Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
872,702,019 RECORDS BREACHED
(Please see explanation about this total.)
from 4,386 DATA BREACHES made public since 2005

Save or Print PDF of Entire Breach List including introduction.Save or Print a PDF of Entire Breach List (including introductory FAQ)

Filter breach list before saving or printing PDF. Conduct a search of the Chronology using its sorting features, and Save or Print a PDF of your search results (Select filters)

If you do not have access to PDF, you can print the Chronology in landscape view.

Date Made Publicsort icon Name Entity Type
November 8, 2013 BriovaRx
Chicago, Illinois
MED UNKN

1,067 (No Social Security numbers or financial information reported)

A breach of patient records occurred between July 3 and July 11 of 2013.  In a breach that may be related, a former employee was sued for stealing confidential health information and trade secrets in October.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 8, 2013 Region Ten Community Services Board
Charlottesville, Virginia
MED HACK

10,228 (No Social Security numbers or financial information exposed)

A hacker obtained the passwords to several employees' emails on July 29.  The email accounts may have contained the health information of patients.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 8, 2013 Schuylkill Health System
Pottsville, Pennsylvania
MED PORT

2,810 (No Social Security numbers or financial information reported)

The August 7 theft of a laptop resulted in the exposure of patient information.  

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 8, 2013 Littleton Podiatry
Littleton, Colorado
MED PORT

3,512 (No Social Security numbers or financial information exposed)

The August 27 theft of a laptop resulted in the exposure of patient information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 8, 2013 Sierra View District Hospital
Porterville, California
MED INSD

1,009 (No Social Security numbers or financial information reported)

A routine security audit at Sierra View District Hospital revealed that an employee had inappropriately accessed protected health information.  An investigation revealed that the information was not disclosed externally.  The breach occurred between July 1 and August 2.  

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 11, 2013 City Jeffersonville
Jeffersonville, Indiana
GOV DISC

311

City vendors and other businesses were alerted to a breach of information that dates back to 2001.  Names, addresses, and in some cases Social Security numbers, were sent to city employees in a monthly email about vendor payments.  The issue was noticed when a recent software change made the information easier to spot.  Jeffersonville's information technology staff deleted the emails from city employee inboxes.

 
Information Source:
Media
records from this breach used in our total: 311

November 11, 2013 North Country Hospital and Health Center
Newport, Vermont
MED INSD

550 (No Social Security numbers or financial information reported)

Patients with questions may call (802) 334-3253.

A former employee refused to return a laptop that contained unspecified patient health information.  North County Hospital first learned of the issue on September 18.  The Newport Police Department was contacted and all administrator-level computer system user codes and passwords that the employee had access to were changed.  The laptop was also password-protected and will be remotely locked out if someone attempts to use it to access the Hospital systems.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 11, 2013 New York City Police Department
New York, New York
GOV INSD

30 (No Social Security numbers or financial information reported)

A former police detective pleaded guilty to paying hackers to steal passwords associated with the email accounts of other officers.  The dishonest detective also misused the National Crime Information Center database to search for the information of at least two other NYPD officers.  The breaches occurred between April of 2010 and October of 2012. The dishonest detective was charged with one count of conspiracy to commit hacking and one count of unauthorized access.  The 30 or more people who were affected included 20 current and former NYPD officers.  At least 43 email accounts and one cellular phone account were hacked.

