gordover, Throwback Thursday: Lessons Learned From the 2008 Heartland Breach, |
Observe IT, (Mar. 19, 2015), https://www.observeit.com/blog/throwback-thursday-lessons- |
learned-from-the-2008-heartland-breach/. |
15. |
Nik Cubrilovic, RockYou Hack: From Bad to Worse, TechCrunch, (Dec. 15, 2009), |
https://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/. |
16. |
Brian Krebs, Hackers Break Into Virginia Health Professions Database, Demand Ransom, |
Wash. Post, (May 4, 2009). |
17. |
Experian, Data Breaches in 2010: How They Happen and What Your Organization Can do to |
Prepare, |
(Aug. |
2010), |
https://www.experian.com/assets/data-breach/white-papers/data- |
breaches-2010.pdf. |
18. |
See Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital |
Weapon (2014). |
19. |
Kevin Haley, The 2013 Internet Security Threat Report: Year of the Mega Data Breach, |
Symantec Blog, (Apr. 8, 2014) https://www.symantec.com/connect/blogs/2013-internet- |
security-threat-report-year-mega-data-breach. |
20. |
Diana Manos, Health Data Breaches up 97 Percent in 2011, Healthcare IT News, (Feb. 01, |
2012), https://www.healthcareitnews.com/news/health-data- breaches-97-percent-2011. |
21. |
Riva Richmond, The RSA Hack: How They Did It, New York Times, (Apr. 2, 2011). |
22. |
Michael Gordover, Throwback Hack: The Epsilon Email Breach of 2011, Observe IT, (Mar. 26, |
2015), https://www.observeit.com/blog/throwback-hack-the-epsilon-email-breach-of-2011/. |
23. |
Fahmida Y. Rashid, Epsilon Data Breach to Cost Billions in Worst-Case Scenario, eWeek (May |
3, 2011), https://www.eweek.com/security/epsilon-data- breach-to-cost-billions-in-worst-case- |
scenario. |
24. |
Sydney Butler, Dark Web History: Where Did It Come From?, Tech Nadu, (Dec. 23, 2018), |
https://www.technadu.com/dark-web-history/52017/. |
25. |
Joshuah |
Bearman, |
The |
Rise |
and |
Fall |
of |
Silk |
Road, |
Wired, |
(May |
2015), |
https://www.wired.com/2015/04/silk-road-1/. |
26. |
Tim Hume, How FBI Caught Ross Ulbricht, Alleged Creator of Criminal Marketplace Silk |
Road, CNN, (Oct. 5, 2013), https://www.cnn.com/2013/10/04/world/americas/silk-road-ross- |
ulbricht/index.html. |
27. |
Joab Jackson, Silk Road Paid Thousands in Shake-Downs from Malicious Hackers, CIO |
Magazine, (Jan. 28, 2015), https://www.cio.com/article/2877013/silk-road-paid-thousands-in- |
shakedowns-from-malicious-hackers.html. |
28. |
Tim Hume, How FBI Caught Ross Ulbricht, Alleged Creator of Criminal Marketplace Silk |
Road, CNN, (Oct. 5, 2013), https://www.cnn.com/2013/10/04/world/americas/silk-road-ross- |
ulbricht/index.html. |
29. |
Ricardo Bilton, 2012: A Big, Bad Year for Online Security Breaches, VultureBeat, (Sept. 17, |
2012), https://venturebeat.com/2012/09/17/2012-security-breaches/. |
30. |
Chris Velazco, 6.5 Million LinkedIn Passwords Reportedly Leaked, LinkedIn Is “Looking Into” |
It, TechCrunch, (June 6, 2012), https://techcrunch.com/2012/06/06/6-5-million-linkedin- |
passwords-reportedly-leaked-linkedin-is-looking-into-it/? |
_ga=2.145624050.756657197.1566881632-1484594935.1566622469. |
31. |
Judy Leary, The Biggest Data Breaches in 2016, Identity Force, (Dec. 16, 2016), |
https://www.identityforce.com/blog/2016-data-breaches. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.