Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
868,045,823 RECORDS BREACHED
(Please see explanation about this total.)
from 4,347 DATA BREACHES made public since 2005

Save or Print PDF of Entire Breach List including introduction.Save or Print a PDF of Entire Breach List (including introductory FAQ)

Filter breach list before saving or printing PDF. Conduct a search of the Chronology using its sorting features, and Save or Print a PDF of your search results (Select filters)

If you do not have access to PDF, you can print the Chronology in landscape view.

Date Made Public Name Entity Type
October 8, 2012 Ohio State University, Harvard University, Stanford University, Cornell University, Princeton University, John Hopkins University, University of Michigan, University of Wisconsin, University of Houston, New York University, University of Maryland
,
EDU HACK

Unknown

There is no specific location for this breach.

The University of Texas, University of Colorado, University of Pennsylvania, Duke University, Rutgers University, University of Pittsburgh, University of Florida, Case Western Reserve University, Texas A&M University, Boston University, Purdue University, University of Arizona, Arizona State University, University of Utah, Ohio State College of Dentistry, and additional universities were affected.  Universities outside of the United States were also affected.

Each affected university is listed here: http://pastebin.com/AQWhu8Ek

A hacking group called Team GhostShell targeted universities around the world.  A total of 53 universities were affected.  Most of the data exposed was publicly available, but student, staff, and faculty usernames and passwords were also exposed. It is unclear if any financial information or Social Security numbers were taken from universities.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

February 14, 2012 American Stock Transfer & Trust Company, LLC, Mesa Royalty Trust
New York, New York
BSF DISC

Unknown

A mailing error caused personal information to be exposed.  Beneficiary statements containing tax information for 2011 were sent by postal mail on April 2, 2012.  The statements were mailed to incorrect addresses and exposed names, home addresses, and tax identification numbers of intended shareholders. The error was discovered on April 6.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

February 14, 2012 America Stock Transfer & Trust Company, LLC
New York, New York
BSF HACK

Unknown

Shareholder 1099 forms were sent to the wrong addresses due to a mailing error.  Names, home addresses, and tax identification numbers could have been viewed by incorrect parties.  The forms were mailed on January 17 and the error was discovered on January 18.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

February 13, 2012 #1 Chat Avenue
, Kansas
BSO HACK

39 (No SSNs or financial information reported)

No city is listed for this organization.

A hacker or hackers accessed and posted online information.  A total of 39 administrator and moderator usernames, email addresses, and salted passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

January 8, 2012 Hydrogen Software
Columbia, Montana
BSR HACK

201 (No SSNs or financial information reported)

A hacker or hackers accessed and posted online information.  A total of 201 usernames and hashed passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

January 10, 2012 B-K Lighting
Madera, California
BSO HACK

3,410 (No SSNs or financial information reported)

A hacker or hackers accessed and posted online information.  A total of 3,410 names, addresses, usernames, passwords, phone numbers, and email addresses were taken from bklighting.com and exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

January 12, 2012 FileDen
Palo Alto, California
BSO HACK

4,504 (No SSNs or financial information exposed)

A hacker or hackers accessed and posted online information from the popular file sharing website.   A total of 4,504 usernames, passwords, and email addresses were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

January 11, 2012 Virtual Jerusalem
Los Angeles, California
BSO HACK

214 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information online.  A total of 214 usernames, email addresses, and hashed passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

January 16, 2012 T-Mobile
Bellevue, Washington
BSR HACK

44 (No SSNs or financial information reported)

A hacker or hackers accessed and posted online information.  A total of 44 employee names, email addresses, phone numbers, and passwords were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

October 11, 2012 Centers for Medicare & Medicaid Services (CMS)
Baltimore, Maryland
GOV UNKN

363 (No SSNs or financial information reported)

The CMS experienced 13 breaches between September 23, 2009 and December 31, 2011.  The CMS failed to notify beneficiaries of seven of the breaches in a timely manner.  The HHS's Office of the Inspector General (OIG) also alleges that the notifications mailed to beneficiaries did not disclose what type of information had been exposed, the date the breach occurred, or how CMS was working to prevent future breaches.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

October 10, 2012 PlaySpan
Foster City, California
BSR HACK

100,000 (No SSNs or financial information exposed)

A hacker or hackers accessed PlaySpans computer system.  User IDs, encrypted passwords, and email addresses of online players were exposed.  Users are advised to immediately change their passwords and also any similar passwords for other logins associated with compromised email addresses. PlaySpan Marketplace may have also been affected and could be linked to user financial information.

