Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
931,357,921 RECORDS BREACHED
(Please see explanation about this total.)
from 4,447 DATA BREACHES made public since 2005

Save or Print PDF of Entire Breach List including introduction.Save or Print a PDF of Entire Breach List (including introductory FAQ)

Filter breach list before saving or printing PDF. Conduct a search of the Chronology using its sorting features, and Save or Print a PDF of your search results (Select filters)

If you do not have access to PDF, you can print the Chronology in landscape view.

Date Made Public Name Entity Type
July 14, 2012 Orcutt Burger Restaurant
Orcutt, California
BSR CARD

Unknown

People who used debit cards to make purchases at Orcutt Burgers may have had their information stolen.  Coast Hills Federal Credit Union sent out an alert to clients and reissued an unspecified number of debit cards.  It is unclear how the debit card data was accessed and how long the information was at risk.  It is also unclear if credit cards were also compromised.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

July 11, 2012 Formspring
San Francisco, California
BSO HACK

420,000 (No SSNs or financial information revealed)

A hacker or hackers accessed Formspring's development server and posted the password hashes of 420,000 users online.  Formspring immediately reset all 28 million user passwords and addressed the security issues upon confirming that a breach had occurred.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

July 12, 2012 Yahoo! Voices
Sunnyvale, California
BSO HACK

453,492 (No SSNs or financial information reported)

A hacker or hackers used an SQL injection technique to access the plain-text passwords of over 450,000 Yahoo! Voices (formerly known as Associated Content) users.  The information was then posted online.  Yahoo! Voice users are encouraged to change their Yahoo! passwords immediately. Users from as far back as 2006 or earlier may have had their passwords exposed.

UPDATE (08/02/2012): A Yahoo! user is suing Yahoo! Inc. for negligence.  The user claims that Yahoo!'s failure to adequately safeguard his personal information should result in compensation for himself and other users who experienced account fraud and had to take measures to protect accounts put at risk by the Yahoo! breach.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

July 20, 2012 Israel Deaconess Medical Center
Boston, Massachusetts
MED PORT

3,900 (No SSNs or financial information involved)

The May 22 office theft of a physician's laptop resulted in the exposure of patient information. It is unclear what type of information was on the laptop, but the chief information officer said that "nothing that would be used from an identity theft perspective" was on the laptop.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 19, 2012 Yale University
New Haven, Connecticut
EDU HACK

1,200 (Unknown number of SSNs)

Hackers accessed at least one Yale database and obtained the details of 1,200 students and staff.  Hackers may have obtained names, Social Security numbers, addresses, and phone numbers. Additionally, usernames, passwords, and email addresses were published as proof of the hack.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

July 18, 2012 ITWallStreet.ccom
New York, New York
BSO HACK

50,000 (No SSNs or financial information reported)

A hacker may have accessed as many as 12 data files containing detailed information on IT professionals searching for work with Wall Street.  First and last names, mailing addresses, email addresses, usernames, hashed passwords, and phone numbers were posted online.  Many of the passwords were decrypted and displayed in plain-text. Past salaries, salary expectations, contact information for references, and other types of job search information were also exposed.

 
Information Source:
Media
records from this breach used in our total: 0

July 17, 2012 Dropbox
San Francisco, California
BSR UNKN

Unknown

Dropbox users began receiving spam from email sources posing as Dropbox.  Many users claim that Dropbox must have suffered a breach because email addresses they used specifically and solely for Dropbox were compromised.

UPDATE (07/20/2012): Dropbox investigated customer concerns of a data breach but could not find any evidence of an unauthorized intrusion or activity as of July 20.

UPDATE (07/31/2012): Dropbox has confirmed that some accounts were accessed by hackers. One of the compromised accounts was that of a Dropbox employee.  The employee's account contained a project document of user email addresses.  Dropbox required some users to change their passwords and increased their security by adding a two-factor authentication system, new automated mechanisms to help identify suspicious activity, and a page that allows users to monitor active logins to their accounts.

 
Information Source:
Media
records from this breach used in our total: 0

July 13, 2012 Nvidia
Santa Clara, California
BSR HACK

400,000 (No SSNs or financial information reported)

A security breach affected Nvidia's developer forums. Hashed passwords and other sensitive information may have been obtained.  Public information such as birthdays, gender, and location may have been exposed. People who used the forums were given temporary passwords and instructed to choose a new forum password.

UPDATE (07/13/2012): A Nvidia representative said that its forum has 290,000 registered accounts, its DevZone site has 100,000 accounts, and its research site has 1,200 accounts.

