{"id":523,"date":"2020-05-26T20:38:09","date_gmt":"2020-05-26T20:38:09","guid":{"rendered":"http:\/\/currentscams.com\/?p=523"},"modified":"2020-06-10T17:10:19","modified_gmt":"2020-06-10T17:10:19","slug":"2020-data-breaches","status":"publish","type":"post","link":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/","title":{"rendered":"2020 Data Breaches &#8211; So Far This Year"},"content":{"rendered":"\n<p>2020 Data Breaches<\/p>\n\n\n\n<p>In 2019 there were over 7.9 billion data records exposed. That was a 33% increase over 2018!<\/p>\n\n\n\n<p>Last year, the <a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Trade Commission (FTC)<\/a> imposed hefty fines and penalties on companies involved in data breaches such as the <a href=\"https:\/\/www.ftc.gov\/news-events\/blogs\/business-blog\/2019\/07\/575-million-equifax-settlement-illustrates-security-basics\" target=\"_blank\" rel=\"noreferrer noopener\">Equifax breach<\/a> and Facebook data leaks, to settle charges of improper handling of Personally Identifiable Information (PII).<\/p>\n\n\n\n<p>So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years, the odds are not looking good. In fact, data breaches aren\u2019t going away.<\/p>\n\n\n\n<p>Here are the 2020 Data Breaches so far.<\/p>\n\n\n\n<p><strong>Landry\u2019s<\/strong><\/p>\n\n\n\n<p>Restaurant conglomerate <a href=\"https:\/\/www.identityforce.com\/blog\/landrys-suffers-malware-attack-payment-data-exposed\">Landry\u2019s announced a point-of-sale malware attack<\/a> that targeted customers\u2019 payment card data \u2013 the company\u2019s <a href=\"https:\/\/www.fightingidentitycrimes.com\/landrys-data-breach\/\">second data breach<\/a> since 2015.<\/p>\n\n\n\n<p><strong>Peekaboo Moments<\/strong><\/p>\n\n\n\n<p>An unsecured database on an Elasticsearch server linking back to <a href=\"https:\/\/www.bankinfosecurity.com\/babys-first-data-breach-app-exposes-baby-photos-videos-a-13603\" target=\"_blank\" rel=\"noreferrer noopener\">Peekaboo Moments<\/a>, an app where parents post images and videos of their children, was left exposed.&nbsp;<\/p>\n\n\n\n<p><strong>Hanna Andersson<\/strong><\/p>\n\n\n\n<p>An undisclosed number of shoppers of the&nbsp;children\u2019s clothing retailer, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-retailer-hanna-andersson-hacked-to-steal-credit-cards\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hanna Andersson, had sensitive payment information exposed<\/a>. This breach is the latest in a string of Magecart attacks, where hackers install malicious malware in Point of Sale (POS) systems to skim credit card information.<\/p>\n\n\n\n<p><strong>Microsoft<\/strong><\/p>\n\n\n\n<p>A customer support database holding over 280 million Microsoft customer records was left unprotected on the web. <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-discloses-security-breach-of-customer-support-database\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s exposed database<\/a> disclosed email addresses, IP addresses, and support case details.<\/p>\n\n\n\n<p><strong>Marijuana Dispensaries<\/strong><\/p>\n\n\n\n<p>THSuite, a point-of-sale system of marijuana dispensaries across the U.S., disclosed personal information belonging to over <a href=\"https:\/\/www.vpnmentor.com\/blog\/report-thsuite-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">85,000 medical marijuana patients and recreational users<\/a> after leaving their database unprotected.<\/p>\n\n\n\n<p><strong>Estee Lauder<\/strong><\/p>\n\n\n\n<p>An unsecured database belonging to the makeup company <a href=\"https:\/\/threatpost.com\/estee-lauder-440m-records-email-network-info\/152789\/\" target=\"_blank\" rel=\"noreferrer noopener\">Estee Lauder exposed 440 million customer records.<\/a><\/p>\n\n\n\n<p><strong>Fifth Third Bank<\/strong><\/p>\n\n\n\n<p>Fifth Third Bank, a financial institution with 1,150 branches in 10 states, claims <a href=\"https:\/\/www.cincinnati.com\/story\/money\/2020\/02\/11\/fifth-third-data-breach-consumer-federation-america-slams\/4722455002\/\">a former employee is responsible for a data breach<\/a>, which exposed customers\u2019 name, Social Security number, driver\u2019s license information, mother\u2019s maiden name, address, phone number, date of birth and account numbers.