To sustain this free service, we receive affiliate commissions via some of our links. This doesn’t affect rankings. Our review process.
Unfortunately the news is consistently full of headlines about security and data breaches. Major retailers, credit card companies and other organizations have all fallen victim to hackers, putting millions of consumers at risk.
Trying to keep up with all the latest security breach news and who’s affected can be overwhelming. We’ve put together this comprehensive guide to help you stay on top of what’s happening with the latest security breaches.
Recent Security Breaches
These recent credit card and data breaches are listed in chronological order, but feel free to skip to the company by clicking the link below:
2018: MyFitnessPal | Saks and Lord & Taylor | Panera Bread | Chili’s| Adidas | Macy’s
2017: Uber | Verizon | Equifax
2016: Democratic National Committee | Yahoo
2015: Scottrade | Experian | Ashley Madison | OPM | Anthem | Home Depot
2014: JPMorgan Chase
2013: Neiman-Marcus | Target | Adobe
When it Happened: In the Summer of 2018 Macy’s informed customers of a two-month data breach that happened between April 26th and June 12th.
Who it Affected: Online customers of Macys.com and Bloomingdales.com (they didn’t specify how many but said it was a “small number of customers.”)
What Was Compromised: Login details, including usernames and passwords which could mean full names, addresses, birthday, email address and credit card numbers and expiration (no security codes were stored).
Resolution: Macy’s has contacted and is providing consumer protection services for customers who were potentially impacted.
When it Happened: On June 28th Adidas says it became aware of a potential security breach that happened on June 26th.
Who it Affected: A few million consumers.
What Was Compromised: Contact information, user names and encrypted password (no credit card or fitness information).
Resolution: Began taking steps to alert relevant consumers and is working with data firms and law enforcement to investigate the issue.
When it Happened: On May 11, 2018 Chili’s parent company Brinker learned about a data breach which happened between March and April 2018.
Who it Affected: Customers who dined in certain restaurants (as of May they haven’t identified which of their 1,600 locations or how many people it affected).
What Was Compromised: Credit card information and names from payment systems.
Resolution: They are working with law enforcement officials to investigate the issue. The company also said they are working to provide credit monitoring services for customers who may have had their data stolen.
When it Happened: On April 3, 2018, it was reported that customer information may have been compromised on Panera Bread’s website for eight months.
Who it Affected: Customers who signed up to order food via PaneraBread.com.
What Was Compromised: Names, email addresses, physical addresses, birthdays, ordering habits, food preferences, last four digits of payment card numbers.
Resolution: The data has been removed from Panera’s website. The investigation is still ongoing and Panera has yet to release a formal statement on the matter.
When it Happened: Saks Fifth Avenue became aware of a security issue on April 1, 2018
Who it Affected: More than 5 million Saks Fifth Avenue and Lord & Taylor customers in North America
What Was Compromised: Hackers staged an attack to steal debit and credit card information but it is not confirmed if such a breach took place.
Resolution: The company has looked into and taken steps to contain the issue and believes there is no risk to shoppers.
When it Happened: Under Armor was notified on March 25, 2018 that the breach took place during February of 2018
Who it Affected: Approximately 150 million user accounts
What Was Compromised: Usernames, email addresses, and passwords with the hashtag function called bcrypt used to secure passwords.
Resolution: Under Armour is requiring all MyFitnessPal users to change their password and update any accounts which use similar passwords to the app. They are also encouraging users to monitor suspicious activity and are working with law enforcement officials and a data security firm to investigate the breach.
When it Happened: Late 2016, announced fall 2017 (Uber executives knew about the breach for over a year and paid $100,000 in ransom to keep it secret from the public)
Who it Affected: 57 million rider and driver accounts
What Was Compromised: The names and driver’s license numbers of around 600,000 drivers in the United States and other personal information including email addresses, names and mobile phone numbers of riders and drivers around the world. They do not believe that social security numbers, credit card or bank info or dates of birth were compromised.
Resolution: According to Uber’s website, they do not feel that further action is needed since there has been no fraud or misuse tied to the incident. They are continuing to monitor the situation and encourage users to change passwords and report any unusual activity.
When it Happened: July 2017
Who it Affected: 6 million confirmed, but could be as many as 14 million Verizon subscribers.
What Was Compromised: Log files that were generated when Verizon customers called customer support. Each file includes the customer’s name, phone number and PIN associated with their account. With this information, some experts say that online accounts could be logged into, allowing access to phones and social media accounts.
Resolution: Verizon customers were encouraged to change their passwords immediately and be aware of any phishing emails or scammy phone calls requesting personal information to verify identity (like zip code).
