{"id":8889,"date":"2015-12-03T15:00:16","date_gmt":"2015-12-03T20:00:16","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=8889"},"modified":"2025-10-22T08:57:22","modified_gmt":"2025-10-22T12:57:22","slug":"the-15-most-frightening-data-breaches","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/","title":{"rendered":"The 15 most frightening data breaches"},"content":{"rendered":"<h2 class=\"headline\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8891\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\" alt=\"data breaches\" width=\"500\" height=\"282\" data-wp-pid=\"8891\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147-300x169.jpg 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147-250x141.jpg 250w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/h2>\n<p>&nbsp;<\/p>\n<h2 class=\"headline\">Ashley Madison (2015)<\/h2>\n<p>All data breaches are scary, but some just have that extra scream factor.<\/p>\n<p>In arguably the most embarrassing data breach of the bunch, a group calling itself &#8220;The Impact Team&#8221; stole 37 million records from adultery website\u00a0Ashley Madison,\u00a0including many records that customers had paid to have deleted.<\/p>\n<p>Virtually all of the company\u2019s data was stolen in the hack, including records that suggest most female accounts on the site are fake, and that the company used female chat bots to trick men into spending money.<\/p>\n<h2 class=\"headline\">LivingSocial (2013)<\/h2>\n<p>Daily deals company\u00a0LivingSocial had its network compromised in 2013, with hackers stealing roughly 50 million names, email addresses, birthdays, and encrypted passwords from its SQL database.<\/p>\n<h2 class=\"headline\">Sony PlayStation Network (2011)<\/h2>\n<p>Game over, man. In April 2011,\u00a0hackers raided Sony\u2019s PlayStation Network (PSN) service, stealing personally identifiable information from more than 77 million gamers.<\/p>\n<p>Sony was further criticized for delaying the release of public information about the theft and for storing customer data in an unencrypted form.<\/p>\n<p>The attack took Sony\u2019s PSN out of service for 23 days.<\/p>\n<h2 class=\"headline\">Internal Revenue Service (2015)<\/h2>\n<p>Nigerian scammers pilfered more than $50 million from the U.S. Treasury via an embarrassingly simple\u00a02015 hack of the Internal Revenue Service website.<\/p>\n<p>Information scraped from previous data hacks was used to steal Americans\u2019 identities and request copies of past tax returns on the IRS website. The crooks then filed\u00a0new tax returns with falsified data, requesting big refunds.<\/p>\n<p>The hack caused massive nightmares for the estimated 334,000 people whose records were stolen before the IRS shut down the transcript request service.<\/p>\n<h2 class=\"headline\">Target (2013)<\/h2>\n<p>Hackers installed point-of-sale malware on Target\u2019s computer network sometime in 2013, resulting in the theft of more than 70 million customer records. Stolen data included payment card numbers, expiration dates, and CVV codes.<\/p>\n<p>The retailer reached out to affected customers by offering free data monitoring (standard practice) and a 10% off discount on a future shopping trip. But it was too little, too late; same-store sales slid in the quarter following the hack.<\/p>\n<h2 class=\"headline\">Anthem (2015)<\/h2>\n<p>Anthem, the United States\u2019 second largest for-profit health insurer, disclosed in February 2015 that it had\u00a0lost 78.8 million unencrypted customer records to criminals. Names, social security numbers, email addresses, and income data was stolen.<\/p>\n<p>The rare piece of good news: Financial and medical records were not affected.<\/p>\n<h2 class=\"headline\">Adobe (2013)<\/h2>\n<p>Adobe revealed in October 2013 that\u00a0hackers had stolen 38 million active customer IDs and passwords, forcing the company to send out a wave of password reset warnings.<\/p>\n<p>Weeks after, the news got worse for the company: The thieves also made off with the source code for its popular Adobe Photoshop software.<\/p>\n<h2 class=\"headline\">eBay (2014)<\/h2>\n<p>Talk about an inside job: In 2004, online auction house eBay suffered the largest hack in U.S. history, losing 145 million login credentials to a hacker using an internal eBay corporate account.<\/p>\n<p>Names, email and street addresses, phone numbers, and birth dates were compromised, but thankfully, passwords were stored in encrypted form.<\/p>\n<h2 class=\"headline\">Home Depot (2014)<\/h2>\n<p>In September 2014,\u00a0Home Depot admitted that it fell prey to hackers who installed antivirus-evading malware on its self-checkout registers. An estimated\u00a056 million sets of customer payment card data were stolen in the attack.