Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
930,526,448 RECORDS BREACHED
(Please see explanation about this total.)
from 4,427 DATA BREACHES made public since 2005

Save or Print PDF of Entire Breach List including introduction.Save or Print a PDF of Entire Breach List (including introductory FAQ)

Filter breach list before saving or printing PDF. Conduct a search of the Chronology using its sorting features, and Save or Print a PDF of your search results (Select filters)

If you do not have access to PDF, you can print the Chronology in landscape view.

Date Made Public Name Entity Type
July 18, 2012 ITWallStreet.ccom
New York, New York
BSO HACK

50,000 (No SSNs or financial information reported)

A hacker may have accessed as many as 12 data files containing detailed information on IT professionals searching for work with Wall Street.  First and last names, mailing addresses, email addresses, usernames, hashed passwords, and phone numbers were posted online.  Many of the passwords were decrypted and displayed in plain-text. Past salaries, salary expectations, contact information for references, and other types of job search information were also exposed.

 
Information Source:
Media
records from this breach used in our total: 0

July 17, 2012 Dropbox
San Francisco, California
BSR UNKN

Unknown

Dropbox users began receiving spam from email sources posing as Dropbox.  Many users claim that Dropbox must have suffered a breach because email addresses they used specifically and solely for Dropbox were compromised.

UPDATE (07/20/2012): Dropbox investigated customer concerns of a data breach but could not find any evidence of an unauthorized intrusion or activity as of July 20.

UPDATE (07/31/2012): Dropbox has confirmed that some accounts were accessed by hackers. One of the compromised accounts was that of a Dropbox employee.  The employee's account contained a project document of user email addresses.  Dropbox required some users to change their passwords and increased their security by adding a two-factor authentication system, new automated mechanisms to help identify suspicious activity, and a page that allows users to monitor active logins to their accounts.

 
Information Source:
Media
records from this breach used in our total: 0

July 13, 2012 Nvidia
Santa Clara, California
BSR HACK

400,000 (No SSNs or financial information reported)

A security breach affected Nvidia's developer forums. Hashed passwords and other sensitive information may have been obtained.  Public information such as birthdays, gender, and location may have been exposed. People who used the forums were given temporary passwords and instructed to choose a new forum password.

UPDATE (07/13/2012): A Nvidia representative said that its forum has 290,000 registered accounts, its DevZone site has 100,000 accounts, and its research site has 1,200 accounts.

 
Information Source:
Media
records from this breach used in our total: 0

July 23, 2012 Gamigo
Hamburg,
BSR HACK

3 million American accounts (No SSNs or financial information reported)

Hackers were able to access Gamigo's server in February of 2012.  Notification of the breach was sent on March 1.  Gamigo warned users and advised that they change any passwords for emails associated with Gamigo.  The hacked information was released on July 6.  A total of 8,243,809 user email addresses and encrypted passwords were posted online. 

 
Information Source:
Media
records from this breach used in our total: 0

July 20, 2012 Mission Linen Supply
Santa Barbara, California
BSR HACK

Unknown

A customer notified Mission Linen Supply of unauthorized charges on the credit cards of several other customers.  Mission Linen Supply discovered that the third party vendor who stores and maintains purchase information for their web stores had a data breach.  The unnamed vendor experienced an unauthorized access of their file servers.  Customers who made online purchases may have had their credit or debit card numbers, expiration dates, and possibly name and other payment card information compromised. The customer contacted Mission Linen Supply on June 29, but it is unclear when the vendor experienced the data breach.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

July 26, 2012 Petco Animal Supplies, Inc.
Chanhassen, Minnesota
BSR PORT

Unknown

Five laptops were stolen from an unnamed auditor of Petco's 401(k) Plan between May 18 and May 20.  The auditor informed Petco on July3.  Current and former employee names, Social Security numbers, and other 401(k) account information may have been exposed. Anyone who was issued a Petco paycheck in 2010, had a 401(k) account and received a distribution, or had a fee deducted from their account in 2011 may have been affected.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

July 27, 2012 Northwestern Memorial Hospital Home Hospice
Chicago, Illinois
MED PORT

Unknown

Those with questions may call (855) 755-8480 and use the reference number 6963071312.

A June 11 office burglary resulted in the theft of six laptops and a tablet. One or more of the computer devices included the personal health information of current and former Home Health patients.  Information included names, Social Security numbers, addresses, dates of birth, demographics, patient medical treatment profiles, diagnoses, symptoms, medications, treatment notes, and health insurance information.  The standard laptop security controls had been temporarily suspended on the devices since they were undergoing a software upgrade. 

