Arizona Sports Fans, Arizonasportsfans.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
Bernardsville , NJ
United States
Records Breached: 

8,855 (No SSNs or financial information reported)

A hacker or hackers accessed and posted database information from arizonasportsfans.com online.  The leaked information included email addresses, passwords, salts for passwords, and usernames.

Source: 
Dataloss DB

Demon Thesis

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

203 (No SSNs or financial information exposed)

A hacker or hackers accessed and posted sensitive information online.  Usernames, email addresses, and MD5 passwords were exposed.

Source: 
Dataloss DB

LinkedIn.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Mountain View , CA
United States
Records Breached: 

6,458,020 (No SSNs or financial information)

A file containing 6,458,020 encrypted passwords was posted online by a group of hackers. It is unclear what other types of information were taken from Linkedin users.  LinkedIn recommends that users change their passwords.

UPDATE (08/30/2012): Four potential class actions against LinkedInCorp. were consolidated.  The consolidated suits allege that LinkedIn violated its user agreement and privacy policy by failing to properly safeguard digitally stored user data. LinkedIn is also accused of not publicizing the attack in a timely manner.

Source: 
Dataloss DB

eHarmony.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 7, 2012
geo: 
Santa Monica , CA
United States
Records Breached: 

Unknown

An unspecified number of eHarmony users were found to have had their passwords exposed after eHarmony investigated reports of passwords being posted on a hacker site.  Those who were affected had their passwords reset.

Source: 
Dataloss DB

Next Day Flyers (Postcard Press, Inc.)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Torrance , CA
United States
Records Breached: 

Unknown

On April 2, 2012, an electronic file was discovered on Next Day Flyer's system.  The file was storing transaction information for customers who placed orders through the company's website between March 23, 2012 and April 2, 2012.  It was discovered when the company found out that an unauthorized person was trying to disrupt traffic to Next Day Flyer's website.  The file was removed, but customer names, credit card information, email addresses, and postal addresses may have been exposed.  

Source: 
California Attorney General

DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Friendping.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Denver , CO
United States
Records Breached: 

647 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Friendping.com.  Passwords and email addresses were exposed.

Source: 
Dataloss DB

Iwacu Online

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 19, 2012
geo: 
Baltimore , MD
United States
Records Breached: 

948 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Iwacu Online.  Usernames, first names, email addresses, and passwords were exposed.

Source: 
Dataloss DB

L-3 Communications Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 15, 2012
geo: 
New York , NY
United States
Records Breached: 

Unknown

A thumb drive containing information from a small number of current employees, former employees, and applicants was discovered to have been misplaced from the workstation of an employee sometime around April 16.  The drive contained names and Social Security numbers. Those who were affected were mailed notifications on May 16.  

Source: 
Dataloss DB

InfoLink, ServerPronto, CloudPronto

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 9, 2012
geo: 
Fort Lauderdale , FL
United States
Records Breached: 

1,926 (1,820 encrypted card numbers)

A hacker or hackers accessed the database information of InfoLink and posted the information online.  The intrusion appears to have taken place in November of 2011.  The leaked data included 46 administrator names, passwords and email addresses.  A total of 1,820 client names, email addresses, passwords, payment methods, card types, last four digits of payment cards, and encrypted full payment card numbers were exposed.  ServerPronto and CloudPronto affiliates were also affected.

Source: 
Dataloss DB

Pages

Showing 21-30 of 625 results
Subscribe to BSO