Sacramento Area Fire Fighters Local 522

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 31, 2012
geo: 
Sacramento , CA
United States
California US
Records Breached: 

Unknown

On or around March 6, a spreadsheet containing the names and contact information of active and retired Local 522 members was sent by a Local 522 employee to the Sacramento Central Labor Council (CLC).  The spreadsheet contained member Social Security numbers, but was only supposed to provide member mailing addresses.  The email did not stop at CLC and was forwarded to Capitol Mailing, Inc.  The mistake was discovered on March 23 after Local 522 members received mailing labels that displayed their Social Security numbers.  

Source: 
California Attorney General

Comfort Inn & Suites

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 21, 2012
geo: 
San Antonio , TX
United States
Texas US
Records Breached: 

500

Police officers discovered a large number of credit card receipts and other items during a traffic stop in June of 2011.  The driver was then arrested and admitted to using stolen credit card receipts from Comfort Inn & Suites to make fraudulent credit cards.  He had stolen around 500 receipts and successfully used two counterfeit credit cards.  He was sentenced to five years and 10 months in federal prison and ordered to pay $3,606 in restitution.

UPDATE (03/22/2012): Additional credit card receipts were found and connected to Brownsville, Texas.

Source: 
Databreaches.net

IQCR

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 8, 2011
geo: 
Rock Hill , SC
United States
South Carolina US
Records Breached: 

100

An employee of IQCR wrote down names, Social Security numbers, and dates of birth from records. The records came from a gas company in Chicago and were processed by IQCR.  That information was then used to apply for credit cards.  This occurred in October of 2011.  The dishonest employee and her partner were caught after people alerted authorities about being declined for credit cards they had not requested.  Authorities discovered that the fraudulent credit requests all came from the same computer IP address and went to the same residential address.

Source: 
Databreaches.net

Craigslist

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 27, 2012
geo: 
Hempstead , NY
United States
New York US
Records Breached: 

250

More than 250 people in 30 states were victims of scams perpetrated on Craigslist.com by two New York residents.  The women posted phony Craigslist ads for nonexistent jobs and apartments to gather the personal information of victims between February of 2010 and October of 2011.  That information was then used to obtain fraudulent state income tax returns, bank loans, and credit cards.  More than $75,000 was fraudulently obtained.

Source: 
Databreaches.net

SegMark Solutions

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 31, 2012
geo: 
Fairfield , CT
United States
Connecticut US
Records Breached: 

Unknown

A former employee was able to access the Segmark Solutions computer system.  It is unclear if the former employee guessed passwords, used passwords that had not been changed, or used some other method to access the computer system.  He then used credit card information in the system to make fraudulent purchases. Damages caused a total of $7,000.  The former employee was caught after a six-month investigation and charged with second degree computer crime and illegal use of credit cards.

Source: 
Databreaches.net

VeriSign Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 2, 2012
geo: 
Reston , VA
United States
Virginia US
Records Breached: 

Unknown

VeriSign was hacked repeatedly in 2010. The hackers stole undisclosed information.  VeriSign is responsible for the integrity of web addresses ending in.com, .net, and .gov. If hackers were able to obtain certain information, it is possible that .com, .net, and .gov websites could be imitated more easily.  Hackers may be able to direct people to faked website and intercept email from federal employees or corporate executives using the .gov addresses.

Source: 
Databreaches.net

Security Savings Systems, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 3, 2012
geo: 
New Cumberland , PA
United States
Pennsylvania US
Records Breached: 

2,038

A printing error caused thousands of taxpayers to receive 1099-G forms from 2011 with the Social Security number and tax refund of another taxpayer.  The mistake occurred because the company was trying to conserve paper.  The forms were supposed to be cut below a certain point, but the bottom half remained attached.  

Source: 
Databreaches.net

ValueOptions, National Elevator Industry

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 9, 2011
geo: 
Newtown Square , PA
United States
Pennsylvania US
Records Breached: 

7,019

On July 6, 2011, four tape cartridges with sensitive information were shipped in a container from VOI.  The container was placed into a cardboard shipping box and shipped.  ValueOptions Inc. (VOI) was informed that the package had not arrive as of August 1. An outside agency investigated the loss of the packages until September 22.  Notification that the tapes had been lost was sent on November 4.  The tapes contained names, addresses, phone numbers, dates of birth, Social Security numbers, and plan subscriber ID numbers.

Source: 
Databreaches.net

Providencenightlife.net

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 13, 2011
geo: 
Providence , RI
United States
Rhode Island US
Records Breached: 

50,000 (No SSNs or financial information reported)

Hackers posted data from providencenightlife.net users onto Pastebin.  The data included usernames, clear-text passwords, and email addresses.  

Source: 
Databreaches.net

Mr. Janitor, Eagle Harbor Country Club

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 13, 2011
geo: 
St. Augustine , FL
United States
Florida US
Records Breached: 

Unknown

The owner of a cleaning company called "Mr. Janitor" was arrested for stealing personal information from Eagle Harbor Country Club members.  An unknown number of members had their information stolen and used to open fraudulent credit cards and bank accounts in their names.  The owner of the cleaning company was charged with identity theft of more than $50,000 and/or affecting more than twenty persons.

Source: 
Databreaches.net

Pages

Showing 111-120 of 708 results
Subscribe to BSO