<\/p>\n<p>The company\u2019s losses related to the event are expected to top $1 billion when all of the lawsuits are finally settled. Only $100 million of that will be covered by insurance.<\/p>\n<h2 class=\"headline\">JP Morgan Chase (2014)<\/h2>\n<p>The September 2014\u00a0breach of JP Morgan Chase proved that even the largest U.S. banks are vulnerable to data theft. Online banking login details were not stolen, but crooks did get their hands on 76 million sets of names, emails, addresses, and phone numbers of bank customers, creating serious phishing concerns.<\/p>\n<p>A group of Russian hackers is believed to be responsible for the attack.<\/p>\n<h2 class=\"headline\">PNI Digital Media (2015)<\/h2>\n<p>PNI Digital Media, the company that handles online photo printing for CVS, Walgreens, Rite Aid, Costco, and many more national chains, lost an unknown number of customer records to hackers in 2015.<\/p>\n<p>Given that the company boasted more than 18 million transactions in 2014, it&#8217;s likely that this breach affected tens of millions of Americans.<\/p>\n<h2 class=\"headline\">Heartland (2008)<\/h2>\n<p>Credit and debit card processing firm Heartland Payment Systems became one of the largest data breach victims in U.S. history when hackers compromised more than 130 million accounts in 2008.<\/p>\n<p>The criminal ring involved in the Heartland data theft was also found to be responsible for the 2005 hack of TJX Companies involving 94 million records.<\/p>\n<h2 class=\"headline\">TJX Companies (2005)<\/h2>\n<p>In a 2005 scheme dubbed &#8220;Operation Get Rich or Die Tryin,&#8221; a group of hackers\u00a0used an unsecured Wi-Fi network at a Marshalls store to break into parent TJX Companies\u2019 computer system and steal 94 million customer records, including payment card data.<\/p>\n<p>Albert Gonzalez, the ringleader of the hack, is serving a 20-year sentence in Leavenworth.<\/p>\n<h2 class=\"headline\">U.S. Office of Personnel Management (2015)<\/h2>\n<p>Earlier this year, the\u00a0United States Office of Personnel Management admitted that hackers had taken 21.5 million records belonging to those who had undergone government background checks or otherwise applied for federal employment. The hackers stole a wealth of sensitive data, including security clearance information and fingerprint data belonging to secret agents.<\/p>\n<p>The Washington Post reported that the attack is believed to have originated in China.<\/p>\n<h2 class=\"headline\">Zappos (2012)<\/h2>\n<p>In January 2012, online shoe retailer\u00a0Zappos stated that cybercriminals had stolen data of 24 million customers, including names, addresses, and the last four digits of their payment cards.<\/p>\n<p>After the announcement, Zappos had to disconnect its phone lines to keep upset customers from calling in and overloading its phone system.<\/p>\n<h4>Have questions?<\/h4>\n<p>Get help from IT Experts\/Microsofts Cloud Solutions Partner<br \/>\nCall us at:\u00a0856-745-9990 or visit:\u00a0<a href=\"https:\/\/southjerseytechies.net\/\">https:\/\/southjerseytechies.net\/<\/a><\/p>\n<p><a title=\"South Jersey Techies Website\" href=\"http:\/\/southjerseytechies.net\/\">South Jersey Techies, LLC<\/a>\u00a0is a full\u00a0<a title=\"South Jersey Techies Managed Services\" href=\"http:\/\/southjerseytechies.net\/\">Managed Web and Technology Services Company<\/a>\u00a0providing\u00a0IT Services,\u00a0<a title=\"South Jersey Techies:  Web Design\" href=\"http:\/\/southjerseytechies.net\/website_design.php\">Website Design Services<\/a>,\u00a0<a title=\"South Jersey Techies:  Server Support\" href=\"http:\/\/southjerseytechies.net\/server_install.php\">Server Support<\/a>,\u00a0<a title=\"South Jersey Techies:  Network Consulting\" href=\"http:\/\/southjerseytechies.net\/network_consulting.php\">Network Consulting<\/a>,\u00a0<a title=\"South Jersey Techies:  Internet Phones\" href=\"http:\/\/southjerseytechies.net\/voip.php\">Internet Phones<\/a>,\u00a0<a title=\"South Jersey Techies:  Cloud Solutions Provider\" href=\"http:\/\/southjerseytechies.net\/cloud.php\">Cloud Solutions Provider<\/a>\u00a0and much more.<a title=\"South Jersey Techies:  Contact\" href=\"http:\/\/southjerseytechies.net\/contact.php\">\u00a0Contact for More<\/a>\u00a0Information.