 
Information Source:
Media
records from this breach used in our total: 0

October 12, 2012 Korn/Ferry International
Los Angeles, California
BSO HACK

Unknown

Those with questions may call 1-800-971-5875.

A cyber breach affected Korn/Ferry databases.  Names, Social Security numbers, driver's license numbers, government-issued identification numbers, credit card numbers, and health information may have been exposed.  The information may have been available to unauthorized parties for months before the breach was discovered in August of 2012.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 11, 2012 PST Services, Inc., Litton and Giddings Radiological Associates, P.C.
Springfield, Montana
MED PHYS

Unknown

Litton and Giddings' janitorial service, PST Services, failed to shred patient billing records before sending them to a Springfield recycling company.  The records may have been viewed by unauthorized parties before being destroyed at the recycling center.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

October 13, 2012 City of Burlington, Washington
Burlington, Washington
GOV HACK

Unknown

A hacker or hackers managed to transfer $400,000 in city funds to accounts across the country. The cyber attack occurred sometime between Tuesday night and Wednesday morning.  City employees may have also had their direct deposit bank account information compromised.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 15, 2012 District 202, Plainfield School District
Plainfield, Illinois
EDU HACK

23,000 (No SSNs or financial information exposed)

People who applied online at www.applitrack.com for a job in District 202 may have had their information accessed by a hacker.  The hacker sent messages to former and current job applicants and informed them that the Plainfield School District 202 website was breached. 

UPDATE (10/19/2012): A 14-year-old Joliet West High School student was removed from class and taken to a juvenile detention center for his alleged involvement in the breach.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 18, 2012 Southern Environmental Law Center
Charlottesville, Virginia
NGO HACK

Unknown

Sensitive information from Southern Environmental Law Center was placed online.  Credit card, medical, and donor information such as addresses, phone numbers, and client files were exposed.  The data was accessible via Google search for an unspecified amount of time.  Southern Environmental Law Center is warning people not to open emails about the security failure or click on any links in emails that appear to be from Southern Environmental Law Center.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

September 19, 2012 United States Navy, Smart Web Move
Washington, District Of Columbia
GOV HACK

200,000 (No SSNs or financial information reported)

A hacker or hackers accessed sensitive information and posted it online.  Former and current Navy personnel who used Smart Web Move to arrange household moves could have been affected.  The compromised database stored 11 years of private information, but only 20 people had their information publicly posted.  Usernames, email addresses, security questions and corresponding answers were exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

September 23, 2012 Town of Willimantic, Connecticut
Willimantic, Connecticut
GOV PORT

Unknown

An employee's laptop was stolen from his unattended office between 10 a.m. and noon on September 17.  The laptop was password-protected.  It contained the information of town employees.  Social Security and bank account numbers may have been exposed.

 
Information Source:
Media
records from this breach used in our total: 0

October 19, 2012 Valley Plastic Surgery, P.C.
harrisonburg, Virginia
MED PORT

4,873 (No SSNs or financial information reported)

The July 15 theft of an electronic device exposed patient information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

October 19, 2012 Ecco Health, LLC, Colon & Digestive Health Specialists
Scottsdale, Arizona
MED PORT

5,713 (No SSNs or financial information reported)

A vendor working with patient data for digital conversion from Colon & Digestive lost a flash drive on or around July 16.  It contained patient names, Social Security numbers, dates of birth, addresses, telephone numbers, account numbers, diagnoses, and other protected health information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

October 22, 2012 L.A. Care Health Plan
Los Angeles, California
MED PHYS

18,000 (No Social Security numbers or financial information reported)

A mailing error caused ID cards to be mailed to the wrong members.  The cards were mailed on September 17, 2012 and the problem was discovered on September 18, 2012.  Names, member ID numbers, and dates of birth were exposed.

UPDATE (05/21/2013): A total of 18,000 people were affected.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

October 22, 2012 Office of Dr. Philip P. Corneliuson
Fresno, California
MED STAT

Unknown

Those with questions may call (559) 261-0185.

An office burglary resulted in the theft of a computer.  The incident was discovered on September 15, 2012.  Patient names and Social Security numbers were on the computer.

