McKenna Long & Aldridge

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 26, 2014
geo: 
Albany
111 Washington Avenue
Albany , NY
United States
New York US
Records Breached: 

441

McKenna Long & Aldridge (MLA) informed current and former employees of suspicious activity on servers belonging to one of their vendors. Information potentially breached included Federal Wage and Tax Statement Forms W-2, names, addresses, wages, taxes and Social Security numbers, dates of birth, ages, genders, ethnicities, Visa, Passport or Federal Form I9 documents numbers.

The law firm operates 15 offices throughout the United States and one in Korea and the data breach could have affected current and former employees in any of the 14 offices.

Source: 
Maryland Attorney General

Willis North America Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 25, 2014
geo: 
Nashville
26 Century Boulevard
Nashville , TN
United States
Tennessee US
Records Breached: 

Unknown

Willis North America Inc, informed customers that on "March 19, 2014 an email was sent internally to a group of current Willis Associates who were enrolled in the medical Plan's Healthy Rewards Program". The original email sent out to customers was as a reminder for a special program through their company, however the individual who sent the email "accidentally attached a spreadsheet to the email that was not meant to be included".

Source: 
Vermont Attorney General

ground (ctrl)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 5, 2014
geo: 
Sacramento
120 K Street
Sacramento , CA
United States
California US
Records Breached: 

Unknown

ground(ctrl) operates social networking community websites focused on musicians, informed customers of a data breach to their website. The information breached included e-mail addresses and passwords. The company did inform customers that their credit card information was never stored with them and was not at risk.

For those affected, the company is recommending that usernames and passwords be changed. For questions individuals can call 1-877-463-2875 or via email at security@groundctrl.com.

Source: 
California Attorney General

JCM Partners LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 1, 2014
geo: 
Georgia
PO Box 3825
Suwanee , GA
United States
Georgia US
Records Breached: 

Uknown

JCM Partners informed customers of a data breach that occured when a file containing personal information of housing applicants was taken from a JCM database and posted on an unauthorized website. An internal investigation was launched.

The information in the file included Social Security numbers, driver's license numbers, email addresses and mailing addresses.

The company is providing 12 months of AllClear Secure and those affected are automatically eligible and can call 1-877-979-2595.

Source: 
California Attorney General

AOL

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 28, 2014
geo: 
New York
770 North Broadway
New York , NY
United States
New York US
Records Breached: 

Unknown

AOL has sent a message to millions of its account holders of a data breach to their system urging them to change their usernames and passwords. AOL won't confirm an exact number but it appears to be approximately 2 percent of its accounts.

AOL noticed the attack when a significant amount of spam began appearing from spoofed emails from AOL account holders email addresses.

Source: 
Media

Snelling Staffing LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 22, 2014
geo: 
Dallas Texas
4055 Valley View Lane
Dallas , TX
United States
Texas US
Records Breached: 

Unknown

Snelling Staffing LLC informed current and previous employees of a data breach that exposed personal information to others via the Internet due to an installation error of a cloud based server at the home of a former Snelling employee, on January 24, 2014.

The information exposed included Social Security numbers, driver's license numbers, dates of birth, home addresses, medical information, alleged criminal activity and/or drug test results.

The company did discover that breach and shut down access to the information within the same day.

Source: 
California Attorney General

StumbleUpon

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 8, 2014
geo: 
San Francisco San Francisco , CA
United States
California US
Records Breached: 

Unknown

The San Francisco based Internet company has informed customers of a potential breach that may have occured in their system. The company sent notification out to customers noticing suspicious activity on their account and in turn locked their accounts and reset their passwords.

The company reported that the breach included only passwords.

Source: 
California Attorney General

Boxee

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 2, 2014
geo: 
New Jersey Ridgefield Park , NJ
United States
New Jersey US
Records Breached: 

158,128

The personal data of over 158,000 Boxee.tv forum accounts were hacked and leaked online to a Tor Internet site and at least one researcher. The information included email addresses, birth dates, IP addresses, message histories, and password changes. It also included message archives and past password changes.

The company was purchased by Samsung last July.

Source: 
Media

Ebay

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 21, 2014
geo: 
San Jose California
2065 Hamilton Avenue
San Jose , CA
United States
California US
Records Breached: 

145,000,000

Ebay, the online auction site, was hacked between late February and early March with login credentials obtained from employees. The hackers then accessed a database containing user records of approximately 145 million users which they appeared to have copied.

The information included email addresses, encrypted passwords, birth dates, mailing addresses. The company reports that no financial data or PayPal databases were compromised.

The company is encouraging all who were affected to login into their account and change their passwords.

Source: 
Media

Paytime Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 21, 2014
geo: 
Mechanicsburg Pennsylvania
5053 Ritter Road Suite 100
Mechanicsburg , PA
United States
Pennsylvania US
Records Breached: 

Unknown

Paytime Inc, a payroll service for corporations, notified customers of a data breach to their payroll system. The hackers obtained usernames and passwords to their system and were able to obtain Social Security numbers, direct deposit account information, dates of birth, hire dates, wage information, home and cell phone numbers, other payroll information and home addresses.

The company is providing one year free of AllClearID. Those affected are asked to call 1-855-398-6436.

Source: 
California Attorney General

Pages

Showing 51-60 of 761 results
Subscribe to BSO