<\/p>\n\n\n\n<p><strong>Health Share of Oregon<\/strong><\/p>\n\n\n\n<p>The theft of an employee laptop from GridWorks IC, a third-party vendor of Health Share of Oregon, has exposed the personal and medical information of 654,000 members.<\/p>\n\n\n\n<p><strong>MGM Resorts<\/strong><\/p>\n\n\n\n<p>Over <a href=\"https:\/\/www.zdnet.com\/article\/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum\/?ftag=TRE-03-10aaa6b&amp;bhid=28772297924122185557132729256898\" target=\"_blank\" rel=\"noreferrer noopener\">10.6 million hotel guests<\/a> who have stayed at the MGM Resorts have had their personal information posted on a hacking forum.<\/p>\n\n\n\n<p><strong>PhotoSquared<\/strong><\/p>\n\n\n\n<p>The photography app, <a href=\"https:\/\/www.vpnmentor.com\/blog\/report-photosquared-leak\/\" target=\"_blank\" rel=\"noreferrer noopener\">PhotoSquared<\/a>, has exposed the personal information and photos of the 100,000 individuals who have downloaded the app. Besides photos, user\u2019s names, addresses, order receipts, and shipping labels were impacted in the unsecured database.<\/p>\n\n\n\n<p><strong>Slickwraps<\/strong><\/p>\n\n\n\n<p>Slickwraps, an online tech customization store, admitted to leaving the information of <a href=\"https:\/\/www.zdnet.com\/article\/slickwraps-says-customer-trust-was-violated-in-avoidable-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">850,000 customers in an unprotected database.<\/a> The customer information disclosed includes names, email addresses, physical addresses, phone numbers, and purchase histories.<\/p>\n\n\n\n<p><strong>Walgreens<\/strong><\/p>\n\n\n\n<p>Walgreens, the second-largest US pharmacy chain, announced <a href=\"https:\/\/healthitsecurity.com\/news\/walgreens-reports-data-breach-from-personal-mobile-messaging-app-error\" target=\"_blank\" rel=\"noreferrer noopener\">an error within their mobile app\u2019s messaging feature<\/a> that exposed not only personal messages sent within the app but also the names, prescription numbers and drug names, store numbers, and shipping addresses of its users.<\/p>\n\n\n\n<p><strong>Carnival Cruise Lines<\/strong><\/p>\n\n\n\n<p>Two cruise lines under the Carnival Corporation, one of the world\u2019s largest cruise ship operator, divulged sensitive information of its employees and customers after a hacker accessed an employee\u2019s work email.<\/p>\n\n\n\n<p><strong>J-Crew<\/strong><\/p>\n\n\n\n<p>Hackers accessed online accounts of customers of J-Crew, through a credential stuffing attack. Using exposed emails and passwords, the hackers were able to login to an unknown number of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/jcrew-disables-user-accounts-after-credential-stuffing-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">J-Crew customer accounts<\/a> and gain access to stored information including the last four digits of credit card numbers, expiration dates, card types, billing addresses, order numbers, shipping confirmation numbers, and shipment status.<\/p>\n\n\n\n<p><strong>T-Mobile<\/strong><\/p>\n\n\n\n<p>An unknown number of customers\u2019 sensitive information was accessed through a T\u2011Mobile employee email accounts after a malicious attack of a third-party email vendor.<\/p>\n\n\n\n<p><strong>Whisper<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/whisper-an-anonymous-secret-sharing-app-failed-to-keep-messages-profiles-private\/\" target=\"_blank\" rel=\"noreferrer noopener\">Whisper<\/a>, an anonymous secret-sharing app, has left member information exposed in an unsecured database. Although the app does not collect names, the database included nicknames, ages, ethnicities, genders, and location data of over 900 million users.<\/p>\n\n\n\n<p><strong>TrueFire<\/strong><\/p>\n\n\n\n<p>The online guitar lessons website, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/guitar-tuition-website-suffers\/\" target=\"_blank\" rel=\"noreferrer noopener\">TrueFire<\/a>, notified its users that a hacker gained access to names, addresses, payment card account numbers, card expiration date, and security codes for the past six months.<\/p>\n\n\n\n<p><strong>General Electric<\/strong><\/p>\n\n\n\n<p>The technology&nbsp;conglomerate, General Electric (GE), disclosed that a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tech-giant-ge-discloses-data-breach-after-service-provider-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">third party vendor experienced a data breach<\/a>, exposing the personally identifiable information of over 280,000 current and former employees. The employee information accessed through Canon Business Process.<\/p>\n\n\n\n<p><strong>Marriott International<\/strong><\/p>\n\n\n\n<p>Using the login credentials of two employees through a third-party app used to provide guest services, <a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/03\/31\/marriott-international-confirms-data-breach-of-up-to-5-2-million-guests\/\" target=\"_blank\" rel=\"noreferrer noopener\">Marriott International hotels exposed the information of 5.2 million guests<\/a>. The personal information of the hotel guests impacted includes names, mailing addresses, email addresses, phone numbers, loyalty account numbers and points balances, company, genders, birth dates, linked airline loyalty programs and numbers, room preferences and language preferences. In a previous data breach in 2018, <a href=\"https:\/\/www.identityforce.com\/blog\/500-million-marriott-data-breach\">Marriott hotels exposed the personal information of 500 million guests<\/a>.<\/p>\n\n\n\n<p><strong>Key Ring<\/strong><\/p>\n\n\n\n<p>A digital wallet app, <a href=\"https:\/\/securityboulevard.com\/2020\/04\/data-leak-private-information-of-14-million-key-ring-users-exposed\/\" target=\"_blank\" rel=\"noreferrer noopener\">Key Ring<\/a>, left stored customer data of 14 million users accessible in an unsecured database. The app allows its users to easily upload and store scans and photos of membership and loyalty cards to a digital folder in their mobile device..<\/p>\n\n\n\n<p><strong>San Francisco International Airport (SFO)<\/strong><\/p>\n\n\n\n<p>Two <a href=\"https:\/\/securityboulevard.com\/2020\/04\/san-francisco-international-airport-reveals-data-breach-on-two-websites\/\" target=\"_blank\" rel=\"noreferrer noopener\">websites hosted by the San Francisco International Airport (SFO)<\/a>, SFOConnect.com and SFOConstruction.com, suffered a security incident in which hackers injected malicious code to collect users\u2019 login credentials. The malware gained access to usernames and passwords used to log on to the impacted websites.<\/p>\n\n\n\n<p><strong>Zoom<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.fightingidentitycrimes.com\/500-000-zoom-accounts-discovered-on-dark-web\/\" target=\"_blank\" rel=\"noreferrer noopener\">credentials of over 500,000 Zoom teleconferencing accounts<\/a> were found for sale on the dark web and hacker forums for as little as $.02. Email addresses, passwords, personal meeting URLs, and host keys are said to be collected through a credential stuffing attack.<\/p>\n\n\n\n<p><strong>Quidd<\/strong><\/p>\n\n\n\n<p>A collection of <a href=\"https:\/\/www.zdnet.com\/article\/account-details-for-4-million-quidd-users-shared-on-hacking-forum\/\" target=\"_blank\" rel=\"noreferrer noopener\">4 million login records belonging to the online marketplace Quidd<\/a> was breached through a hack then posted on the <a href=\"https:\/\/www.identityforce.com\/blog\/shining-light-dark-web-identity-monitoring\">dark web<\/a> forum for free. Once accessible, the usernames, email addresses, and hashed account passwords were shared among members of the forum. Although the passwords were hashed, cybercriminals are unhashing them and selling the data again.<\/p>\n\n\n\n<p><strong>Beaumont Health<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.hipaajournal.com\/beaumont-health-notifies-112000-patients-about-may-2019-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">personal and medical information of over 112,000 employees and patients of Beaumont Health<\/a> was accessed by a malicious actor after compromising employee email accounts through a&nbsp;<a href=\"https:\/\/www.identityforce.com\/blog\/phishing-scams-how-to-protect-yourself\">phishing attack<\/a>.<\/p>\n\n\n\n<p><strong>Facebook<\/strong><\/p>\n\n\n\n<p>More than&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/267-million-facebook-profiles-sold-for-600-on-the-dark-web\/\" target=\"_blank\" rel=\"noreferrer noopener\">267 million Facebook profiles have been listed for sale on the Dark Web<\/a>&nbsp;\u2013 all for $600. Reports link these profiles back to the <a href=\"https:\/\/www.identityforce.com\/blog\/facebook-data-leaked-wawa-breached\">data leak discovered in December<\/a>, with additional PII attached, including email addresses. Researchers are still uncertain how this data was exposed.<\/p>\n\n\n\n<p><strong>Nintendo<\/strong><\/p>\n\n\n\n<p>A credential stuffing attack using previously exposed user IDs and passwords of popular video game company, <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-protect-your-nintendo-account-after-the-recent-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nintendo<\/a>, granted hackers access to over 160,000 player accounts.<\/p>\n\n\n\n<p><strong>Ambry Genetics<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/securityboulevard.com\/2020\/04\/medical-information-of-233000-individuals-exposed-after-genetic-testing-lab-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ambry Genetics<\/a>, a genetic testing laboratory based in the U.S., announced 233,000 medical patients had their personal and medical information accessed by a third party through an employee email.<\/p>\n\n\n\n<p><strong>GoDaddy<\/strong><\/p>\n\n\n\n<p>The web hosting site, GoDaddy, announced to its users that an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/godaddy-notifies-users-of-breached-hosting-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">unauthorized third party was granted access to login credentials<\/a>. The site is said to have 19 million users and possibly 24,000 users had their usernames and passwords exposed. The company has reset passwords to prevent further access.<\/p>\n\n\n\n<p><strong>Fresenius Group<\/strong><\/p>\n\n\n\n<p>A reported <a href=\"https:\/\/krebsonsecurity.com\/2020\/05\/europes-largest-private-hospital-operator-fresenius-hit-by-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attack on the Fresenius Group<\/a>, a global healthcare company and one of the largest dialysis equipment providers in the U.S., impacted the company\u2019s operations around the world. The organization claims their system was affected by a computer virus, but a source confirmed the hacker held the healthcare\u2019s IT systems and data hostage in exchange for payment in bitcoin.<\/p>\n\n\n\n<p><strong>U.S. Marshals<\/strong><\/p>\n\n\n\n<p>The personal information of 387,000 former and current inmates was access by a hacker who exploited a server vulnerability in a <a href=\"https:\/\/www.zdnet.com\/article\/us-marshals-service-exposed-prisoner-details-in-security-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Marshals Service<\/a> database.<\/p>\n\n\n\n<p><strong>Magellan Health<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/healthcare-giant-magellan-ransomware-data-breach\/155699\/\" target=\"_blank\" rel=\"noreferrer noopener\">Magellan Health<\/a>, a Fortune 500 healthcare company, has sent a notice to its patients that it had fallen victim to a phishing scam and ransomware attack. The information held for ransom includes names, contact information, employee ID numbers, W-2 or 1099 information, including Social Security numbers or taxpayer identification numbers, as well as login credentials and passwords for employees.<\/p>\n\n\n\n<p><strong>Home Chef<\/strong><\/p>\n\n\n\n<p>The information belonging to <a href=\"https:\/\/techcrunch.com\/2020\/05\/20\/home-chef-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">8 million users of the home meal delivery service, Home Chef<\/a>, were found for sale in the dark web after a data breach. The information for sale includes names, email addresses, phone numbers, addresses, scrambled passwords, and last four digits of credit card numbers.<\/p>\n\n\n\n<p><strong>Wishbone<\/strong><\/p>\n\n\n\n<p>Over 40 million users of the mobile app, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/hacker-selling-40-million-user-records-from-popular-wishbone-app\/\" target=\"_blank\">Wishbone<\/a>, had their personal information up for sale in the Dark Web. Usernames, emails, phone numbers, location information and hashed passwords were exposed in a data breach before being advertised in a hacking forum.<\/p>\n\n\n\n<p>For more information on Data Breaches, visit <a href=\"https:\/\/blog.feedspot.com\/data_breach_blogs\/\">Top 15 Data Breach Blogs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2020 Data Breaches In 2019 there were over 7.9 billion data records exposed. That was a 33% increase over 2018! Last year, the Federal Trade Commission (FTC) imposed hefty fines and penalties on companies involved in data breaches such as the Equifax breach and Facebook data leaks, to settle charges of improper handling of Personally [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[36],"tags":[55,49,54,52,37,51,50],"class_list":{"0":"post-523","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-data-breach","8":"tag-login-credentials","9":"tag-malware","10":"tag-personal-information","11":"tag-personally-identifiable-information","12":"tag-phishing","13":"tag-pii","14":"tag-unsecured-database"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2020 Data Breaches - So Far This Year - Current Scams<\/title>\n<meta name=\"description\" content=\"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2020 Data Breaches - So Far This Year - Current Scams\" \/>\n<meta property=\"og:description\" content=\"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Current Scams\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/csreporter\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T20:38:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-10T17:10:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"889\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"glrubens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"glrubens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/\"},\"author\":{\"name\":\"glrubens\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/#\\\/schema\\\/person\\\/0dc3078dd017dba32728bfc25a30a378\"},\"headline\":\"2020 Data Breaches &#8211; So Far This Year\",\"datePublished\":\"2020-05-26T20:38:09+00:00\",\"dateModified\":\"2020-06-10T17:10:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/\"},\"wordCount\":1445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-4031973_1280.jpg\",\"keywords\":[\"login credentials\",\"malware\",\"personal information\",\"personally identifiable information\",\"phishing\",\"PII\",\"unsecured database\"],\"articleSection\":[\"Data Breach\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/\",\"url\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/\",\"name\":\"2020 Data Breaches - So Far This Year - Current Scams\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-4031973_1280.jpg\",\"datePublished\":\"2020-05-26T20:38:09+00:00\",\"dateModified\":\"2020-06-10T17:10:19+00:00\",\"description\":\"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-4031973_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-4031973_1280.jpg\",\"width\":1280,\"height\":889,\"caption\":\"2020 data breaches - current scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/2020\\\/05\\\/26\\\/2020-data-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/currentscams.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2020 Data Breaches &#8211; So Far This Year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/#website\",\"url\":\"https:\\\/\\\/currentscams.com\\\/\",\"name\":\"Current Scams\",\"description\":\"Current Scams\",\"publisher\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/currentscams.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/#organization\",\"name\":\"G & M Associates, LLC\",\"url\":\"https:\\\/\\\/currentscams.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/reveal2-921500_1280.jpg\",\"contentUrl\":\"http:\\\/\\\/currentscams.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/reveal2-921500_1280.jpg\",\"width\":1101,\"height\":1280,\"caption\":\"G & M Associates, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/currentscams.