10 hacker attacks left the most serious consequences in 2015
2015 was a year of unrest, not only because of the threat of terrorist forces worldwide, but also because of hacker attacks on the internet. As we use more internet and more connected devices, this danger increases.
And as a result of hacker attacks, stealing this data is not small. It may not affect people's lives, but stolen personal information can have far more serious consequences.
1. The HR department in the US is stolen data of more than 20 million people
This is the biggest personal data theft in US history.
In June, hackers posed an enormous threat when stealing personal information from more than 20 million people, from the US Human Resources Administration. These 20 million people are stolen both addresses, social security numbers, email and fingerprints.
Among these 20 million people, there are many employees working in the US Government office. Some people also say their email address has been compromised and changed. This is considered the biggest hacker data theft in US history.
2. Hackers take control of remote cars
Fiat had to recall 1.4 million cars after hackers took advantage of the security hole to take control of the car.
Fiat had to recall 1.4 million of its Jeep Grand Cherokee cars, after hackers took advantage of a security hole of the UConnect feature to hijack the car. Hackers used UConnect mobile connections and found out the car's IP address, which could then control calls, entertainment systems and turn into a Wi-Fi hotspot.
More dangerous, hackers can install malicious code on the firmware of the electronic control system on the vehicle, to control both the engine and the remote brake system.
3. One billion Android devices are threatened by the "Stagefright" security hole
This vulnerability allows hackers to infiltrate Android devices that users don't know.
A security hole called Stagefright was discovered in July, which allows hackers to hack into Android devices that users don't know. With more than 1 billion smartphone and tablet Android affected, security experts have called this the most dangerous security hole ever.
Google quickly released updates to patch. However, it still has to go through hardware manufacturers to reach users, so there may still be millions of devices still affected by this security vulnerability. Fortunately, so far there have been no reports of serious consequences due to this security error.
4. World's largest dating site stolen data
This site is stolen data of 32 million members.
Ashley Madison adultery dating site has been hacked and stolen data by more than 32 million members. The stolen data is not only names, addresses, email, but also credit card information and transaction history.
The hacker attack of Ashley Madison website has caused many serious consequences, not only revealing the identity of those who have committed adultery, but also making bad guys use this information to blackmail.
5. Firefox's biggest security vulnerability
This vulnerability was quickly fixed by Mozilla soon after.
In August, Mozilla warned users about a Firefox browser security vulnerability, which could be exploited via an ad on a Russian news site. Vulnerabilities allow hackers to steal files from computers that users don't know.
There are no specific reports of damage that this security vulnerability causes. Soon Mozilla also quickly updated a patch to fix this vulnerability.
6. Serious security vulnerabilities are found in Mac OS
This security hole is named DYLD.
Apple products are known for their highest security, but that is not absolute. Mac OS X operating system has detected a security vulnerability called DYLD.
Exploiting this security vulnerability allows hackers to install malicious code on the victim's computer, which in turn can steal more personal information. Apple also quickly resolved after this report was published.
7. 15 million customers of T-Mobile stolen data
Hacker stole information from 15 million customers, including sensitive information.
In October, T-Mobile said that about 15 million subscribers of the carrier had stolen sensitive personal data. However, this data is not stolen directly from T-Mobile, but from a third party.
Hackers attacked Experian's server, a service that helps check credit card information for T-Mobile. Hacker has stolen the personal information of 15 million customers, including sensitive information such as name, address, bank card number and social security number.
8. Dell admits that its laptops have a serious security vulnerability
The vulnerability was discovered by Dell in November.
A security hole was confirmed by Dell on its laptops in November. These vulnerabilities were discovered inside a security certificate of laptops manufactured in August.
Hackers can use it to lead users to fake websites, which can steal users' accounts and passwords.
9. A 30 USD device can open the locks of any car
Hacker does it because of a keyless feature vulnerability.
Using electronic components purchased online for about $ 30, a hacker has crafted a device capable of breaking into any garage and any car. All this hacker needs to do is just put that special device on the car and unlock it simply.
Hackers do that because of a keyless feature vulnerability (unlocking a car without a key). Although this feature is quite convenient, it is very easy to be exploited by high-skilled hackers.
10. Millions of children are stolen information and pictures
VTech toys to survive a flaw, causing hackers to steal information of more than 4.9 million accounts.
In November, China's toy manufacturer VTech left a security hole in its children's tablet. It makes hackers able to steal personal information of more than 4.9 million parent accounts and 6.7 million children's accounts.
Stolen information includes your name, address, email, encrypted passwords, IP address and more. Most serious, however, is that the photographs of the children are stolen and it can lead to more dangerous threats, such as kidnapping extortion.
- Hackers: 10 famous attacks through all time
- Little is known about the first hacker in human history
- Vietnamese Hacker, who are you?
- iPhone is safer than Android
- Spanish Hacker was sentenced to 2 years in prison for DDoS attacks
- Nearly 10,000 Americans suffer from cancer because of the 9/11 terrorist disaster
- Hacker Defender stops working
- Super Toba volcano 70,000 years ago did not have disastrous consequences
- The mystery of the tendency is 'off the left' that people don't recognize
- Hackers are wanted ... to teach security
- The 'bad battle' of a bad hacker in Vietnam
- Chinese hackers use fingerprints on glass to crack sensors for 20 minutes