2018 Sees Record Number of Online Retail Data Breaches

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

During the holiday season people logged on to make purchases through online retailers, like no other time of the year. While there was significant growth in many segments of society on a global scale in 2018, we also saw a significant increase in online retail breaches where personally identifiable information was compromised at an alarming rate. With more and more people using online services for everything from ordering perishable food products to plane tickets and hotel reservations, 2018 proved to be a huge year for online/cybercriminals.

Here are some facts around some of the largest and most far-reaching retail breaches of 2018:

Data breaches are on the rise, and the total number of accounts breached has become ridiculously high.A report from cybersecurity firm Shape Security showed that almost 90% of the login attempts made on online retailers’ websites are hackers using stolen data.Many of these breaches were caused by flaws in payment systems that were taken advantage of by hackers.

Read the whole article on the AlienVault blog.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
3228 Followers
About AlienVault
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Promoted Content
Beginner’s Guide to Threat Intelligence
A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answers. In this AlienVault beginner's guide, you'll learn about: - Different threat intelligence sources - Why threat intelligence is critical for threat detection - The benefits of threat intelligence - How to generate threat intelligence - AlienVault's approach to threat intelligence Download this paper today to learn what threat intelligence is, what it is not, and why it is critical for organizations of all sizes to improve their threat detection, prioritization, and response capabilities.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

i2p Networks, Tor and Freenet Features: Pros + Cons
Views: 100 / January 23, 2019
DNS Rebinding – Behind The Enemy Lines
Views: 2452 / January 19, 2019
My IT Learning Journey
Views: 2860 / January 18, 2019
A New Age of Digital Interconnection
Views: 2281 / January 18, 2019
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel