Skip to main content
  1. Home
  2. Computing
  3. Web
  4. Legacy Archives

NY loses over $1 billion due to 2013 data breaches, state attorney general says

Add as a preferred source on Google

Remember the huge data breach that afflicted Target and its customers last year? Well, that, along with other such incidents, cost the state of New York dearly.

New York State Attorney General Eric Schneiderman released a report indicating that as a result of data breaches, 7.3 million records were exposed last year alone. The attacks cost New Yorkers roughly $1.37 billion in damages. On top of that, between 2006 and 2013,  22.8 million personal records were compromised.

Recommended Videos

According to the report, unauthorized hacks were the leading cause of these data breaches and accounted for about 40 percent of the incidents. Schneiderman’s report says the “massive number of affected New Yorkers in 2013 was largely driven by two retail mega-breaches at Target and Living Social.”

“As we increasingly share our personal information with stores, restaurants, health care providers, and other organizations, we should be able to enjoy the benefits of new technology without putting ourselves at risk,” Attorney General Schneiderman said. “Moving forward, I will advocate for collaboration between industry and security experts to ensure that organizations across the state and country have access to the tools needed to secure our data, so we can best address this complex and growing problem.”

Stolen credit card numbers can bring in up to $45 each on the black market, while Social Security numbers and other types of personal data can command even more cash.

In his report, Schneiderman urges both ordinary people and the business community to step up their efforts to protect themselves. Tips he offers include encryption, strong passwords, and much more.

It will be interesting to see how 2014 will shake out on the hacking and related damages fronts. We can only hope that businesses and consumers are taking as many steps as possible to safeguard their data.

Konrad Krawczyk
Former Computing Editor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
Topics
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more