 
Information Source:
Media
records from this breach used in our total: 30

November 11, 2013 St. Mary's Janesville Hospital, SSM Health Care
Janesville, Wisconsin
MED PORT

629 (No Social Security numbers or financial information exposed)

The August 27 car theft of an SSM Health Care employee's unencrypted laptop resulted in the exposure of patient information.  Patients who were treated in St. Mary's Janesville Hospital's emergency room between January 1 and August 26 of 2013 were affected.  Names, dates of birth, medical record numbers, account numbers, providers, departments of service, bed numbers, room numbers, dates and times of service, history of visits, complaints, diagnoses, procedures, test results, vaccines, and medications were exposed.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 11, 2013 Discover Financial Services
Riverwoods, Illinois
BSF UNKN

Unknown

An unspecified number of Discover customers had their account numbers changed and were issued a new card.  It is unclear what type of security breach prompted the notification and when it may have occurred. Several customers in California received the notification letter; residents of other states may have been notified as well.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 12, 2013 Rotech Healthcare
Orlando, Florida
MED PORT

10,680

On August 30, 2013 Rotech discovered that a former employee had taken employee files when her employment ended on November 26 of 2010.  Rotech employees and their dependents may have had their names, Social Security numbers, addresses, and certain medical insurance information exposed.  This medical information may have included the carrier that administered health care coverage, pharmacy services received, and other medical services received.  The information was not removed with malicious intent and there has been no evidence of misuse.

UPDATE (12/16/2013): A total of 10,680 employees and their dependents were affected.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 10,680

November 13, 2013 USI Insurance Services LLC
Columbus, Ohio
BSF HACK

Unknown

Malicious software was installed on the USI website on or around October 2, 2013.  A hacker may have been able to view information stored in the USI system.  Client names, usernames, passwords, and mailing addresses were exposed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 14, 2013 Alta Bates Summit Medical Center, AverMedia Technologies
Berkeley, California
MED INSD

115

Two women are accused of misusing the information of over 115 people in the Bay Area for identity theft purposes.  At least 15 Atla Bates Summit Medical Center patients had their information misused and at least 35 had their information collected.  The two women were arrested on November 5 and also had a payroll sheet from AverMedia Technologies in their possession.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 115

November 15, 2013 Greencastle Community School Corporation
Greencastle, Indiana
EDU HACK

Unknown

Greencastle Community School Corporation notified parents of a security issue involving improprer access by students.  Several students from Greencastle High School found a list of student network passwords and were able to access a limited amount of confidential student files on the school network.  Students in grades three through 12 may have had breakfast or lunch expenses falsely charged to their names and students with unauthorized access may have been able to access the network under other students' accounts.

 
Information Source:
Media
records from this breach used in our total: 0

November 15, 2013 Dynacare Laboratory, Froedtert Health Workforce Health, City of Milwaukee
Milwaukee, Wisconsin
MED PORT

9,414

A Dynacare Laboratory employee's car was stolen on October 22.  The car held a flash drive with employee names, Social Security numbers, addresses, dates of birth, and genders.  Dynacare Laboratory is one of Froedtert Health Workforce's contractors and Froedtert Health Workforce was handling health information for the City of Milwaukee Wellness Program.  The City of Milwaukee Department of Employee Relations learned of the incident on November 15.

UPDATE (11/18/2013): A Dynacare laptop that contained no personal information was also in the employee's car.  The car and laptop were recovered; the flash drive remains missing.

UPDATE (11/21/2013): The City of Milwaukee filed a complaint against Dynacare with the Federal Office of Civil Rights.

UPDATE (11/29/2013): A total of 9,414 people were affected including about 6,000 city employees and 3,000 city employee dependents.  The Milwaukee Professional Firefighters Association Local 215 was also affected and a lawsuit against Dynacare Laboratory and Froedtert Health was filed.

 
Information Source:
Media
records from this breach used in our total: 9,414

November 15, 2013 Office of Dr. Paul G. Klein, DPM
Wayne, New Jersey
MED PORT

2,500 (No Social Security numbers or financial information reported)

The October 1 theft of a laptop resulted in the exposure of patient information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Hospital for Special Surgery
New York, New York
MED INSD

537 (No Social Security numbers or financial information reported)

A March 19 breach may have resulted in the exposure of patient information.  The breach may have involved the theft of computer equipment, the unauthorized access of information on a computer, and/or paper records.