 
Information Source:
Media
records from this breach used in our total: 0

July 23, 2012 Gamigo
Hamburg,
BSR HACK

3 million American accounts (No SSNs or financial information reported)

Hackers were able to access Gamigo's server in February of 2012.  Notification of the breach was sent on March 1.  Gamigo warned users and advised that they change any passwords for emails associated with Gamigo.  The hacked information was released on July 6.  A total of 8,243,809 user email addresses and encrypted passwords were posted online. 

 
Information Source:
Media
records from this breach used in our total: 0

July 20, 2012 Mission Linen Supply
Santa Barbara, California
BSR HACK

Unknown

A customer notified Mission Linen Supply of unauthorized charges on the credit cards of several other customers.  Mission Linen Supply discovered that the third party vendor who stores and maintains purchase information for their web stores had a data breach.  The unnamed vendor experienced an unauthorized access of their file servers.  Customers who made online purchases may have had their credit or debit card numbers, expiration dates, and possibly name and other payment card information compromised. The customer contacted Mission Linen Supply on June 29, but it is unclear when the vendor experienced the data breach.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

July 26, 2012 Petco Animal Supplies, Inc.
Chanhassen, Minnesota
BSR PORT

Unknown

Five laptops were stolen from an unnamed auditor of Petco's 401(k) Plan between May 18 and May 20.  The auditor informed Petco on July3.  Current and former employee names, Social Security numbers, and other 401(k) account information may have been exposed. Anyone who was issued a Petco paycheck in 2010, had a 401(k) account and received a distribution, or had a fee deducted from their account in 2011 may have been affected.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

July 27, 2012 Northwestern Memorial Hospital Home Hospice
Chicago, Illinois
MED PORT

Unknown

Those with questions may call (855) 755-8480 and use the reference number 6963071312.

A June 11 office burglary resulted in the theft of six laptops and a tablet. One or more of the computer devices included the personal health information of current and former Home Health patients.  Information included names, Social Security numbers, addresses, dates of birth, demographics, patient medical treatment profiles, diagnoses, symptoms, medications, treatment notes, and health insurance information.  The standard laptop security controls had been temporarily suspended on the devices since they were undergoing a software upgrade. 

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 27, 2012 Upper Valley Medical Center, Data Image
Troy, Ohio
MED UNKN

15,000 (No SSNs or financial information reported)

A data breach of Data Image's online billing system may have exposed the private information of Upper Valley Medical Center patients.  Names, addresses, hospital account numbers, and balances owed could have been obtained during an 18-month period.  Current and former patients were notified that the breach was discovered on March 21, 2012, but could have occurred as early as October 1, 2010.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 27, 2012 Upper Valley Medical Center
Troy, Ohio
MED PORT

Unknown

The May 16 office theft of a hard drive resulted in the exposure of patient information.  The theft was discovered the next day and a suspect was caught on tape.  Upper Valley Medical Center does not believe any patient information was contained on the hard drive.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Office of Dr. Luz Colon, DPM Podiatry
Miami, Florida
MED PORT

1,137 (No SSNs or financial information reported)

The theft or loss of a laptop or laptops resulted in the exposure of protected health information.  The data breach occurred sometime around March 20, 2012, and was reported on July 3, 2012.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Independence Physical Therapy
Mystic, Connecticut
MED STAT

925 (No SSNs or financial information reported)

A desktop computer was stolen or discovered stolen on August 1, 2011.  It contained protected health information.  The incident was disclosed on July 3.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Titus Regional Medical Center (TRMC)
Mount Pleasant, Texas
MED PHYS

Unknown

The March 29 theft of an unknown number of x-ray films resulted in the exposure of protected health information.  Thieves were able to access the secured storage location that contained the old x-ray films.  These thefts usually occur for the purpose of extracting valuable precious metals from the films by destroying them.  Most of the information on the films was more than five years old.  It is unclear what type of patient information the x-ray films contained, but they did not include Social Security numbers. Notice of the breach was given on May 24.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 West Dermatology
Redlands, California
MED UNKN

1,900 (No SSNs or financial information reported)

A theft that occurred sometime around April 22, 2012 resulted in the exposure of protected health information.  The breach was posted on the HHS website on July 3.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Physician's Automated Laboratory
Bakersfield, California
MED PHYS

745 (No SSNs or financial information reported)

An office burglary was discovered on March 26.  The theft of lab requisition forms that were kept in a locked cabinet resulted in the exposure of information of patients who received laboratory services between February 1 and March 23.  Patient names, addresses, phone numbers, dates of birth, insurance information, ordering practitioner's name, and types of laboratory tests ordered may have been accessed. 