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 27, 2012 Upper Valley Medical Center, Data Image
Troy, Ohio
MED UNKN

15,000 (No SSNs or financial information reported)

A data breach of Data Image's online billing system may have exposed the private information of Upper Valley Medical Center patients.  Names, addresses, hospital account numbers, and balances owed could have been obtained during an 18-month period.  Current and former patients were notified that the breach was discovered on March 21, 2012, but could have occurred as early as October 1, 2010.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 27, 2012 Upper Valley Medical Center
Troy, Ohio
MED PORT

Unknown

The May 16 office theft of a hard drive resulted in the exposure of patient information.  The theft was discovered the next day and a suspect was caught on tape.  Upper Valley Medical Center does not believe any patient information was contained on the hard drive.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Office of Dr. Luz Colon, DPM Podiatry
Miami, Florida
MED PORT

1,137 (No SSNs or financial information reported)

The theft or loss of a laptop or laptops resulted in the exposure of protected health information.  The data breach occurred sometime around March 20, 2012, and was reported on July 3, 2012.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Independence Physical Therapy
Mystic, Connecticut
MED STAT

925 (No SSNs or financial information reported)

A desktop computer was stolen or discovered stolen on August 1, 2011.  It contained protected health information.  The incident was disclosed on July 3.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Titus Regional Medical Center (TRMC)
Mount Pleasant, Texas
MED PHYS

Unknown

The March 29 theft of an unknown number of x-ray films resulted in the exposure of protected health information.  Thieves were able to access the secured storage location that contained the old x-ray films.  These thefts usually occur for the purpose of extracting valuable precious metals from the films by destroying them.  Most of the information on the films was more than five years old.  It is unclear what type of patient information the x-ray films contained, but they did not include Social Security numbers. Notice of the breach was given on May 24.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 West Dermatology
Redlands, California
MED UNKN

1,900 (No SSNs or financial information reported)

A theft that occurred sometime around April 22, 2012 resulted in the exposure of protected health information.  The breach was posted on the HHS website on July 3.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Physician's Automated Laboratory
Bakersfield, California
MED PHYS

745 (No SSNs or financial information reported)

An office burglary was discovered on March 26.  The theft of lab requisition forms that were kept in a locked cabinet resulted in the exposure of information of patients who received laboratory services between February 1 and March 23.  Patient names, addresses, phone numbers, dates of birth, insurance information, ordering practitioner's name, and types of laboratory tests ordered may have been accessed. 

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Volunteer State Health Plan, Inc. (VSHP), Comprehensive Counseling Network
Chattanooga, Tennessee
MED PHYS

1,102 (No SSNs or financial information reported)

Envelopes containing BlueCare member protected health information were damaged while being sent to Comprehensive Counseling Network.  Lists of claims containing patient protected health information became separated from the envelopes and were lost. Patient names, BlueCare ID numbers, dates of services, procedure codes, claim numbers, totals charged, amounts paid, provider names and provider addresses may have been exposed.  The envelopes also contained check to pay for medical visits that were listed on the claims, but the checks were not lost.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 31, 2012 Massachusetts Mutual Life Insurance Company (MassMutual)
Springfield, Massachusetts
BSF HACK

Unknown

On July 13, MassMutual inadvertently sent a report via secure email that included client information to an incorrect retirement Plan Sponsor.  Client names, Social Security numbers, and 401(k) balance information were exposed.  The individual who received the plan information informed MassMutual of the error immediately and claimed to have deleted the information without storing or printing it.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 1, 2012 Tarleton State University
Stephenville, Texas
EDU PHYS

Unknown

Financial aid documents with student information were found scattered in the street.  It is unclear how the documents got there.  Hundreds of current and former students who applied for or received financial aid during 1997 and 1998 may have had their Social Security numbers, dates of birth, federal Pell grant disbursements, and other personal information exposed.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 1, 2012 Office of the Circuit Clerk of Madison County, Illinois
Edwardsville, Illinois
GOV PHYS

Unknown

Sensitive court documents remained in a recycling dumpster for two weeks because of a missed scheduled pick-up.  The court respondent documents included Social Security numbers, dates of birth, addresses, telephone numbers, and detailed accounts of why an order of protection was needed.  They were removed upon discovery. Some files were from 2007, though the exact group of people who may have been affected is unclear.  The information was from closed cases and could be found in the public record.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 3, 2012 Stanford University Medical Center, Stanford Hospital and Clinics, Stanford School of Medicine
Stanford, California
MED STAT

2,500 (Unknown number of SSNs)

Those with questions may call 855-731-6016.