UPDATE (12/20/2013): A dishonest employee accessed names, Social Security numbers, addresses, dates of birth, driver's license numbers, passport numbers, physician names, diagnosis information, medical billing codes, bank account and routing numbers, and payment party names and payment information.  Hospital for Special Surgery learned of the breach on May 31 and the dishonest employee was arrested in August.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Mount Sinai Medical Center
New York, New York
GOV PORT

610 (No Social Security numbers or financial information reported)

The August 1 theft or loss of a portable electronic device resulted in the exposure of patient information.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Mount Sinai Medical Center
New York, New York
MED PHYS

1,586 (No Social Security numbers or financial information reported)

Patient records were improperly disposed of on August 6.  

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Superior HealthPlan, Inc.
Austin, Texas
MED DISC

6,284 (No Social Security numbers or financial information reported)

New Health and Human Services Commission ID numbers were sent on Superior ID cards to CHIP members on October 4.  It was discovered that a computer error caused some Superior CHIP ID cards to be sent to incorrect addresses. Names, CHIP ID numbers, and doctors' names and phone numbers were exposed.  All members who were affected were notified.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Group Health Cooperative
Seattle, Washington
NGO DISC

1,015 (No Social Security numbers or financial information reported)

Group Health member identification numbers and chronic conditions were accidentally printed on the outside of letters that were mailed on September 16.  The issue was discovered on September 23.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Rose Medical Center
Denver, Colorado
MED PHYS

606 (No Social Security numbers or financial information exposed)

Patient records were improperly disposed of sometime between June 28 of 2013 and July 16 of 2013.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

November 15, 2013 Lincoln Credit Center, National Debt Defense, SmartPath
San Diego, California
BSF UNKN

Unknown

Personal information related to client accounts may have been compromised at a physical location.  The breach occurred sometime between October 20 and November 15. Lincoln Credit Center is monitoring client accounts for suspicious activity.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 17, 2013 CME Group, CME ClearPort
Chicago, Illinois
BSF HACK

Unknown

A July cyberattack resulted in the exposure of customer information.  Customers were required to change their log in credentials.  It is unclear what kind of customer information was exposed.

 
Information Source:
Media
records from this breach used in our total: 0

November 17, 2013 MacRumors, vBulletin
,
BSO HACK

860,000 (No Social Security numbers or financial information exposed)

A group of hackers claimed responsibility for compromising usernames, emails, and passwords associated with MacRumors and vBulletin Forum.  The hackers used a Zero Day exploit.  A total of 860,000 MacRumors users were affected. It is unclear how many vBulletin Forum users were affected.

 
Information Source:
Media
records from this breach used in our total: 0

November 18, 2013 Eastside Medical Center
Snellville, Georgia
MED PHYS

Unknown

Eastside Medical Center left patient information in a publicly accessible area.  A vendor was responsible for shredding the patient information and took it from Eastside Medical Center; it is unclear what happened to the information after that. Patient names, addresses, phone numbers, medications, and types of surgeries were exposed.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 18, 2013 AnMed Health, Health Port
Anderson, South Carolina
MED INSD

Unknown

An employee of AnMed's contractor Health Port accessed patient information without cause and posted it publicly.  Names, Social Security numbers, medical history, religious preference, and other personal information was accessed.  The employee was disciplined.  A lawsuit was filed in relation to the breach that named a dozen plaintiffs.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 19, 2013 Sachem Central School District
Lake Ronkonkoma, New York
EDU HACK

15,000

Sachem's notice can be found here: http://www.sachem.edu/home/pdf/QAData11192013.pdf

Two breaches in the summer of 2013 and November of 2013 resulted in the exposure of student information.  The sensitive information that was exposed in July may have been accidentally exposed through an administrative error.  

A second breach was discovered on November 8 when the Superintendent learned that student information had been posted on a publicly accessible webpage.  The investigation of the November breach is ongoing.  Student names and ID numbers were the primary types of data that were exposed in both incidents.