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/csreporter\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/currentscams.com\\\/#\\\/schema\\\/person\\\/0dc3078dd017dba32728bfc25a30a378\",\"name\":\"glrubens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g\",\"caption\":\"glrubens\"},\"url\":\"https:\\\/\\\/currentscams.com\\\/index.php\\\/author\\\/glrubens\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2020 Data Breaches - So Far This Year - Current Scams","description":"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"2020 Data Breaches - So Far This Year - Current Scams","og_description":"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,","og_url":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/","og_site_name":"Current Scams","article_publisher":"https:\/\/www.facebook.com\/csreporter\/","article_published_time":"2020-05-26T20:38:09+00:00","article_modified_time":"2020-06-10T17:10:19+00:00","og_image":[{"width":1280,"height":889,"url":"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg","type":"image\/jpeg"}],"author":"glrubens","twitter_card":"summary_large_image","twitter_misc":{"Written by":"glrubens","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#article","isPartOf":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/"},"author":{"name":"glrubens","@id":"https:\/\/currentscams.com\/#\/schema\/person\/0dc3078dd017dba32728bfc25a30a378"},"headline":"2020 Data Breaches &#8211; So Far This Year","datePublished":"2020-05-26T20:38:09+00:00","dateModified":"2020-06-10T17:10:19+00:00","mainEntityOfPage":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/"},"wordCount":1445,"commentCount":0,"publisher":{"@id":"https:\/\/currentscams.com\/#organization"},"image":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg","keywords":["login credentials","malware","personal information","personally identifiable information","phishing","PII","unsecured database"],"articleSection":["Data Breach"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/","url":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/","name":"2020 Data Breaches - So Far This Year - Current Scams","isPartOf":{"@id":"https:\/\/currentscams.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg","datePublished":"2020-05-26T20:38:09+00:00","dateModified":"2020-06-10T17:10:19+00:00","description":"So, what about 2020 data breaches and what does the future hold? While we clearly don\u2019t want to see any more of what we saw in the past few years,","breadcrumb":{"@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#primaryimage","url":"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg","contentUrl":"https:\/\/currentscams.com\/wp-content\/uploads\/2020\/05\/hacker-4031973_1280.jpg","width":1280,"height":889,"caption":"2020 data breaches - current scams"},{"@type":"BreadcrumbList","@id":"https:\/\/currentscams.com\/index.php\/2020\/05\/26\/2020-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/currentscams.com\/"},{"@type":"ListItem","position":2,"name":"2020 Data Breaches &#8211; So Far This Year"}]},{"@type":"WebSite","@id":"https:\/\/currentscams.com\/#website","url":"https:\/\/currentscams.com\/","name":"Current Scams","description":"Current Scams","publisher":{"@id":"https:\/\/currentscams.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/currentscams.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/currentscams.com\/#organization","name":"G & M Associates, LLC","url":"https:\/\/currentscams.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/currentscams.com\/#\/schema\/logo\/image\/","url":"http:\/\/currentscams.com\/wp-content\/uploads\/2020\/06\/reveal2-921500_1280.jpg","contentUrl":"http:\/\/currentscams.com\/wp-content\/uploads\/2020\/06\/reveal2-921500_1280.jpg","width":1101,"height":1280,"caption":"G & M Associates, LLC"},"image":{"@id":"https:\/\/currentscams.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/csreporter\/"]},{"@type":"Person","@id":"https:\/\/currentscams.com\/#\/schema\/person\/0dc3078dd017dba32728bfc25a30a378","name":"glrubens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c852c6bbd6014734a0cfabdcfc72eef45d1206c154f4ff892846c7d153aa48ca?s=96&d=mm&r=g","caption":"glrubens"},"url":"https:\/\/currentscams.com\/index.php\/author\/glrubens\/"}]}},"_links":{"self":[{"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/posts\/523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":1,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/posts\/523\/revisions"}],"predecessor-version":[{"id":525,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/posts\/523\/revisions\/525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/media?parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/categories?post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/currentscams.com\/index.php\/wp-json\/wp\/v2\/tags?post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}