Privacy and Security \ Lynda Not following
Product name
LyndaProduct url
https://www.linkedin.com/learning/ISO 27001 certified
not detectedHIPAA certified
not detectedSOC2 type1 certified
not detectedSOC2 type2 certified
not detectedDataprotectionofficer contact
not detectedPrivacy page(s)
Security page(s)
No security pages detectedTypically contains the following data
UnknownCompliance documentation
We don't have documentation available yet.Suppliers
Not detectedAdditional information
Not detectedKnown data breaches
1. LinkedIn Scraped and Faked Data (2023) breach on 2023-11-04
Description
Records affected
In November 2023, a post to a popular hacking forum alleged that millions of LinkedIn records had been scraped and leaked. On investigation, the data turned out to be a combination of legitimate data scraped from LinkedIn and email addresses constructed from impacted individuals' names.
19788753
Type of data leaked
Email addresses, Genders, Geographic locations, Job titles, Names, Professional skills, Social media profiles
Source
2. LinkedIn Scraped Data (2021) breach on 2021-04-08
Description
Records affected
During the first half of 2021, LinkedIn was targeted by attackers who scraped data from hundreds of millions of public profiles and later sold them online. Whilst the scraping did not constitute a data breach nor did it access any personal data not intended to be publicly accessible, the data was still monetised and later broadly circulated in hacking circles. The scraped data contains approximately 400M records with 125M unique email addresses, as well as names, geographic locations, genders and job titles. LinkedIn specifically addresses the incident in their post on An update on report of scraped data.
125698496
Type of data leaked
Education levels, Email addresses, Genders, Geographic locations, Job titles, Names, Social media profiles
Source
3. LinkedIn breach on 2012-05-05
Description
Records affected
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.
164611595
Type of data leaked
Email addresses, Passwords
Source
Last verified
2024-01-22 12:15:04 UTC