UPDATE (11/23/2013): A student of Sachem North High School pleaded not guilty to computer trespass and was released without bail.  The student may have also accessed information in 2012.  A list of 15,000 students' information that dated back to the early 2000s was discovered online. A list of 130 students who received instructional services in an alternative setting in the 2010-2011 school year was also discovered online.

 
Information Source:
Security Breach Letter
records from this breach used in our total: 0

November 20, 2013 GitHub
San Francisco, California
BSO HACK

Unknown

A hacker or hackers compromised some of the user accounts of GitHub.  The hackers used a brute force attack to expose passwords.  GitHub reset the passwords of users who were affected.

 
Information Source:
Media
records from this breach used in our total: 0

November 20, 2013 Office of Dr. Kathleen Whisman
Sebastopol, California
MED STAT

Unknown

Sometime around April 11, 2013, Dr. Whisman learned of a breach that involved patient information on a computer recovered during an identity theft ring investigation.  The patient information included full names, Social Security numbers, addresses, telephone numbers, dates of birth, and insurance plan information for patients who were seen in 1998 and 1999.  The information likely came from a stolen computer and Dr. Whisman was encouraged to delay notification until the investigation was completed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

November 21, 2013 Clarity Media Group
Denver, Colorado
BSO PORT

Unknown

The October 12 theft of a laptop resulted in the exposure of current and former employee information.  Current and former employees of Clarity Media Group's subsidiaries and of Freedom Communications were also affected.  Names, Social Security numbers, mailing addresses, email addresses, phone numbers, dates of birth, salaries, and 401(k) balances were on the laptop.  The dependents of employees may have also had their information exposed.

 
Information Source:
Media
records from this breach used in our total: 0

November 22, 2013 Redwood Memorial Hospital
Fortuna, California
MED PORT

1,039 (No Social Security numbers or financial information reported)

Patients with questions may call 1 (707)-269-3685.

An unencrypted flash drive from Redwood Memorial Hospital's Cardiopumlonary Services Department was discovered missing on November 8.  The flash drive had been missing since at least November 6 and contained patient names, report ID numbers, test indications, ages, heights, weights, test recording and analysis dates and times, facility and address where services were rendered, and clinical summaries of test findings.  Some patients who were seen at Redwood Memorial Hospital between 2001 and 2013 may have had their information exposed.  

 
Information Source:
Media
records from this breach used in our total: 0

November 25, 2013 University of California, San Francisco (UCSF)
San Francisco, California
MED PORT

8,294

The September 25 car theft of a physician's laptop may have resulted in the exposure of patient information.  The laptop may or may not have been encrypted and the physician is based in the Division of Gastroenterology at UCSF's School of Medicine. Patient names, Social Security numbers, dates of birth, and medical record numbers were on the laptop.  

 
Information Source:
Media
records from this breach used in our total: 8,294

November 25, 2013 Crown Castle International Corp
Canonsburg, Pennsylvania
BSO HACK

Unknown

Crown Castle determined on October 31 that their payroll information may have been accessed by hackers.  Employee names, Social Security numbers, and compensation may have been exposed.

 
Information Source:
Media
records from this breach used in our total: 0

November 26, 2013 URM Stores
Spokane, Washington
BSR HACK

Unknown

URM Stores is the wholesaler that processes electronic payments made by customers of Yoke's Fresh Market, Rosauers, Super 1 Foods, Family Foods, Harvest Foods, CenterPlace Market, and Trading Co. Stores.

Customers with questions may call URM's call center at 877-237-7408.

Washington banks and credit unions noticed fraudulent activity on the debit and credit cards of grocery store customers.  The breach was traced to Yoke's Fresh Markets, Rosauers stores, and other grocery stores associated with URM stores.  The hacking incident occurred sometime between September and October.  Customers were encouraged to use cash, check, or an alternative form of payment card processing to pay in stores until the breach was resolved.