UPDATE (10/24/2012): The computer contained medical records and insurance information.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

October 22, 2012 UPMC
Monroeville, Pennsylvania
GOV DISC

Unknown

An assistant police chief filed a complaint alleging that the chief of policed breached federal privacy law.  The complaint alleges that the chief of police received information about ambulance dispatches that was primarily intended for paramedics and other active first responders.  He also claims the chief of police forwarded the information to a third party.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

October 24, 2012 Barnes & Noble
New York, New York
BSR CARD

Unknown

Concerned customers may call 1-888-471-7809 or visit www.barnesandnobleinc.com

PIN pad devices used to process credit and debit card information in stores were compromised.  The breach was discovered around September 14 during maintenance and inspection of the devices.  Anyone who used a credit or debit card at a Barnes & Noble may have been affected by a sophisticated criminal effort to steal that information.  Names, payment card account numbers, and PINs may have been exposed.  Barnes & Noble removed all PIN pads. Fewer than 1% of the inspected PIN pads had been affected.

UPDATE (10/24/2012): A total of 63 Barnes and Noble stores in nine states had at least one compromised PIN pad device.  Malicious code was installed on the PIN pads.

UPDATE (09/05/2013): A federal judge ruled that customers failed to show that their personal information was stolen in the data breach.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

October 24, 2012 Vermont State Employee's Credit Union (VSECU)
Montplier, Vermont
BSF PORT

Unknown

Two unencrypted backup tapes were discovered missing on September 10.  They were lost sometime between August 27, and September 10.  Names, Social Security numbers, financial account information, driver's license numbers, and transaction records were exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 26, 2012 Alabama Department of Human Resources, Vinson Guard Service Inc., Jefferson Davis High School
Montgomery, Alabama
BSO UNKN

Unknown

A notice from The United States Attorney's Office Middle District of Alabama can be found here: http://www.justice.gov/usao/alm/programs/vwa/victimnotification.html

An alert stating that the United States Attorney's Office is prosecuting cases related to the theft of personal identifying information and misuse of that personal identifying information was released.  The information was stolen between January 1, 2009 and March 25, 2011.  People from various organizations may have had their information misused to prepare fraudulent tax returns.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

October 25, 2012 L&D Chinese Buffet
Butte, Montana
BSR INSD

Unknown

Two dishonest employees misused customer credit card information to make more than $26,000 in fraudulent purchases.  The two men face a maximum of 10 years in prison and a $50,000 fine for each of six counts of deceptive practices. The men were arrested on July 29.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 29, 2012 Kaiser Permanente
Oakland, California
MED DISC

Unknown

Those with questions may call 866-578-5413.

A Kaiser Permanente Northern California Region Recruitment employee mistakenly sent an email to unauthorized parties on August 24.  Former Northern California Kaiser employees who left Kaiser between 1990 and 2006 may have had their names and Social Security numbers exposed. Kaiser IT Security conducted a detailed analysis to confirm that the recipient did not forward or print the email. The analysis also revealed that the email had been deleted and could no longer be accessed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

October 22, 2012 Compete Inc
Boston, Massachusetts
BSO DISC

Unknown

Compete Inc. reached an agreement with the Federal Trade Commission regarding the collection of consumer information. Compete agreed to obtain end users' consent before collecting future online browsing data.  Compete will also delete or anonymize consumer data already collected and provide direction for removing tracking software installed on the computers of those who had their data collected.

FTC charged that Compete failed to adequately describe two products used to collect details about end users' browsing habits.  A toolbar and input panel were used to collect extensive information about consumer activities and transmit the information in clear readable text to Compete's servers.  All websites visited by, links followed by, and advertisements displayed to Compete consumers were collected and stored.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

October 24, 2012 Aultman Hospital
Canton, Ohio
MED HACK

Unknown

People who made purchases at Aultman Hospital's gift shop may call 330-363-5319.

