Scribd

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 5, 2013
geo: 
San Francisco , CA
United States
California US
Records Breached: 

100,000 (No SSNs or financial information exposed)

A hack affected less than 1% of Scribd's 50 million users. "A few hundred thousand" users had their passwords stolen.  Users who were affected received instructions for resetting passwords.  The passwords were encrypted and it is unlikely that hackers were able to decrypt and use the passwords before Scribd and Scribd users learned of the breach.

Source: 
Media

Comfort Inn and Suites

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2013
geo: 
Willard , MO
United States
Missouri US
Records Breached: 

Unknown

A dishonest employee working at a Comfort Inn and Suites in Willard, Missouri during 2009 worked with a conspirator to misuse the information of hotel customers.  They were ordered to pay restitution of $23,000.  The dishonest employee was sentenced to three years of probation and her accomplice was sentenced to 42 months for aggravated identity theft and conspiracy to commit wire fraud.

Source: 
Media

Tribune Co.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 15, 2013
geo: 
Sacramento , CA
United States
California US
Records Breached: 

Unknown

A former employee revealed a password and username combination for Tribune Co. to hackers.  The hackers were part of anonymous and used the information to access Tribune Co.'s servers in 2010.  A number of online stories that had been published through Tribune Co. were defaced by hackers as a result.  

The former employee of a TV station owned by Tribune Co. was indicted on charges of conspiracy to cause damage to a protected computer, transmission of malicious code, and attempted transmission of malicious code.

Source: 
Media

Reputations.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 2, 2013
geo: 
Redwood , CA
United States
California US
Records Breached: 

Unknowm

Reputation.com experienced a hack that exposed customer names, email addresses, mailing addresses, date of birth, and employment information. Additionally, some customers had their encrypted passwords stolen.  Reputation.com immediately reset all customer passwords after learning about the breach.  Customers are encouraged to change their passwords on other sites if they reused their Reputation.com password.

Source: 
Media

Name.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 8, 2013
geo: 
Denver , CO
United States
Colorado US
Records Breached: 

Unknown

Hackers accessed Name.com servers and may have obtained usernames, email addresses, passwords, and credit card account information.  Customer passwords and credit card information were encrypted.  Customers were notified of the breach and received an email asking them to reset their passwords.

Source: 
Media

Linode.com

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
May 8, 2013
geo: 
Galloway , NJ
United States
New Jersey US
Extra Info: 

This notice appeared on Linode's website on April 16, 2013: https://blog.linode.com/2013/04/16/security-incident-update/

Those with questions may email support@linode.com.

Records Breached: 

Unknown

Hackers exploited an Adobe vulnerability and used it to access Linode Manager web servers.  One of Linode's web servers, parts of their source code, and their database were accessed.  No other components of the Linode infrastructure were accessed by the hackers.  Encrypted customer credit card numbers and passwords were obtained.  The group HTP claimed responsibility for the hack. 

Source: 
Media

TJG, Inc., Target Marketing

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 29, 2013
geo: 
Ashland , VA
United States
Virginia US
Records Breached: 

Unknown

The Target Marketing website was accessed by unauthorized parties on May 14.  People who used debit or credit cards on the online e-commerce platform may have had their names, email addresses, payment card numbers, expiration dates, and CVV codes accessed.

UPDATE (05/29/2013): Shumsky in Dayton, Ohio was also affected. Shumsky customers may have had their names, addresses, email addresses, credit/debit card numbers, payment card expiration dates, and CVV codes accessed.

Source: 
California Attorney General

Anasazi Hotel, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 30, 2013
geo: 
Sante Fe , NM
United States
New Mexico US
Records Breached: 

Unknown

Anasazi Hotel learned that it was a common link in a number of fraudulent credit card activities.  An investigation revealed that Anasazi's network had been accessed and customer credit card information had been accessed.  Malware that could transmit customer names and credit card information was on Anasazi's system.  Anyone who used a credit card at Anasazi between June 18, 2012 and March 21, 2013 may have been affected.

Source: 
California Attorney General

RentPath, Inc. (Primedia)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 31, 2013
geo: 
Norcross , GA
United States
Georgia US
Records Breached: 

56,000

An independent contractor with access to Primedia's network operations group was found to have stolen hardware.  The issue was discovered on June 20, 2012.  Applicants, employees, and former employees may have had several different types of personal information stolen. Approximately 56,000 Social Security numbers were discovered among the various types of information.  Approximately 30,000 former employees, employees, and applicants were identified and notified of the breach.  The other 26,000 have yet to be identified.

Source: 
California Attorney General

Drupal.org

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 30, 2013
Extra Info: 

Drupal is a volunteer-based organization and doesn't have a central location.

Records Breached: 

Unknown

A hacker or hackers exploited a vulnerability in a third-party software and used it to access accounts on drupal.org. The hackers were able to upload files to the association.drupal.org and compromised Drupal's serer. Accounts on groups.drupal.org may have also been exposed. Usernames, email addresses, hashed passwords, and country information may have been exposed.

Source: 
Media

Pages

Showing 31-40 of 738 results
Subscribe to BSO