Iwacu Online

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 19, 2012
geo: 
Baltimore , MD
United States
Records Breached: 

948 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Iwacu Online.  Usernames, first names, email addresses, and passwords were exposed.

Source: 
Dataloss DB

L-3 Communications Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 15, 2012
geo: 
New York , NY
United States
Records Breached: 

Unknown

A thumb drive containing information from a small number of current employees, former employees, and applicants was discovered to have been misplaced from the workstation of an employee sometime around April 16.  The drive contained names and Social Security numbers. Those who were affected were mailed notifications on May 16.  

Source: 
Dataloss DB

InfoLink, ServerPronto, CloudPronto

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 9, 2012
geo: 
Fort Lauderdale , FL
United States
Records Breached: 

1,926 (1,820 encrypted card numbers)

A hacker or hackers accessed the database information of InfoLink and posted the information online.  The intrusion appears to have taken place in November of 2011.  The leaked data included 46 administrator names, passwords and email addresses.  A total of 1,820 client names, email addresses, passwords, payment methods, card types, last four digits of payment cards, and encrypted full payment card numbers were exposed.  ServerPronto and CloudPronto affiliates were also affected.

Source: 
Dataloss DB

Crowne Plaza

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Columbus , OH
United States
Records Breached: 

Unknown

A hotel employee accidentally downloaded malware to front desk computers.  The malware was active for about ten days during the first half of March of 2012.  Customer names, addresses, credit card numbers, and credit card expiration dates may have been exposed.  

Source: 
Dataloss DB

T&M Protection Resources

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 25, 2012
geo: 
New York , NY
United States
Records Breached: 

10 (No SSNs or financial information reported)

A hacker or hackers accessed the database information of T&M Protection Resources and posted the information online.  The leaked data included 10 uersnames and passwords.

Source: 
Dataloss DB

Alaska Structures

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 29, 2012
geo: 
Anchorage , AK
United States
Records Breached: 

Unknown

A hacker or hackers accessed the website database information of Alaska Structures and defaced the website.  Some password information was posted online, but it is unclear how many usernames and passwords were obtained and distributed. 

Source: 
Dataloss DB

Gridiron Strategies

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 26, 2012
geo: 
North Palm Beach , FL
United States
Records Breached: 

2,109 (No SSNs or financial information reported)

A hacker or hackers accessed the database information of Gridiron Strategies and posted the information online.  The leaked data included 2,109 email addresses and passwords.

Source: 
Dataloss DB

Kelly Services

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 9, 2012
geo: 
Troy , MI
United States
Records Breached: 

Unknown

People who signed up for employment through the Kelly Services staffing agency may have had their personal information retained by a former Kelly Services employee.  Kelly Services retrieved all of the sensitive information from the former employee upon learning of the breach.  Names and Social Security numbers may have been exposed.  

Source: 
Dataloss DB

Suddenlink Communications, AAT Communications

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 23, 2012
geo: 
Overland Park , KS
United States
Records Breached: 

Unknown

On February 24, 2012, law enforcement notified Suddenlink management of an incident involving a former employee.  The employee had obtained the personal information of individuals who worked at Suddenlink and AAT Communications between May 22, 2006 and July 21, 2006.  Names, Social Security numbers, addresses, dates of birth, wage information, and banking information may have been exposed.  The former employee was using the information for fraudulent purposes and an investigation uncovered isolated instances of information misuse between 2006 and 2012.  The former employee was arrested.

Source: 
Dataloss DB

John Stewart Company (JSCo)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 23, 2012
geo: 
San Francisco , CA
United States
Records Breached: 

Unknown

A set of internal emails were sent to various JSCo employees on August 7 and August 13.  The emails contained the names, Social Security numbers, and in some cases, dates of birth of other employees.  Employees were instructed to delete the email upon discovery.  

Source: 
California Attorney General

Pages

Showing 31-40 of 619 results
Subscribe to BSO