UPDATE (12/03/2013): Over 24 stores in Montana and an unspecified number of stores in Oregon were also affected.  URM believes the breach that allowed fraudulent copies of customer payment cards to be created has been contained.  Customers were encouraged to check their bank statements after URM allowed normal payment card purchases to resume.

 
Information Source:
Media
records from this breach used in our total: 0

November 26, 2013 Anthem Blue Cross
, California
MED DISC

24,500

The breach affected doctors across California.

The Social Security numbers and tax identification numbers of around 24,500 California doctors were accidentally posted in Anthem's online provider directory.  The information was available online at the end of October for about 24 hours.

 
Information Source:
Media
records from this breach used in our total: 24,500

November 27, 2013 Maricopa County Community College District
Phoenix, Arizona
EDU UNKN

2.49 million

An unspecified data breach may have exposed the information of current and former students, employees, and vendors.  Names, Social Security numbers, bank account information, and dates of birth may have been viewed by unauthorized parties.

UPDATE (12/02/2013): Student academic information may have also been exposed.  The Maricopa County Community College District's governing board will spend as much as $7 million to notify and offer credit monitoring to those who may have been affected.

UPDATE (12/07/2013): Estimations for the cost of the breach are as high as $14 million.

UPDATE (4/22/2014): Maricopa County Community College District waited seven months to inform 2.5 millions individuals (students, staff, graduates) of the security breach. The District is now in a class action lawsuit. The lawsuit claims that the "FBI warned the Maricopa County Community College District in January of 2011 that a number of its databases had been breached and made available for sale on the Internet". It was also reported that "the district's Information Technology Services employee also became aware of the security breach in January 2011, and repeatedly reported their findings to Vice Chancellor George Kahkedjian".

 
Information Source:
Media
records from this breach used in our total: 2,490,000

November 27, 2013 University of Pittsburgh Medical Center
Pittsburgh, Pennsylvania
MED INSD

1,300

An employee was found to have accessed patient records without legitimate cause.  The employee worked in a unit coordinator position for about a year and her supervisor was aware of the issue.  Patient names, Social Security numbers, medical records, dates of birth, contact information, treatment information, and diagnosis information were accessed.  The employee was fired.

 
Information Source:
Media
records from this breach used in our total: 1,300

November 27, 2013 California Employment Development Department
Sacramento, California
GOV DISC

Unknown

Unemployment claim filing notices were sent to employers that contained information of people who had never been employed with them.  An undisclosed number of people had their names and Social Security numbers mistakenly exposed.  The issue was discovered when several employers notified EDD that some of the names and Social Security numbers did not match their records.

UPDATE (11/22/2013): The erroneous mailings occurred between September 14, 2013 and October 9, 2013.

 
Information Source:
Media
records from this breach used in our total: 0

November 28, 2013 Florida Digestive Health Specialists
Bradenton, Florida
MED INSD

4,400

An employee was found to have improperly accessed and photographed patient records.  The issue was discovered when the employee had the images printed at a store and a store employee reported the incident.  Patient names, Social Security numbers, dates of birth, and phone numbers were exposed.  The employee was fired and a criminal investigation has begun.

 
Information Source:
Media
records from this breach used in our total: 4,400

November 28, 2013 The Flamingo Resort and Spa
Santa Rosa, California
BSO HACK

Unknown

Employees with questions may call 1-(800)-848-8300.

A virus was discovered on The Flamingo Resort and Spa payroll computer.  Employee names, Social Security numbers, bank routing numbers for those who used direct deposit, dates of birth, phone numbers, and home addresses may have been exposed.

 
Information Source:
Media
records from this breach used in our total: 0

November 28, 2013 Orange County Anaheim Medical Center, Kaiser Foundation Hospital
Anaheim, California
MED PORT

Unknown

Patients with questions may contact Kaiser Permanente at 1(800)-443-0815.