<\/p>\n<p>To read this article in its entirety\u00a0click here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Ashley Madison (2015) All data breaches are scary, but some just have that extra scream factor. In arguably the most embarrassing data breach of the bunch, a group calling itself &#8220;The Impact Team&#8221; stole 37 million records from adultery &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":8891,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[473,142,103,367],"tags":[469,1281,453,1280,63,1282,1283],"class_list":["post-8889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-security","category-tips-info","category-virus-adware-spyware-removal","tag-bigbeagle-com","tag-data-abstraction","tag-encrypted-data","tag-frightening-data-breaches","tag-south-jersey-techies","tag-sql-database","tag-top-companies-got-hacked"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - The 15 most frightening data breaches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"South Jersey Techies - The 15 most frightening data breaches\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Ashley Madison (2015) All data breaches are scary, but some just have that extra scream factor. In arguably the most embarrassing data breach of the bunch, a group calling itself &#8220;The Impact Team&#8221; stole 37 million records from adultery &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-03T20:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T12:57:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"226\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"The 15 most frightening data breaches\",\"datePublished\":\"2015-12-03T20:00:16+00:00\",\"dateModified\":\"2025-10-22T12:57:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\"},\"wordCount\":967,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\",\"keywords\":[\"BigBeagle.com\",\"Data abstraction\",\"Encrypted Data\",\"Frightening Data Breaches\",\"South Jersey Techies\",\"SQL database\",\"Top companies got hacked\"],\"articleSection\":[\"Internet Security\",\"Security\",\"Tips &amp; Info\",\"Virus \/ Adware \/ Spyware Removal\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\",\"name\":\"South Jersey Techies - The 15 most frightening data breaches\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\",\"datePublished\":\"2015-12-03T20:00:16+00:00\",\"dateModified\":\"2025-10-22T12:57:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg\",\"width\":400,\"height\":226},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 15 most frightening data breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - The 15 most frightening data breaches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"South Jersey Techies - The 15 most frightening data breaches","og_description":"&nbsp; Ashley Madison (2015) All data breaches are scary, but some just have that extra scream factor. In arguably the most embarrassing data breach of the bunch, a group calling itself &#8220;The Impact Team&#8221; stole 37 million records from adultery &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2015-12-03T20:00:16+00:00","article_modified_time":"2025-10-22T12:57:22+00:00","og_image":[{"width":400,"height":226,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","type":"image\/jpeg"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"The 15 most frightening data breaches","datePublished":"2015-12-03T20:00:16+00:00","dateModified":"2025-10-22T12:57:22+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/"},"wordCount":967,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","keywords":["BigBeagle.com","Data abstraction","Encrypted Data","Frightening Data Breaches","South Jersey Techies","SQL database","Top companies got hacked"],"articleSection":["Internet Security","Security","Tips &amp; Info","Virus \/ Adware \/ Spyware Removal"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/","url":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/","name":"South Jersey Techies - The 15 most frightening data breaches","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","datePublished":"2015-12-03T20:00:16+00:00","dateModified":"2025-10-22T12:57:22+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","width":400,"height":226},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/the-15-most-frightening-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"The 15 most frightening data breaches"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-999147.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-2jn","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=8889"}],"version-history":[{"count":8,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8889\/revisions"}],"predecessor-version":[{"id":14811,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8889\/revisions\/14811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/8891"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=8889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=8889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=8889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}