A burglary sometime around July 15 resulted in the theft of a computer from a Stanford faculty member's locked office.The computer contained patient information. No medical records or health histories were stored on the computer, but it may have held the Social security numbers of some patients.  The computer was outfitted with security software that would detect when and where the computer connected to the internet.

UPDATE (08/13/2012): The stolen computer was also password-protected. It may have contained medical record numbers, dates of service, and the names of providers and clinics relating to care provided at Stanford Hospital and Clinics or research conducted by the Stanford School of Medicine.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 Wolf & Yun
Elizabethtown, Kentucky
MED PORT

824 (No SSNs or financial information reported)

The April 24 office theft of a laptop resulted in the exposure of patient information.  The laptop contained names, dates of birth, and auditory testing data.  A public notice was posted on July 20.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 Office of Dr. Sharon L. Rogers
Corpus Christi, Texas
MED PORT

585 (No SSNs or financial information reported)

The June 16 theft of a laptop may have resulted in the exposure of protected health information from psychology patients.  The incident was reported on the HHS website on July 27, 2012.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 University of Kentucky HealthCare
Lexington, Kentucky
MED PORT

4,490 (No SSNs or financial information reported)

Those with questions may call either 859-323-6044 or 1-877-528-3970 or email privacy@uky.edu.

The May first theft of an employee's password-protected laptop resulted in the possible exposure of protected health information.  Patient medical records, reasons for visits, and dates of visits may have been exposed. A notification was placed on the UKHealthCare website on June 21.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 6, 2012 Steamboat Ski and Resort Corp.
Steamboat Springs, Colorado
BSO DISC

Unknown

A former employee received W-2 information of current and former employees.  Names, Social Security numbers, addresses, payroll information, and other W-2 information were accidentally emailed to the former employee.  The former employee immediately notified the human resources department and confirmed that the information had not been mishandled.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 6, 2010 WellPoint, Inc.
Indianapolis, Indiana
MED HACK

31,700 (No SSNs or financial information reported)

It is unclear if this incident is related to a June 2010 incident which was determined to have affected 470,000 people.

A hacking or IT incident that occurred or was discovered around November 3, 2009 resulted in the possible exposure of protected health information on a network server.  The incident was reported by HHS on August 6, 2010.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 7, 2012 California Correctional Health Care Services (CCHCS) Regional Administration
Fresno, California
MED PHYS

Unknown

A June 11 theft of materials inside of a kiosk mailbox located outside of the CCHCS Regional Administration building may have resulted in the exposure of sensitive information.  Documents that included prospective employment candidate responses to employment inquiries with personally identifiable information may have been in the mailbox.  California State Employment Application forms and applicable documents include names, Social Security numbers, driver's license numbers, residential addresses, dates of birth, telephone numbers, email addresses, employment histories, education histories, and other employment information of prospective candidates. 

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 9, 2012 CQ Roll Call, The Economist Group, Bloomberg
Washington, District Of Columbia
BSF DISC

Unknown

A group of former CQ employees were able to continue using log-ins and passwords to access sensitive information from The Economist Group after they left.  CQ Roll Call is owned by The Economist Group.  Many or all of the former CQ employees accessed the information while employed at Bloomberg.  Bloomberg has already paid an unspecified amount to The Economist Group as compensation for the unauthorized access incident or incidents.  It is not clear what type of information was exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 9, 2012 AmericInn
Medford, Wisconsin
MED INSD

Unknown

A dishonest employee faces six charges of fraudulently using a credit card and 59 counts of identity theft.  The former employee apparently used customer credit card numbers to pay tuition and insurance bills. 

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

March 29, 2012 Go-Kart Records
New York, New York
BSR HACK

227 (No SSNs or financial information reported)

A hacker or hackers accessed and published sensitive information from a Go-Kart Records database.  A total of 218 usernames, email addresses, and passwords were posted. Additionally, nine employee usernames, email addresses, and plain text passwords were posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 30, 2012 Public Broadcasting System
Arlington, Virginia
NGO HACK

1,871 (No SSNs or financial information reported)

A hacker or hackers accessed and published information from a Public Broadcasting System server or database.  A total of 1,598 press usernames, plain-text passwords, and email addresses were posted online.  Thirty-six administrator names, usernames, email addresses and passwords were also publicly posted.  Finally, 237 names, emails, passwords, and usernames from other sources were posted online.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 13, 2012 Citibank
New York, New York
BSF HACK