A flash drive that contained patient information was discovered missing on September 25, 2013.  It contained names, dates of birth, and medical record numbers.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 28, 2013 Amos Medical Services
Laurel, Maryland
MED PHYS

400 (No Social Security numbers or financial information reported)

Amos Medical Services was charged with improper disposal of records after leaving patient records in a dumpster.  The records were left behind when the office of Amos Medical Services moved within Laurel, Maryland.  Amos Medical Services and their associated doctor agreed to pay $20,000.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 28, 2013 CVS Pharmacy, Inc., Maryland CVS Pharmacy, LLC
Gaithersburg, Maryland
MED PHYS

Unknown

The Maryland Attorney General charged CVS Pharmacy, Inc. and Maryland CVS Pharmacy, LLC with failing to protect sensitive financial and medical information.  CVS disposed of patient records in publicly accessible places. CVS agreed to pay $250,000 in a settlement with the Maryland Attorney General.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

November 29, 2013 University of Washington Medicine
Seattle, Washington
MED HACK

90,000

An employee at UW Medicine opened an email attachment that contained malicious software in early October.  The malware affected the employee's computer and any information on the computer may have been compromised.  Patient names, Social Security numbers, phone numbers, addresses, and medical record numbers may have been affected.  Patients who were seen at UW Medicine dating back to at least 2008 could have had their information exposed.  Notifications of the breach were sent at the end of November.

 
Information Source:
Media
records from this breach used in our total: 90,000

December 2, 2013 Board of Barbering and Cosmetology
Sacramento, California
GOV STAT

Unknown

Those with questions may call 1-(866)-968-7797.

The August 23 office burglary of a desktop computer resulted in the exposure of sensitive information.  Individuals who participated as models during cosmetology, barbering, manicure, esthetician, or electrology exams may have had their names, dates of birth, and California drivers' license or identification card numbers exposed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

December 2, 2013 UNICEF ("U.S.Fund")
New York, New York
GOV HACK

Unknown

On December 2, 2013 the United States Fund for UNICEF discovered unauthorized access to one of the U.S Fund's servers on or around November 4, 2013. The initial investigation by the agency showed only one server affected, however the personal information exposed included names, credit card numbers, credit card security codes, expiration dates of the cards, bank account numbers, phone numbers, and email addresses.

 

 
Information Source:
Vermont Attorney General
records from this breach used in our total: 0

December 3, 2013 Chicago Public Schools
Chicago, Illinois
EDU DISC

2,000 (No Social Security numbers or financial information reported)

The vision exam dates, diagnoses, dates of birth, genders, identification numbers, and school names of students were accidentally made available to the public online between June 18 and July 31, 2013.  The breach was discovered on October 7 and the Chicago vision exam program information was removed.  The information was viewed by 14 people during that time.  All cached and archived versions of the information were also removed from the Internet.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

December 3, 2013 MadeInOregon
Portland, Oregon
BSR HACK

1,700 

MadeInOregon's website may have been accessed by unauthorized parties.  The credit card transaction information of customers may have been accessed between mid-October and mid-November. Seven customers confirmed that they were affected by fraudulent credit card activity after making purchases on MadeInOregon's website.

 
Information Source:
Media
records from this breach used in our total: 1,700

December 4, 2013 ADP, Facebook, Gmail, LinkedIn, Twitter, Yahoo, YouTube
,
BSO HACK

2 million (No Social Security numbers or financial information reported)

There is no specific location for this breach.

A breach that involved keylogging software affected at least 93,000 websites.  The virus may have originated on a server located in the Netherlands.  It first started collecting passwords and usernames on October 21. Approximately 860 computers in the United States were affected. More than 99% of the computers that were affected were outside of the United States.

 
Information Source:
Media
records from this breach used in our total: 0

Breach Total
872,702,019 RECORDS BREACHED
(Please see explanation about this total.)
from 4,386 DATA BREACHES made public since 2005
Showing 4051-4100 of 4386 results


X

Sign In!

Loading