Adult Insider Network, Adultinsider.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 19, 2012
geo: 
Killeen , TX
United States
Texas US
Records Breached: 

10,704 (No SSNs or financial information reported)

A hacker or hackers accessed and posted information from the adultinsider.com database online.  The leaked information included email addresses, passwords with associated salts, and usernames.

Source: 
Dataloss DB

Arizona Sports Fans, Arizonasportsfans.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
Bernardsville , NJ
United States
New Jersey US
Records Breached: 

8,855 (No SSNs or financial information reported)

A hacker or hackers accessed and posted database information from arizonasportsfans.com online.  The leaked information included email addresses, passwords, salts for passwords, and usernames.

Source: 
Dataloss DB

DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Next Day Flyers (Postcard Press, Inc.)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Torrance , CA
United States
California US
Records Breached: 

Unknown

On April 2, 2012, an electronic file was discovered on Next Day Flyer's system.  The file was storing transaction information for customers who placed orders through the company's website between March 23, 2012 and April 2, 2012.  It was discovered when the company found out that an unauthorized person was trying to disrupt traffic to Next Day Flyer's website.  The file was removed, but customer names, credit card information, email addresses, and postal addresses may have been exposed.  

Source: 
California Attorney General

eHarmony.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 7, 2012
geo: 
Santa Monica , CA
United States
California US
Records Breached: 

Unknown

An unspecified number of eHarmony users were found to have had their passwords exposed after eHarmony investigated reports of passwords being posted on a hacker site.  Those who were affected had their passwords reset.

Source: 
Dataloss DB

LinkedIn.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Mountain View , CA
United States
California US
Records Breached: 

167,000,000 (No SSNs or financial information). Updated as of 5/18/2016

 

A file containing 6,458,020 encrypted passwords was posted online by a group of hackers. It is unclear what other types of information were taken from Linkedin users.  LinkedIn recommends that users change their passwords.

UPDATE (08/30/2012): Four potential class actions against LinkedInCorp. were consolidated.  The consolidated suits allege that LinkedIn violated its user agreement and privacy policy by failing to properly safeguard digitally stored user data. LinkedIn is also accused of not publicizing the attack in a timely manner.

Source: 
Media

Demon Thesis

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

203 (No SSNs or financial information exposed)

A hacker or hackers accessed and posted sensitive information online.  Usernames, email addresses, and MD5 passwords were exposed.

Source: 
Dataloss DB

The Complete Pianist

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 5, 2012
geo: 
Tucson , AZ
United States
Arizona US
Records Breached: 

16 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  Sixteen names, passwords, and email addresses were exposed.  The hack took place on or around February 24 and was reported on May 5.

Source: 
Dataloss DB

Valencia Self Storage

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 2, 2012
geo: 
Valencia , CA
United States
California US
Records Breached: 

Unknown

Two people were charged with stealing more than $16,000 from 20 businesses and individuals in the Santa Clarita Valley area.  The man and woman were able to commit identity theft and run a check counterfeiting operation by retrieving and reassembling shredded checks from the trash bin of Valencia Self Storage.  Hundreds of bank account numbers, fake and stolen IDs and identity profiles, check making equipment, and counterfeiting checks were discovered at their residence.

Source: 
Dataloss DB

MOAB Training International

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 1, 2012
geo: 
Kulpsville , PA
United States
Pennsylvania US
Records Breached: 

1,442 (No SSNs or financial information reported)

A hacker or hackers accessed and publicly posted usernames, email addresses, and encrypted passwords from MOAB. Many law enforcement officials and heads of security were among the users who were affected.

Source: 
Dataloss DB

Pages

Showing 121-130 of 772 results
Subscribe to BSO