TJG, Inc., Target Marketing

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 29, 2013
geo: 
Ashland , VA
United States
Virginia US
Records Breached: 

Unknown

The Target Marketing website was accessed by unauthorized parties on May 14.  People who used debit or credit cards on the online e-commerce platform may have had their names, email addresses, payment card numbers, expiration dates, and CVV codes accessed.

UPDATE (05/29/2013): Shumsky in Dayton, Ohio was also affected. Shumsky customers may have had their names, addresses, email addresses, credit/debit card numbers, payment card expiration dates, and CVV codes accessed.

Source: 
California Attorney General

Anasazi Hotel, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 30, 2013
geo: 
Sante Fe , NM
United States
New Mexico US
Records Breached: 

Unknown

Anasazi Hotel learned that it was a common link in a number of fraudulent credit card activities.  An investigation revealed that Anasazi's network had been accessed and customer credit card information had been accessed.  Malware that could transmit customer names and credit card information was on Anasazi's system.  Anyone who used a credit card at Anasazi between June 18, 2012 and March 21, 2013 may have been affected.

Source: 
California Attorney General

RentPath, Inc. (Primedia)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 31, 2013
geo: 
Norcross , GA
United States
Georgia US
Records Breached: 

56,000

An independent contractor with access to Primedia's network operations group was found to have stolen hardware.  The issue was discovered on June 20, 2012.  Applicants, employees, and former employees may have had several different types of personal information stolen. Approximately 56,000 Social Security numbers were discovered among the various types of information.  Approximately 30,000 former employees, employees, and applicants were identified and notified of the breach.  The other 26,000 have yet to be identified.

Source: 
California Attorney General

Drupal.org

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 30, 2013
Extra Info: 

Drupal is a volunteer-based organization and doesn't have a central location.

Records Breached: 

Unknown

A hacker or hackers exploited a vulnerability in a third-party software and used it to access accounts on drupal.org. The hackers were able to upload files to the association.drupal.org and compromised Drupal's serer. Accounts on groups.drupal.org may have also been exposed. Usernames, email addresses, hashed passwords, and country information may have been exposed.

Source: 
Media

Vendini, Inc.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
May 22, 2013
geo: 
San Francisco , CA
United States
California US
Extra Info: 

Those with questions may call Vendini at 800-836-0473.

Vendini's blog statement can be read here: http://blog.vendini.com/

Records Breached: 

22,900

Anyone who used Vendini for ticket purchases may have had their financial information exposed during a March breach.  A hacker accessed Vendini's server and may have obtained customer names, addresses, email addresses, credit card numbers, and credit card expiration dates.  A total of 22,900 customers from Augusta, Maine may have been affected.  It is unclear if people from other states were also affected.

UPDATE (06/12/2013): The unauthorized intrusion was first detected on April 25.  

Source: 
Media

TLO, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2013
geo: 
Boca Raton , FL
United States
Florida US
Records Breached: 

Unknown

On January 15, 2013 TLO discovered that there had been limited fraudulent access to their system.  A hacker or hackers were able to access names, Social Security numbers, and driver's license numbers between August 2012 and January 2013. 

Source: 
California Attorney General

McKenna Long & Aldridge

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 26, 2014
geo: 
Albany
111 Washington Avenue
Albany , NY
United States
New York US
Records Breached: 

441

McKenna Long & Aldridge (MLA) informed current and former employees of suspicious activity on servers belonging to one of their vendors. Information potentially breached included Federal Wage and Tax Statement Forms W-2, names, addresses, wages, taxes and Social Security numbers, dates of birth, ages, genders, ethnicities, Visa, Passport or Federal Form I9 documents numbers.

The law firm operates 15 offices throughout the United States and one in Korea and the data breach could have affected current and former employees in any of the 14 offices.

Source: 
Maryland Attorney General

Various Taxi Cab Companies in Chicago

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 3, 2014
geo: 
Chicago Chicago , IL
United States
Illinois US
Records Breached: 

466

In an unprecedented move, First American Bank made a public announcement regarding fraudulent activity they were seeing on both credit and debit cards of customers with their bank specifically related to cab rides in the city of Chicago.

The bank is urging both residents and tourists to avoid paying for their cab rides with either debit or credit cards. The ongoing breach appears to be related to the card processing systems used by a significant amount of taxis in the city of Chicago.

Source: 
Media

Apple

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 26, 2014
geo: 
Cupertino
1 Infinite Loop
Cupertino , CA
United States
California US
Records Breached: 

Unknown

Apple has revealed a security protocol breach of their iOS and OS X systems. The hacker was able to insert him/herself between the initial verfication and verification session's destination server. This type of hacking allows the hacker to take over as the trusted user. The destination server sees the hacker as the trusted user and will then allow the hacker to access secured connections such as websites, email messages, applications where you would typically enter a user id and password.

Source: 
Media

Blue Shield of California

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 15, 2014
geo: 
San Francisco
50 Beale Street
San Francisco , CA
United States
California US
Records Breached: 

Unknown

On January 15, 2014, Blue Shield of California received information that a transaction confirmation page on their website was displaying Agent ID numbers and in some cases those Agent ID numbers were the agent's Social Security number.

Source: 
California Attorney General

Pages

Showing 41-50 of 743 results
Subscribe to BSO