Samuels, Green, and Steel, LLP


Location

Irvine, CA
United States
33° 41' 2.2092" N, 117° 47' 40.8984" W
Date Breach Made Public: 
December 31, 2010
geo: 
Irvine, CA
United States
Records Breached: 

Unknown

An unauthorized party obtained the law firm's login information and accessed consumer credit reports.

Source: 
Databreaches.net

HBGary Federal


Location

Sacramento, CA
United States
38° 34' 53.6592" N, 121° 29' 39.84" W
Date Breach Made Public: 
February 7, 2011
geo: 
Sacramento, CA
United States
Records Breached: 

60,000 business emails (No SSNs or financial information reported)

HBGary announced that it had information about the Anonymous hackers collective.  Anonymous supporters hacked into HBGary's network in order to learn what information had been gathered during the investigation.  Over 60,000 business emails were extracted and the company's website was defaced.  HBGary's leader also had his Twitter account hacked and his personal information exposed.  Anonymous supporters claim the attack was to prevent HBGary from selling trivial information to the FBI.

Source: 
Databreaches.net

US Airways


Location

Tempe, AZ
United States
33° 24' 53.1648" N, 111° 54' 33.516" W
Date Breach Made Public: 
April 6, 2011
geo: 
Tempe, AZ
United States
Records Breached: 

Unknown

The US Airlines Pilot Association (USAPA) is upset that US Airways failed to reveal a breach of sensitive and confidential pilot information.  A management pilot obtained and sent a sensitive database that contained the personal information of thousands of US Airways pilots.  Names, Social Security numbers, and addresses were exposed.  The database was given to a third party pilot group.  The FBI has not determined the extent of the breach.

Source: 
Databreaches.net

Ravelry.com


Location

Boston, MA
United States
42° 21' 30.3516" N, 71° 3' 35.1828" W
Date Breach Made Public: 
June 6, 2011
geo: 
Boston, MA
United States
Records Breached: 

Unknown

Hackers accessed one of Ravelry's second servers and obtained names, encrypted passwords, and possibly email addresses. Business transactions occur on the site, but no financial information was exposed during the breach.  Since hackers may be able to decrypt the passwords and link them to names and email addresses, Ravelry suggested that users immediately change their Ravelry passwords.  Users should also make different passwords for other accounts if their Ravelry password is the same as the one used for those accounts.

Source: 
Databreaches.net

TRICARE Management Activity (formerly Civilian Health and Medical Program of the Uniformed Services, CHAMPUS), Science Applications International Corporation (SAIC)


Locations

San Antonio, TX
United States
29° 25' 26.8392" N, 98° 29' 37.0608" W
Date Breach Made Public: 
September 30, 2011
geo: 
Extra Info: 

SAIC may be contacted at (855) 366-0140 for domestic calls and (952) 556-8312 for international calls.  SAIC's website is http://www.saic.com/

Records Breached: 

5,117,799

The car theft of backup tapes resulted in the exposure of protected health information from patients of military hospitals and clinics.  Uniformed Service members, retirees and their families were affected.

Source: 
PHIPrivacy.net

Metabasis Therapeutics


Location

La Jolla, CA
United States
32° 50' 26.4408" N, 117° 15' 31.6584" W
Date Breach Made Public: 
December 12, 2011
geo: 
La Jolla, CA
United States
Records Breached: 

90

A temporary employee of Metabasis Therapeutics was assigned to computer help-desk support in 2008.  The dishonest employee somehow obtained unauthorized access to the names and personal-identification information of Metabasis Therapeutics employees and their relatives.  The information was used to open credit cards; the credit cards were used to purchase travel packages, which were then resold. A total of $250,000 worth of Las Vegas air, hotel, and show-ticket packages were purchased on Travelocity.com.

Source: 
Media

VeriSign Inc.


Location

Reston, VA
United States
38° 57' 31.0716" N, 77° 21' 25.2108" W
Date Breach Made Public: 
February 2, 2012
geo: 
Reston, VA
United States
Records Breached: 

Unknown

VeriSign was hacked repeatedly in 2010. The hackers stole undisclosed information.  VeriSign is responsible for the integrity of web addresses ending in.com, .net, and .gov. If hackers were able to obtain certain information, it is possible that .com, .net, and .gov websites could be imitated more easily.  Hackers may be able to direct people to faked website and intercept email from federal employees or corporate executives using the .gov addresses.

Source: 
Databreaches.net

Sacramento Area Fire Fighters Local 522


Location

Sacramento, CA
United States
38° 34' 53.6592" N, 121° 29' 39.84" W
Date Breach Made Public: 
March 31, 2012
geo: 
Sacramento, CA
United States
Records Breached: 

Unknown

On or around March 6, a spreadsheet containing the names and contact information of active and retired Local 522 members was sent by a Local 522 employee to the Sacramento Central Labor Council (CLC).  The spreadsheet contained member Social Security numbers, but was only supposed to provide member mailing addresses.  The email did not stop at CLC and was forwarded to Capitol Mailing, Inc.  The mistake was discovered on March 23 after Local 522 members received mailing labels that displayed their Social Security numbers.  

Source: 
California Attorney General

Demon Thesis


Location

San Francisco, CA
United States
37° 46' 29.748" N, 122° 25' 9.8976" W
Date Breach Made Public: 
May 7, 2012
geo: 
San Francisco, CA
United States
Records Breached: 

203 (No SSNs or financial information exposed)

A hacker or hackers accessed and posted sensitive information online.  Usernames, email addresses, and MD5 passwords were exposed.

Source: 
Dataloss DB

Gaming Perfection


Location

Bronx, NY
United States
40° 51' 0" N, 73° 52' 0.0012" W
Date Breach Made Public: 
March 9, 2012
geo: 
Bronx, NY
United States
Records Breached: 

1,784 (No SSNs or financial information reported)

A hacker or hackers accessed and posted the database information of Gaming Perfection online.  A total of 1,784 email addresses, passwords with associated salts, and usernames were exposed.

Source: 
Dataloss DB
Showing 121-130 of 550 results
Syndicate content


X

Sign In!

Loading