Unknown

An unauthorized party was able to illegally access information maintained by Citi through a source other than Citi.  The unauthorized party logged onto Citi's credit card online account access system by using passwords and user IDs.  Customer names, addresses, email addresses, account numbers, and transaction information may have been viewed.  Customers who were affected were notified, issued replacement cards, and required to create new account login credentials.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 14, 2012 Forte Interactive, Children's Service Council of Palm Beach County, Ocean Reef Community Association
West Palm Beach, Florida
BSO DISC

Unknown

Information Forte Interactive inadvertently copied from web applications used by Children's Service Council and Ocean Reef Community accidentally became publicly accessible after a system upgrade.  Names, Social Security numbers, driver's license numbers, and dates of birth of individuals whose information was contained in the web portal or web portals was publicly accessible between December 7, 2011 and February 3, 2012. The issue was discovered on January 30, 2012.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 1, 2012 Queens College
New York, New York
EDU HACK

15 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  A total of 15 administrator user names and encrypted passwords were exposed.  Three email addresses were also posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 9, 2012 Blizzard Entertainment
Irvine, California
BSO HACK

Unknown

There is an official Battle.net FAQ page here: http://us.battle.net/support/en/article/important-security-update-faq

Blizzard's security team found an unauthorized party or parties had accessed the Blizzard internal network.  Blizzard immediately addressed the security issue and found no evidence that credit card, billing address, or name information had been accessed. Players using North American servers may have had scrambled versions of Battle.net passwords, answers to personal security questions, and information relating to Mobile and Dial-In Authenticators accessed.  Users are encouraged to change their passwords immediately and to change the passwords of other accounts if they are similar to the compromised Battle.net passwords.  A list of email addresses for global Battle.net users outside of China was also accessed.

UPDATE (11/12/2012): Two people have filed a suit alleging that Blizzard's $6.50 protection charge is inadequate and that Blizzard did not take the necessary measures required to secure the private information of customers that was stored online. The lawsuit also alleges that Blizzard continues to fail to disclose to consumers that additional security products must be acquired after buying games in order to ensure that information stored in online accounts is secured.

UPDATE (07/11/2013): The U.S. District Court for the Central District of California dismissed most of the claims that were brought against Blizzard Entertainment.

UPDATE (08/23/2013): At least six out of eight claims from the lawsuit against Blizzard have been dismissed.  Blizzard still faces litigation for failing to fully disclose the importance of an authenticator to users.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 1, 2012 Marquette University
Milwaukee, Wisconsin
EDU HACK

15 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive Marquette University information online.  Fifteen names, addresses, email addresses, and passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 3, 2012 Miami Northwestern Senior High School
Miami, Florida
EDU PHYS

Unknown

A group of volunteers discovered school materials inside of a public dumpster.  There were folders containing sensitive student records among textbooks, novels, and workbooks. The folders contained student Social Security numbers, health records, grade reports, and student education forms.  An administrative error meant that custodians discarded obsolete materials that had been stored.  The items should have been delivered to the district's central warehouse or sold to used-book dealers. The items were recovered and transmitted to the correct locations.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 10, 2012 Phandroid, Androidforums.com
Inverness, Florida
BSO HACK

Unknown

Phandroid user account details were accessed and posted online by a hacker or hackers.  Hackers breached a back end database that powers Androidforums.com.  Androidforum usernames, email addresses, hashed passwords, member IP addresses, forum group memberships, and other data may have been accessed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 15, 2012 High Tech Crime Solutions
Atlanta, Georgia
BSO HACK

32,000 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from High Tech Crime Solutions Inc.'s website by using an SQL injection cyber attack.  A total of 8,900 names and phone numbers were posted online.  Over 32,000 private messages were also exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 9, 2012 Acronis
Woburn, Massachusetts
BSR DISC

Unknown

A technical error caused a spreadsheet containing an unspecified number of email addresses and upgrade serial numbers to be indexed by search engines.  The email addresses from the spreadsheet were not accompanied with any personal information.  The spreadsheet was downloaded by 14 different IP addresses and the owners of those IP addresses were contacted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 20, 2012 Oregonwine.com
Portland, Oregon
BSR HACK

1,313 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  A total of 1,313 user names and passwords were posted publicly.  The account details and name of one administrator were also posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 14, 2012 First Republic Bank
San Francisco, California
BSF PHYS

Unknown

Sensitive information that may have been in the form of paper records was improperly disposed of on August 2.  Client names, account types, account numbers, tax payer identification numbers, and Social Security numbers may have been exposed.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

April 16, 2012 Kindred Transitional Care and Rehabilitation-Highgate
Dedham, Massachusetts
MED PHYS

Unknown

Patients may call 800-545-0749.