Hardware at Aultman was discovered to have been infected by a cyber attack.  Unauthorized parties may have been able to access credit and debit card information from Aultman gift shop purchases between February and September of 2012.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

October 19, 2012 U.S. National Weather Service, Weather.gov
Silver Spring, Maryland
GOV HACK

Unknown

Hackers targeted the U.S. National Weather Service website Weather.gov in an attempt to exploit vulnerabilities in U.S. government online systems.  The hackers claim to have begun a campaign in response to U.S. cyber attacks in Muslim nations.  Partial login credentials and system and network configuration files were accessed and posted online.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

October 8, 2012 www.naperville.il.us
Naperville, Illinois
GOV HACK

Unknown

A cyber intruder injected a virus into the website of the city of Naperville.  City officials claim that no resident credit card information was compromised.  There is no evidence that any type of information was stolen from the website.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

October 30, 2012 HSBC Bank USA National Association
New York, New York
BSF INSD

Unknown

An employee resigned and left with customer account information.  Names, Account numbers, account types, and phone numbers may have been exposed.  The breach occurred in late July.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 1, 2012 Salinas Valley State Prison (SVSP)
Soledad, California
GOV DISC

Unknown

Sensitive staff information on a database file was found to have been accessible to all SVSP staff.  Staff names, Social Security numbers, phone numbers, addresses, and institutional-position information were exposed.  The breach was discovered on September 26 and it is unclear how long the information was available.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 6, 2012 Women & Infants Hospital
Providence, Rhode Island
MED PORT

14,004 (Unknown number of SSNs)

WomenandInfants.org posted a notice: http://www.womenandinfants.org/news/Confidentiality-Notice-for-Patients.cfm

Those with questions may call 1-877-810-7928.

Unencrypted backup tapes containing ultrasound images from ambulatory sites were discovered missing on September 13.  The information was from Providence, Rhode Island between 1993 and 1997 and New Bedford, Massachusetts between 2002 and 2007.  Patient names, dates of birth, dates of exams, physicians' names, and patient ultrasound images were exposed.  A limited number of current and former patients also had their Social Security numbers exposed. Notifications began on November 5.

UPDATE (11/10/2012): A total of 14,004 patients were affected.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 7, 2012 4Access, National Processing Company
Louisville, Kentucky
BSF HACK

Unknown

An unauthorized person may have gained access to the computer network that supported certain 4Access terminals.  These terminals were connected to a computer network that allowed merchant transaction processing.  The unauthorized entry was discovered on September 24.  Check processing information stored in the network such as check writer's name, checking account and routing numbers, address, and driver's license number may have been accessed. No credit card information was exposed.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 9, 2012 Memorial Hospital
Colorado Springs, Colorado
MED PHYS

6,400 (No SSNs or financial information reported)

Concerned patients may call 1-866-283-9930

Laboratory reports for about 6,400 patients were discovered missing.  The reports contained bill processing information and charges for laboratory services.  Patients who had lab work done between May 1, 2012 and August 31, 2012 had their names, Memorial internal account numbers, lab work dates, and types of lab work exposed.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 4, 2012 Symantec, ImageShack
Mountain View, California
BSO HACK

1,000 (No SSNs or financial information exposed)

A hacking spree resulted in unauthorized access to the ImageShack server and a Symantec portal. Names, phone numbers, emails, domains, passwords, usernames, and other information were exposed.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

November 13, 2012 Sprechman & Associates, P.A.
Miami, Florida
BSF INSD

Unknown

An employee may have performed unauthorized searches on clients.  The employee is no longer with the company.  Names, Social Security numbers, addresses, dates of birth, and driver's license numbers may have been exposed.  The potential breach was discovered in July and clients were notified in October after their contact information was confirmed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 10, 2012 Gulf Coast Health Care Services
Pensacola, Florida
MED INSD

13,000 (No SSNs or financial information reported)

A network security incident resulted in the expose of patient information.  The breach occurred on August 17.

UPDATE (11/26/2012): An employee accessed and downloaded patient information without authorization or a legitimate purpose on five occasions between June 29 and September 20 of 2012.  Gulf Coast Health Care Services discovered the issue on September 26.  Patients who were seen between 1992 and September 20, 2012 may have had their names, addresses, dates of birth, and phone numbers accessed.  It appears that the employee was accessing the data for the purpose of helping outside practitioners recruit patients to their own practices.  The incident was reported to the FBI, the Sarasota Police Department, and the Florida Department of Law Enforcement. 

This entry on the Privacy Rights Clearinghouse Chronology of Data Breaches was previously listed as a hack and was reclassified as an insider breach based on new information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 10, 2012 Baptist Physicians Lexington
Lexington, Kentucky
MED PORT

2,376 (No SSNs or financial information exposed)

A device with patient information was discovered lost or stolen on August 15.  

