Crowne Plaza

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Columbus , OH
United States
Records Breached: 

Unknown

A hotel employee accidentally downloaded malware to front desk computers.  The malware was active for about ten days during the first half of March of 2012.  Customer names, addresses, credit card numbers, and credit card expiration dates may have been exposed.  

Source: 
Dataloss DB

Internet Marketing Strategies (Internet Marketing Tools), Power-blog.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 8, 2012
geo: 
Tampa , FL
United States
Records Breached: 

5,860 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from the Internet Marketing Strategies website Power-blog.com.  Emails, usernames, and encrypted passwords were exposed.

Source: 
Dataloss DB

Indianapolis Super Bowl (indianapolissuperbowl.com)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 8, 2012
geo: 
Indianapolis , IN
United States
Records Breached: 

2,026 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from indianapolissuperbowl.com.  In addition to 10 administrator accounts, 2,016 usernames, email addresses, and cell phone numbers were publicly posted.

Source: 
Dataloss DB

Zybez

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Huntsville , AL
United States
Records Breached: 

353 (No SSNs or financial information reported)

A hacker or hackers accessed and exposed information from Zybez.  Usernames, email addresses, IP addresses, and passwords were exposed.

Source: 
Dataloss DB

John Stewart Company (JSCo)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 23, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

Unknown

A set of internal emails were sent to various JSCo employees on August 7 and August 13.  The emails contained the names, Social Security numbers, and in some cases, dates of birth of other employees.  Employees were instructed to delete the email upon discovery.  

Source: 
California Attorney General

Suddenlink Communications, AAT Communications

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 23, 2012
geo: 
Overland Park , KS
United States
Records Breached: 

Unknown

On February 24, 2012, law enforcement notified Suddenlink management of an incident involving a former employee.  The employee had obtained the personal information of individuals who worked at Suddenlink and AAT Communications between May 22, 2006 and July 21, 2006.  Names, Social Security numbers, addresses, dates of birth, wage information, and banking information may have been exposed.  The former employee was using the information for fraudulent purposes and an investigation uncovered isolated instances of information misuse between 2006 and 2012.  The former employee was arrested.

Source: 
Dataloss DB

Kelly Services

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 9, 2012
geo: 
Troy , MI
United States
Records Breached: 

Unknown

People who signed up for employment through the Kelly Services staffing agency may have had their personal information retained by a former Kelly Services employee.  Kelly Services retrieved all of the sensitive information from the former employee upon learning of the breach.  Names and Social Security numbers may have been exposed.  

Source: 
Dataloss DB

High Tech Crime Solutions

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 15, 2012
geo: 
Atlanta , GA
United States
Records Breached: 

32,000 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from High Tech Crime Solutions Inc.'s website by using an SQL injection cyber attack.  A total of 8,900 names and phone numbers were posted online.  Over 32,000 private messages were also exposed.

Source: 
Dataloss DB

Phandroid, Androidforums.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 10, 2012
geo: 
Inverness , FL
United States
Records Breached: 

Unknown

Phandroid user account details were accessed and posted online by a hacker or hackers.  Hackers breached a back end database that powers Androidforums.com.  Androidforum usernames, email addresses, hashed passwords, member IP addresses, forum group memberships, and other data may have been accessed.

Source: 
Dataloss DB

Islamic Finder

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 17, 2012
geo: 
Anaheim , CA
United States
Records Breached: 

279 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from islamicfinder.org online.  Usernames, names, passwords, and email addresses were exposed.

Source: 
Dataloss DB

Pages

Showing 1-10 of 641 results
Subscribe to BSO