An office burglary resulted in the theft of a safe on January 26.  The safe contained unencrypted backup tapes that require specialized software and equipment to read.  The tapes contained patient names, dates of birth, genders, diagnoses, and progress notes.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 17, 2012 University of Texas M.D. Anderson Cancer Center (M.D. Anderson)
Houston, Texas
MED PORT

2,200 (No SSNs or financial information reported)

An unencrypted flash drive was discovered missing.  It had last been seen on an employee shuttle bus on July 13.  It contained patient names, dates of birth, medical record number, diagnoses and treatment information, and research information.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

June 16, 2012 U.S. Department of the Interior National Business Center
Denver, Colorado
GOV PORT

7,500 (No SSNs or financial information reported)

A compact disc was discovered missing on or around May 26.  It had been sent to the National Business Center in Denver, but may not have arrived. The data on the CD was encrypted and password-protected.  Unspecified types of personal information may have been exposed.

 
Information Source:
Media
records from this breach used in our total: 0

July 30, 2012 Neurocare, Inc.
Newton, Massachusetts
MED HACK

Unknown

A malware attack on a Neurocare CPU resulted in unauthorized intrusion into Neurocare's computer systems.  The attack compromised Neurocare's credentials for accessing a third party paryoll processor.  Unauthorized access to Neurocare's payroll system occurred sometime around June 26, but Neurocare's payroll processor immediately noticed the suspicious account activity and addressed the issue.  Neurocare was notified and immediately changed system passwords, sent notifications, and began investigations. A total of 19 employees had their personal information accessed, but all Neurocare employees may have been affected.

 
Information Source:
Media
records from this breach used in our total: 0

August 17, 2012 Discover Financial Services
Riverwoods, Illinois
BSF UNKN

Unknown

An unspecified number of Discover customers had their account numbers changed and were issued a new card.  It is unclear what type of security breach prompted the notification and when it may have occurred. Several customers in California received the notification letter; residents of other states may have been notified as well.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 13, 2012 Office of Peggy Garland-Coleman
Spartanburg, South Carolina
BSF PHYS

Unknown

The owner of a tax preparation business that closed three years ago accidentally discarded several boxes of sensitive records.  The records had been picked over before tossed, but sensitive information still ended up in a public dumpster.  A concerned citizen found them in a recycling bin in an old supermarket lot.  Names, Social Security numbers, dates of birth, and invoices were exposed.

 
Information Source:
NAID
records from this breach used in our total: 0

August 20, 2012 U.S. District Court, Los Angeles California
Los Angeles, California
GOV INSD

Unknown

A Los Angeles federal court clerk was identified as the source of leaked confidential information.  The clerk was married to a convicted felon who then sold the information from sealed criminal case documents to an identity theft ring.  The federal court clerk, her husband, and at least 60 others from the theft ring were caught by an FBI investigation.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

March 9, 2012 Kelly Services
Troy, Michigan
BSO INSD

Unknown

People who signed up for employment through the Kelly Services staffing agency may have had their personal information retained by a former Kelly Services employee.  Kelly Services retrieved all of the sensitive information from the former employee upon learning of the breach.  Names and Social Security numbers may have been exposed.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 23, 2012 Suddenlink Communications, AAT Communications
Overland Park, Kansas
BSO INSD

Unknown

On February 24, 2012, law enforcement notified Suddenlink management of an incident involving a former employee.  The employee had obtained the personal information of individuals who worked at Suddenlink and AAT Communications between May 22, 2006 and July 21, 2006.  Names, Social Security numbers, addresses, dates of birth, wage information, and banking information may have been exposed.  The former employee was using the information for fraudulent purposes and an investigation uncovered isolated instances of information misuse between 2006 and 2012.  The former employee was arrested.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 27, 2012 WorldPass
El Dorado Hills, California
BSR HACK

Unknown

A hacker or hackers accessed WorldPass' online database in early July of 2010 and was not detected until March 5, 2012.  The hacker may have obtained the credit card numbers, user names, email addresses, billing addresses, and payment information of customers.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

Breach Total
930,526,448 RECORDS BREACHED
(Please see explanation about this total.)
from 4,427 DATA BREACHES made public since 2005
Showing 3601-3650 of 4427 results


X

Sign In!

Loading