When it Happened: Mid-May to July 2017, caught by Equifax July 29, 2017, and announced to public September 7, 2017.
Who it Affected: Around 143 million people. (March 1, 2018, they announced that an additional 2.4 million Americans were impacted).
What Was Compromised: Social Security numbers, birth dates, addresses, and some driver’s license and credit card numbers
Resolution: They set up a website for users to check if they were impacted and are working with a independent cybersecurity firm to conduct an assessment and provide recommendations on prevention from future hackings. Read more about Equifax.
When it Happened: Late 2014 but just announced it in 2016
Who it Affected: 500 million user accounts
What Was Compromised: Names, email addresses, telephone numbers, dates of birth, hashed passwords and encrypted or unencrypted security questions and answers
Resolution: Encouraged customers to update passwords and security questions
In June 2016, the Democratic National Committee’s (DNC) entire database was hacked by the Russian government. The hackers gained access to the DNC’s computer network which gave them access to the research database for the Republican presidential candidate, Donald Trump. However, according to the DNC no financial, donor or personal information appears to have been stolen. The breach was purely for espionage and consumer data is at risk.
When it Happened: Late 2013 and early 2014, announced in October 2015
Who it Affected: 4.6 million customers
What Was Compromised: Names and street addresses (possibly Social Security numbers, email addresses and other sensitive data)
Resolution: Offered customers identity theft protection services
When it Happened: Between Sept. 1, 2013 and Sept. 16, 2015
Who it Affected: Potentially exposed personal information of 15 million customers and potential customers
What Was Compromised: Social Security numbers of those who might have applied for T-Mobile cell service
Resolution: Two years of free credit monitoring and identity protection
When it Happened: July 2015
Who it Affected: Users of a Ashley Madison, a commercial website that enables extramarital affairs
What Was Compromised: Hackers obtained 60 gigabytes of personal information and threatened to publicly share the names of users unless Ashley Madison agreed to shut down its site
Resolution: Those users whose details were exposed are filing a $567 million class-action lawsuit against the parent company of Ashley Madison
When it Happened: April – June 2015
Who it Affected: 21.5 million federal employees
What Was Compromised: Social Security numbers, names, dates and places of birth, addresses as well as security clearance info
Resolution: Employees and dependent minor children who were under the age of 18 as of July 1, 2015 were offered credit and identity monitoring, identity theft insurance, and identity restoration services for the next three years through ID Experts
Are you a federal employee? Get more info on OPM’s Cyber Security.
When it Happened: February 2015
Who it Affected: As many as 80 millions insurance customers
What Was Compromised: Records including Social Security numbers, birthdays and addresses, no credit card information was obtained
Resolution: AllClear ID identity protection for two years at no cost to customers
When it Happened: September 2014
Who it Affected: 83 million accounts, 76 million households, 7 million small businesses
What Was Compromised: Email and postal addresses, and phone numbers of account holders
Resolution: JPMorgan says it spends $250 million a year on online security and intends to double that amount
When it Happened: April 2014 – September 2014
Who it Affected: 56 million customers
What Was Compromised: credit card information
Resolution: Offered the affected customers a free year of identity theft protection from AllClear ID
When it Happened: 2013
Who it Affected: 1.1 million Neiman-Marcus customers
What Was Compromised: Credit/debit card information, names, addresses, phone numbers and email addresses
Resolution: Customers affected received one free year of credit monitoring
When it Happened: November to December 2013
Who it Affected: About 40 million customers according to Forbes
What Was Compromised: Credit/debit card information, names, addresses, phone numbers and email addresses
Resolution: Customers who shopped during that time were offered a free year of Protect My ID
When it Happened: 2012
Who it Affected: 38 million Adobe users
What Was Compromised: Credit/debit card records stolen, users’ Adobe IDs and encrypted passwords
Resolution: Notified users to change passwords and offered a year’s worth of credit monitoring to customers whose encrypted credit card data was stolen in the breach
What Happens After A Data Breach?
So, the hackers have your data – now what do they do with it after they “pump and dump” your information from the servers? Find out more about the black market trading and selling of personal information that goes on behind the scenes in this two-minute video from Norton.
How To Protect Yourself From Data Breaches
Identity theft can happen even to the most cautious of us. As you can see from the list of security breaches above, millions of people have had their personal information stolen. And in most security breaches the company that was hacked offered affected customers identity theft protection services. But that’s not very helpful after your information has already been compromised. So, be proactive by signing up for Identity Theft Protection and reading our Basic Cyber Security Tips to stay ahead of the game. For a minimal monthly payment you’ll rest assured knowing that someone is keeping a close eye on your credit.
How have you been affected by a security breach?