Internet Marketing Strategies (Internet Marketing Tools), Power-blog.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 8, 2012
geo: 
Tampa , FL
United States
Florida US
Records Breached: 

5,860 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from the Internet Marketing Strategies website Power-blog.com.  Emails, usernames, and encrypted passwords were exposed.

Source: 
Dataloss DB

Yahoo! Voices

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 12, 2012
geo: 
Sunnyvale , CA
United States
California US
Records Breached: 

453,492 (No SSNs or financial information reported)

A hacker or hackers used an SQL injection technique to access the plain-text passwords of over 450,000 Yahoo! Voices (formerly known as Associated Content) users.  The information was then posted online.  Yahoo! Voice users are encouraged to change their Yahoo! passwords immediately. Users from as far back as 2006 or earlier may have had their passwords exposed.

Source: 
Databreaches.net

Formspring

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 11, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

420,000 (No SSNs or financial information revealed)

A hacker or hackers accessed Formspring's development server and posted the password hashes of 420,000 users online.  Formspring immediately reset all 28 million user passwords and addressed the security issues upon confirming that a breach had occurred.

Source: 
Databreaches.net

T&M Protection Resources

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 25, 2012
geo: 
New York , NY
United States
New York US
Records Breached: 

10 (No SSNs or financial information reported)

A hacker or hackers accessed the database information of T&M Protection Resources and posted the information online.  The leaked data included 10 uersnames and passwords.

Source: 
Dataloss DB

Crowne Plaza

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Columbus , OH
United States
Ohio US
Records Breached: 

Unknown

A hotel employee accidentally downloaded malware to front desk computers.  The malware was active for about ten days during the first half of March of 2012.  Customer names, addresses, credit card numbers, and credit card expiration dates may have been exposed.  

Source: 
Dataloss DB

InfoLink, ServerPronto, CloudPronto

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 9, 2012
geo: 
Fort Lauderdale , FL
United States
Florida US
Records Breached: 

1,926 (1,820 encrypted card numbers)

A hacker or hackers accessed the database information of InfoLink and posted the information online.  The intrusion appears to have taken place in November of 2011.  The leaked data included 46 administrator names, passwords and email addresses.  A total of 1,820 client names, email addresses, passwords, payment methods, card types, last four digits of payment cards, and encrypted full payment card numbers were exposed.  ServerPronto and CloudPronto affiliates were also affected.

Source: 
Dataloss DB

L-3 Communications Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 15, 2012
geo: 
New York , NY
United States
New York US
Records Breached: 

Unknown

A thumb drive containing information from a small number of current employees, former employees, and applicants was discovered to have been misplaced from the workstation of an employee sometime around April 16.  The drive contained names and Social Security numbers. Those who were affected were mailed notifications on May 16.  

Source: 
Dataloss DB

Iwacu Online

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 19, 2012
geo: 
Baltimore , MD
United States
Maryland US
Records Breached: 

948 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Iwacu Online.  Usernames, first names, email addresses, and passwords were exposed.

Source: 
Dataloss DB

Friendping.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Denver , CO
United States
Colorado US
Records Breached: 

647 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Friendping.com.  Passwords and email addresses were exposed.

Source: 
Dataloss DB

DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Pages

Showing 121-130 of 783 results
Subscribe to BSO