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 23, 2012 Volunteer State Health Plan, Inc. (VSHP), Comprehensive Counseling Network
Chattanooga, Tennessee
MED PHYS

1,102 (No SSNs or financial information reported)

Envelopes containing BlueCare member protected health information were damaged while being sent to Comprehensive Counseling Network.  Lists of claims containing patient protected health information became separated from the envelopes and were lost. Patient names, BlueCare ID numbers, dates of services, procedure codes, claim numbers, totals charged, amounts paid, provider names and provider addresses may have been exposed.  The envelopes also contained check to pay for medical visits that were listed on the claims, but the checks were not lost.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

July 31, 2012 Massachusetts Mutual Life Insurance Company (MassMutual)
Springfield, Massachusetts
BSF HACK

Unknown

On July 13, MassMutual inadvertently sent a report via secure email that included client information to an incorrect retirement Plan Sponsor.  Client names, Social Security numbers, and 401(k) balance information were exposed.  The individual who received the plan information informed MassMutual of the error immediately and claimed to have deleted the information without storing or printing it.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 1, 2012 Tarleton State University
Stephenville, Texas
EDU PHYS

Unknown

Financial aid documents with student information were found scattered in the street.  It is unclear how the documents got there.  Hundreds of current and former students who applied for or received financial aid during 1997 and 1998 may have had their Social Security numbers, dates of birth, federal Pell grant disbursements, and other personal information exposed.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 1, 2012 Office of the Circuit Clerk of Madison County, Illinois
Edwardsville, Illinois
GOV PHYS

Unknown

Sensitive court documents remained in a recycling dumpster for two weeks because of a missed scheduled pick-up.  The court respondent documents included Social Security numbers, dates of birth, addresses, telephone numbers, and detailed accounts of why an order of protection was needed.  They were removed upon discovery. Some files were from 2007, though the exact group of people who may have been affected is unclear.  The information was from closed cases and could be found in the public record.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 3, 2012 Stanford University Medical Center, Stanford Hospital and Clinics, Stanford School of Medicine
Stanford, California
MED STAT

2,500 (Unknown number of SSNs)

Those with questions may call 855-731-6016.

A burglary sometime around July 15 resulted in the theft of a computer from a Stanford faculty member's locked office.The computer contained patient information. No medical records or health histories were stored on the computer, but it may have held the Social security numbers of some patients.  The computer was outfitted with security software that would detect when and where the computer connected to the internet.

UPDATE (08/13/2012): The stolen computer was also password-protected. It may have contained medical record numbers, dates of service, and the names of providers and clinics relating to care provided at Stanford Hospital and Clinics or research conducted by the Stanford School of Medicine.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 Wolf & Yun
Elizabethtown, Kentucky
MED PORT

824 (No SSNs or financial information reported)

The April 24 office theft of a laptop resulted in the exposure of patient information.  The laptop contained names, dates of birth, and auditory testing data.  A public notice was posted on July 20.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 Office of Dr. Sharon L. Rogers
Corpus Christi, Texas
MED PORT

585 (No SSNs or financial information reported)

The June 16 theft of a laptop may have resulted in the exposure of protected health information from psychology patients.  The incident was reported on the HHS website on July 27, 2012.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 University of Kentucky HealthCare
Lexington, Kentucky
MED PORT

4,490 (No SSNs or financial information reported)

Those with questions may call either 859-323-6044 or 1-877-528-3970 or email privacy@uky.edu.

The May first theft of an employee's password-protected laptop resulted in the possible exposure of protected health information.  Patient medical records, reasons for visits, and dates of visits may have been exposed. A notification was placed on the UKHealthCare website on June 21.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 6, 2012 Steamboat Ski and Resort Corp.
Steamboat Springs, Colorado
BSO DISC

Unknown

A former employee received W-2 information of current and former employees.  Names, Social Security numbers, addresses, payroll information, and other W-2 information were accidentally emailed to the former employee.  The former employee immediately notified the human resources department and confirmed that the information had not been mishandled.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 6, 2010 WellPoint, Inc.
Indianapolis, Indiana
MED HACK

31,700 (No SSNs or financial information reported)

It is unclear if this incident is related to a June 2010 incident which was determined to have affected 470,000 people.

