Adult Insider Network, Adultinsider.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 19, 2012
geo: 
Killeen , TX
United States
Texas US
Records Breached: 

10,704 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from the adultinsider.com database online.  The leaked information included email addresses, passwords with associated salts, and usernames.

Source: 
Dataloss DB

Arizona Sports Fans, Arizonasportsfans.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
Bernardsville , NJ
United States
New Jersey US
Records Breached: 

8,855 (No SSNs or financial information reported)

A hacker or hackers accessed and posted database information from arizonasportsfans.com online.  The leaked information included email addresses, passwords, salts for passwords, and usernames.

Source: 
Dataloss DB

Gaming Perfection

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 9, 2012
geo: 
Bronx , NY
United States
New York US
Records Breached: 

1,784 (No SSNs or financial information reported)

A hacker or hackers accessed and posted the database information of Gaming Perfection online.  A total of 1,784 email addresses, passwords with associated salts, and usernames were exposed.

Source: 
Dataloss DB

Contempo Enterprises, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 8, 2012
geo: 
West Des Moines , IA
United States
Iowa US
Records Breached: 

330 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive Contempo Enterprises information online.  Login credentials, names, email addresses, and customer data were exposed.

Source: 
Dataloss DB

TwoPlusTwo.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 28, 2012
geo: 
Henderson , NV
United States
Nevada US
Records Breached: 

Unknown

A hacker accessed passwords and associated email addresses of users of Two Plus Two Forums.  It is unclear what types of data and how much were accessed.  Anyone who used the same email and password combination for Two Plus Two Forums and other sites should change their password for Two Plus Two Forums as well as the other sites.

Source: 
Dataloss DB

Formspring

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 11, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

420,000 (No SSNs or financial information revealed)

A hacker or hackers accessed Formspring's development server and posted the password hashes of 420,000 users online.  Formspring immediately reset all 28 million user passwords and addressed the security issues upon confirming that a breach had occurred.

Source: 
Databreaches.net

Yahoo! Voices

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 12, 2012
geo: 
Sunnyvale , CA
United States
California US
Records Breached: 

453,492 (No SSNs or financial information reported)

A hacker or hackers used an SQL injection technique to access the plain-text passwords of over 450,000 Yahoo! Voices (formerly known as Associated Content) users.  The information was then posted online.  Yahoo! Voice users are encouraged to change their Yahoo! passwords immediately. Users from as far back as 2006 or earlier may have had their passwords exposed.

Source: 
Databreaches.net

ITWallStreet.ccom

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 18, 2012
geo: 
New York , NY
United States
New York US
Records Breached: 

50,000 (No SSNs or financial information reported)

A hacker may have accessed as many as 12 data files containing detailed information on IT professionals searching for work with Wall Street.  First and last names, mailing addresses, email addresses, usernames, hashed passwords, and phone numbers were posted online.  Many of the passwords were decrypted and displayed in plain-text. Past salaries, salary expectations, contact information for references, and other types of job search information were also exposed.

Source: 
Media

John Stewart Company (JSCo)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 23, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

A set of internal emails were sent to various JSCo employees on August 7 and August 13.  The emails contained the names, Social Security numbers, and in some cases, dates of birth of other employees.  Employees were instructed to delete the email upon discovery.  

Source: 
California Attorney General

Suddenlink Communications, AAT Communications

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 23, 2012
geo: 
Overland Park , KS
United States
Kansas US
Records Breached: 

Unknown

On February 24, 2012, law enforcement notified Suddenlink management of an incident involving a former employee.  The employee had obtained the personal information of individuals who worked at Suddenlink and AAT Communications between May 22, 2006 and July 21, 2006.  Names, Social Security numbers, addresses, dates of birth, wage information, and banking information may have been exposed.  The former employee was using the information for fraudulent purposes and an investigation uncovered isolated instances of information misuse between 2006 and 2012.  The former employee was arrested.

Source: 
Dataloss DB

Pages

Showing 101-110 of 761 results
Subscribe to BSO