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 14, 2012 Adobe
San Jose, California
BSO HACK

230 (No SSNs or financial information reported)

A hacker released the names, email addresses, and encrypted passwords of 230 members of Adobe's company database.  The hacker claimed to have access to over 150,000 records.  Adobe announced that it would reset approximately 150,000 passwords of members of the Connectusers.com site.

UPDATE (11/14/2012): The 230 people who were affected also had their titles, affiliated organizations, and usernames exposed.  A number of those affected were associated with U.S. government agencies such as the Department of Transportation, the Department of Homeland Security, the U.S. State Department, and the Federal Aviation Administration.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

November 13, 2012 National Aeronautics and Space Administration (NASA)
Washington, District Of Columbia
GOV PORT

10,000 (No SSNs or financial information reported)

An October 31 theft of a NASA laptop and sensitive NASA documents from an employee's locked car resulted in the exposure of employee information.  Contractors and other non-employees associated with NASA were also affected.  Employees are encouraged to be suspicious of communication from individuals claiming to be from NASA. It may take up to 60 days to send official notifications to those who were affected.

UPDATE (12/14/2012): Up to 10,000 employees and people associated with NASA may have been affected.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

November 13, 2012 Chicago Board of Elections Commissioners
Chicago, Illinois
GOV DISC

1,200 (No SSNs or financial information reported)

The sensitive information of Chicago voters was exposed online due to a mistake by the election authority. A database that included names, the last four digits of Social Security numbers, addresses, and drivers license numbers was accidentally placed online in a publicly accessible place.  Only people who applied to work for the board in Chicago polling places on Election Day were determined to have been affected.  

A forensic investigation firm believes that as many as 1.7 million registered voters had their names, addresses, and voter registration numbers exposed. However the Chicago Board does not believe that information should be considered sensitive.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

November 11, 2012 Labelmaster (American Labelmark Company)
Chicago, Illinois
BSO HACK

Unknown

A hacker accessed the e-commerce site labelmaster.com.  Customer names, addresses, credit card numbers, and credit card expiration dates were exposed.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

November 10, 2012 Bob Ward & Sons
Bozeman, Montana
BSR HACK

Unknown

The Bob Ward & Sons website was hacked on June 6, 2011.  Customers who made online purchases between May 31 and August 3 of 2012 may have had their names, addresses, and credit card information exposed.  Ward became aware of the issue when he received a notice from Discover that revealed some customers had experienced fraudulent charges.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 27, 2012 Department of State Bureau of Consular Affairs
Washington, District Of Columbia
GOV INSD

Unknown

A dishonest employee misused sensitive information in a State Department database to obtain fraudulent credit cards.  He was part of a conspiracy sometime during his employment between September 2007 and March 2008.  The group of conspirators successfully obtained $71,774 and attempted to obtain an additional $133,494 in fraudulent transactions.  The dishonest employee pled guilty to conducting illegal transaction with credit cards and agreed to pay $71,774 in restitution.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 12, 2012 Army Material Command
Huntsville, Alabama
GOV PHYS

400 (Unknown number of SSNs)

An employee transported a hard copy of sensitive employee documents home.  The employee is not believed to have took the information for fraudulent or criminal activity.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

October 12, 2012 FEI Company
Hillsboro, Oregon
BSR PORT

Unknown

The August 29 theft of a laptop resulted in the exposure of employee information.  Employee names, Social Security numbers, information related to taxpayer I.D., dates of birth, home addresses, and employment information such as salaries were exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

November 29, 2012 WestCoast Children's Clinic
Oakland, California
MED DISC

Unknown

A referral document containing sensitive information was accidentally sent in an email to an unauthorized recipient.  Patient names, Social Security numbers, dates of birth, addresses, and health concerns were sent to a county social worker. The county social worker deleted the sensitive email and any other existing copies of the document were securely deleted from the network.  

The WestCoast Children's Clinic will not provide referral forms to outside agencies in order to protect against future inadvertent sharing of private information.  Disciplinary actions will also be taken against the employees involved in the privacy breach.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

Breach Total
868,045,823 RECORDS BREACHED
(Please see explanation about this total.)
from 4,347 DATA BREACHES made public since 2005
Showing 3701-3750 of 4347 results


X

Sign In!

Loading