A hacking or IT incident that occurred or was discovered around November 3, 2009 resulted in the possible exposure of protected health information on a network server.  The incident was reported by HHS on August 6, 2010.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

August 7, 2012 California Correctional Health Care Services (CCHCS) Regional Administration
Fresno, California
MED PHYS

Unknown

A June 11 theft of materials inside of a kiosk mailbox located outside of the CCHCS Regional Administration building may have resulted in the exposure of sensitive information.  Documents that included prospective employment candidate responses to employment inquiries with personally identifiable information may have been in the mailbox.  California State Employment Application forms and applicable documents include names, Social Security numbers, driver's license numbers, residential addresses, dates of birth, telephone numbers, email addresses, employment histories, education histories, and other employment information of prospective candidates. 

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 9, 2012 CQ Roll Call, The Economist Group, Bloomberg
Washington, District Of Columbia
BSF DISC

Unknown

A group of former CQ employees were able to continue using log-ins and passwords to access sensitive information from The Economist Group after they left.  CQ Roll Call is owned by The Economist Group.  Many or all of the former CQ employees accessed the information while employed at Bloomberg.  Bloomberg has already paid an unspecified amount to The Economist Group as compensation for the unauthorized access incident or incidents.  It is not clear what type of information was exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 9, 2012 AmericInn
Medford, Wisconsin
MED INSD

Unknown

A dishonest employee faces six charges of fraudulently using a credit card and 59 counts of identity theft.  The former employee apparently used customer credit card numbers to pay tuition and insurance bills. 

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

March 29, 2012 Go-Kart Records
New York, New York
BSR HACK

227 (No SSNs or financial information reported)

A hacker or hackers accessed and published sensitive information from a Go-Kart Records database.  A total of 218 usernames, email addresses, and passwords were posted. Additionally, nine employee usernames, email addresses, and plain text passwords were posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 30, 2012 Public Broadcasting System
Arlington, Virginia
NGO HACK

1,871 (No SSNs or financial information reported)

A hacker or hackers accessed and published information from a Public Broadcasting System server or database.  A total of 1,598 press usernames, plain-text passwords, and email addresses were posted online.  Thirty-six administrator names, usernames, email addresses and passwords were also publicly posted.  Finally, 237 names, emails, passwords, and usernames from other sources were posted online.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 13, 2012 Citibank
New York, New York
BSF HACK

Unknown

An unauthorized party was able to illegally access information maintained by Citi through a source other than Citi.  The unauthorized party logged onto Citi's credit card online account access system by using passwords and user IDs.  Customer names, addresses, email addresses, account numbers, and transaction information may have been viewed.  Customers who were affected were notified, issued replacement cards, and required to create new account login credentials.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

March 14, 2012 Forte Interactive, Children's Service Council of Palm Beach County, Ocean Reef Community Association
West Palm Beach, Florida
BSO DISC

Unknown

Information Forte Interactive inadvertently copied from web applications used by Children's Service Council and Ocean Reef Community accidentally became publicly accessible after a system upgrade.  Names, Social Security numbers, driver's license numbers, and dates of birth of individuals whose information was contained in the web portal or web portals was publicly accessible between December 7, 2011 and February 3, 2012. The issue was discovered on January 30, 2012.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 1, 2012 Queens College
New York, New York
EDU HACK

15 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  A total of 15 administrator user names and encrypted passwords were exposed.  Three email addresses were also posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 9, 2012 Blizzard Entertainment
Irvine, California
BSO HACK

Unknown

There is an official Battle.net FAQ page here: http://us.battle.net/support/en/article/important-security-update-faq

Blizzard's security team found an unauthorized party or parties had accessed the Blizzard internal network.  Blizzard immediately addressed the security issue and found no evidence that credit card, billing address, or name information had been accessed. Players using North American servers may have had scrambled versions of Battle.net passwords, answers to personal security questions, and information relating to Mobile and Dial-In Authenticators accessed.  Users are encouraged to change their passwords immediately and to change the passwords of other accounts if they are similar to the compromised Battle.net passwords.  A list of email addresses for global Battle.net users outside of China was also accessed.

UPDATE (11/12/2012): Two people have filed a suit alleging that Blizzard's $6.50 protection charge is inadequate and that Blizzard did not take the necessary measures required to secure the private information of customers that was stored online. The lawsuit also alleges that Blizzard continues to fail to disclose to consumers that additional security products must be acquired after buying games in order to ensure that information stored in online accounts is secured.

UPDATE (07/11/2013): The U.S. District Court for the Central District of California dismissed most of the claims that were brought against Blizzard Entertainment.

