Paper Street Media, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 31, 2012
geo: 
FL
United States
Records Breached: 

6,378 (No SSNs or financial information reported)

A hacker or hackers accessed Paper Street Media data and posted it online.  A total of 6,209 user names and passwords were posted.  Additionally, 169 emails were posted.

Source: 
Dataloss DB

MOAB Training International

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 1, 2012
geo: 
Kulpsville , PA
United States
Records Breached: 

1,442 (No SSNs or financial information reported)

A hacker or hackers accessed and publicly posted usernames, email addresses, and encrypted passwords from MOAB. Many law enforcement officials and heads of security were among the users who were affected.

Source: 
Dataloss DB

Valencia Self Storage

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 2, 2012
geo: 
Valencia , CA
United States
Records Breached: 

Unknown

Two people were charged with stealing more than $16,000 from 20 businesses and individuals in the Santa Clarita Valley area.  The man and woman were able to commit identity theft and run a check counterfeiting operation by retrieving and reassembling shredded checks from the trash bin of Valencia Self Storage.  Hundreds of bank account numbers, fake and stolen IDs and identity profiles, check making equipment, and counterfeiting checks were discovered at their residence.

Source: 
Dataloss DB

The Complete Pianist

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 5, 2012
geo: 
Tucson , AZ
United States
Records Breached: 

16 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information online.  Sixteen names, passwords, and email addresses were exposed.  The hack took place on or around February 24 and was reported on May 5.

Source: 
Dataloss DB

Demon Thesis

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

203 (No SSNs or financial information exposed)

A hacker or hackers accessed and posted sensitive information online.  Usernames, email addresses, and MD5 passwords were exposed.

Source: 
Dataloss DB

LinkedIn.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Mountain View , CA
United States
Records Breached: 

6,458,020 (No SSNs or financial information)

A file containing 6,458,020 encrypted passwords was posted online by a group of hackers. It is unclear what other types of information were taken from Linkedin users.  LinkedIn recommends that users change their passwords.

UPDATE (08/30/2012): Four potential class actions against LinkedInCorp. were consolidated.  The consolidated suits allege that LinkedIn violated its user agreement and privacy policy by failing to properly safeguard digitally stored user data. LinkedIn is also accused of not publicizing the attack in a timely manner.

Source: 
Dataloss DB

eHarmony.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 7, 2012
geo: 
Santa Monica , CA
United States
Records Breached: 

Unknown

An unspecified number of eHarmony users were found to have had their passwords exposed after eHarmony investigated reports of passwords being posted on a hacker site.  Those who were affected had their passwords reset.

Source: 
Dataloss DB

Next Day Flyers (Postcard Press, Inc.)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Torrance , CA
United States
Records Breached: 

Unknown

On April 2, 2012, an electronic file was discovered on Next Day Flyer's system.  The file was storing transaction information for customers who placed orders through the company's website between March 23, 2012 and April 2, 2012.  It was discovered when the company found out that an unauthorized person was trying to disrupt traffic to Next Day Flyer's website.  The file was removed, but customer names, credit card information, email addresses, and postal addresses may have been exposed.  

Source: 
California Attorney General

DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Friendping.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Denver , CO
United States
Records Breached: 

647 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Friendping.com.  Passwords and email addresses were exposed.

Source: 
Dataloss DB

Pages

Showing 21-30 of 619 results
Subscribe to BSO