eHarmony.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 7, 2012
geo: 
Santa Monica , CA
United States
Records Breached: 

Unknown

An unspecified number of eHarmony users were found to have had their passwords exposed after eHarmony investigated reports of passwords being posted on a hacker site.  Those who were affected had their passwords reset.

Source: 
Dataloss DB

Formspring

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 11, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

420,000 (No SSNs or financial information revealed)

A hacker or hackers accessed Formspring's development server and posted the password hashes of 420,000 users online.  Formspring immediately reset all 28 million user passwords and addressed the security issues upon confirming that a breach had occurred.

Source: 
Databreaches.net

Yahoo! Voices

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 12, 2012
geo: 
Sunnyvale , CA
United States
Records Breached: 

453,492 (No SSNs or financial information reported)

A hacker or hackers used an SQL injection technique to access the plain-text passwords of over 450,000 Yahoo! Voices (formerly known as Associated Content) users.  The information was then posted online.  Yahoo! Voice users are encouraged to change their Yahoo! passwords immediately. Users from as far back as 2006 or earlier may have had their passwords exposed.

Source: 
Databreaches.net

ITWallStreet.ccom

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 18, 2012
geo: 
New York , NY
United States
Records Breached: 

50,000 (No SSNs or financial information reported)

A hacker may have accessed as many as 12 data files containing detailed information on IT professionals searching for work with Wall Street.  First and last names, mailing addresses, email addresses, usernames, hashed passwords, and phone numbers were posted online.  Many of the passwords were decrypted and displayed in plain-text. Past salaries, salary expectations, contact information for references, and other types of job search information were also exposed.

Source: 
Media

Steamboat Ski and Resort Corp.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 6, 2012
geo: 
Steamboat Springs , CO
United States
Records Breached: 

Unknown

A former employee received W-2 information of current and former employees.  Names, Social Security numbers, addresses, payroll information, and other W-2 information were accidentally emailed to the former employee.  The former employee immediately notified the human resources department and confirmed that the information had not been mishandled.

Source: 
Databreaches.net

BNSF Railway Company

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2012
geo: 
Fort Worth , TX
United States
Records Breached: 

100

Around 100 BNSF Railway employees in North Dakota and adjacent states have reported fraudulent Paypal accounts and credit cards being opened in their names. it is unclear how long this issue has been occurring, what sensitive employee information may have been accessed, and how the information was accessed.

Source: 
Databreaches.net

Forte Interactive, Children's Service Council of Palm Beach County, Ocean Reef Community Association

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 14, 2012
geo: 
West Palm Beach , FL
United States
Records Breached: 

Unknown

Information Forte Interactive inadvertently copied from web applications used by Children's Service Council and Ocean Reef Community accidentally became publicly accessible after a system upgrade.  Names, Social Security numbers, driver's license numbers, and dates of birth of individuals whose information was contained in the web portal or web portals was publicly accessible between December 7, 2011 and February 3, 2012. The issue was discovered on January 30, 2012.  

Source: 
Dataloss DB

Blizzard Entertainment

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2012
geo: 
Irvine , CA
United States
Extra Info: 
Records Breached: 

Unknown

Blizzard's security team found an unauthorized party or parties had accessed the Blizzard internal network.  Blizzard immediately addressed the security issue and found no evidence that credit card, billing address, or name information had been accessed. Players using North American servers may have had scrambled versions of Battle.net passwords, answers to personal security questions, and information relating to Mobile and Dial-In Authenticators accessed.

Source: 
Dataloss DB

Phandroid, Androidforums.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 10, 2012
geo: 
Inverness , FL
United States
Records Breached: 

Unknown

Phandroid user account details were accessed and posted online by a hacker or hackers.  Hackers breached a back end database that powers Androidforums.com.  Androidforum usernames, email addresses, hashed passwords, member IP addresses, forum group memberships, and other data may have been accessed.

Source: 
Dataloss DB

High Tech Crime Solutions

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 15, 2012
geo: 
Atlanta , GA
United States
Records Breached: 

32,000 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from High Tech Crime Solutions Inc.'s website by using an SQL injection cyber attack.  A total of 8,900 names and phone numbers were posted online.  Over 32,000 private messages were also exposed.

Source: 
Dataloss DB

Pages

Showing 1-10 of 630 results
Subscribe to BSO