UPDATE (08/23/2013): At least six out of eight claims from the lawsuit against Blizzard have been dismissed.  Blizzard still faces litigation for failing to fully disclose the importance of an authenticator to users.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 1, 2012 Marquette University
Milwaukee, Wisconsin
EDU HACK

15 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive Marquette University information online.  Fifteen names, addresses, email addresses, and passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 3, 2012 Miami Northwestern Senior High School
Miami, Florida
EDU PHYS

Unknown

A group of volunteers discovered school materials inside of a public dumpster.  There were folders containing sensitive student records among textbooks, novels, and workbooks. The folders contained student Social Security numbers, health records, grade reports, and student education forms.  An administrative error meant that custodians discarded obsolete materials that had been stored.  The items should have been delivered to the district's central warehouse or sold to used-book dealers. The items were recovered and transmitted to the correct locations.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 10, 2012 Phandroid, Androidforums.com
Inverness, Florida
BSO HACK

Unknown

Phandroid user account details were accessed and posted online by a hacker or hackers.  Hackers breached a back end database that powers Androidforums.com.  Androidforum usernames, email addresses, hashed passwords, member IP addresses, forum group memberships, and other data may have been accessed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 15, 2012 High Tech Crime Solutions
Atlanta, Georgia
BSO HACK

32,000 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from High Tech Crime Solutions Inc.'s website by using an SQL injection cyber attack.  A total of 8,900 names and phone numbers were posted online.  Over 32,000 private messages were also exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 9, 2012 Acronis
Woburn, Massachusetts
BSR DISC

Unknown

A technical error caused a spreadsheet containing an unspecified number of email addresses and upgrade serial numbers to be indexed by search engines.  The email addresses from the spreadsheet were not accompanied with any personal information.  The spreadsheet was downloaded by 14 different IP addresses and the owners of those IP addresses were contacted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

July 20, 2012 Oregonwine.com
Portland, Oregon
BSR HACK

1,313 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  A total of 1,313 user names and passwords were posted publicly.  The account details and name of one administrator were also posted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 14, 2012 First Republic Bank
San Francisco, California
BSF PHYS

Unknown

Sensitive information that may have been in the form of paper records was improperly disposed of on August 2.  Client names, account types, account numbers, tax payer identification numbers, and Social Security numbers may have been exposed.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

April 16, 2012 Kindred Transitional Care and Rehabilitation-Highgate
Dedham, Massachusetts
MED PHYS

Unknown

Patients may call 800-545-0749.

An office burglary resulted in the theft of a safe on January 26.  The safe contained unencrypted backup tapes that require specialized software and equipment to read.  The tapes contained patient names, dates of birth, genders, diagnoses, and progress notes.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 17, 2012 University of Texas M.D. Anderson Cancer Center (M.D. Anderson)
Houston, Texas
MED PORT

2,200 (No SSNs or financial information reported)

An unencrypted flash drive was discovered missing.  It had last been seen on an employee shuttle bus on July 13.  It contained patient names, dates of birth, medical record number, diagnoses and treatment information, and research information.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

June 16, 2012 U.S. Department of the Interior National Business Center
Denver, Colorado
GOV PORT

7,500 (No SSNs or financial information reported)

A compact disc was discovered missing on or around May 26.  It had been sent to the National Business Center in Denver, but may not have arrived. The data on the CD was encrypted and password-protected.  Unspecified types of personal information may have been exposed.

 
Information Source:
Media
records from this breach used in our total: 0

July 30, 2012 Neurocare, Inc.
Newton, Massachusetts
MED HACK

Unknown

A malware attack on a Neurocare CPU resulted in unauthorized intrusion into Neurocare's computer systems.  The attack compromised Neurocare's credentials for accessing a third party paryoll processor.  Unauthorized access to Neurocare's payroll system occurred sometime around June 26, but Neurocare's payroll processor immediately noticed the suspicious account activity and addressed the issue.  Neurocare was notified and immediately changed system passwords, sent notifications, and began investigations. A total of 19 employees had their personal information accessed, but all Neurocare employees may have been affected.

 
Information Source:
Media
records from this breach used in our total: 0

August 17, 2012 Discover Financial Services
Riverwoods, Illinois
BSF UNKN

Unknown

An unspecified number of Discover customers had their account numbers changed and were issued a new card.  It is unclear what type of security breach prompted the notification and when it may have occurred. Several customers in California received the notification letter; residents of other states may have been notified as well.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

Breach Total
931,357,921 RECORDS BREACHED
(Please see explanation about this total.)
from 4,447 DATA BREACHES made public since 2005
Showing 3601-3650 of 4447 results


X

Sign In!

Loading