Los Angeles Times, OffersandDeals.latimes.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 13, 2013
geo: 
Los Angeles , CA
United States
Records Breached: 

Unknown

The Los Angeles Times learned that a segment of its website housed malicious code for six weeks.  The subdomain OffersandDeals.latimes.com redirected visitors to a malicious website.  The website then used code to receive compensation for web traffic.  The compromise appears to have occurred sometime before December 23, 2012.  An LA Times spokesperson initially responded to the breach by claiming that a glitch in Google's display ad exchange had caused a malicious script warning rather than actual malicious script.

Source: 
Media

LexisNexis, Sprechman & Associates

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 22, 2013
geo: 
Miami , FL
United States
Records Breached: 

20,000

LexisNexis informed Sprechman & Associates that the unusual, excessive activity of an associate caused them to eliminate that associate's access to LexisNexis' database.  The associate was later found to have misused Social Security numbers in order to file over 11 million dollars in fraudulent tax refund claims. The dishonest associate was not immediately fired from Sprechman & Associates and was terminated in July 2012 when law enforcement used a warrant to search his home and office computers.  

Source: 
Databreaches.net

Information Handling Services, Inc. (IHS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 27, 2013
geo: 
Englewood , CO
United States
Records Breached: 

Unknown

Hackers breached the servers of IHS and may have been able to access credit card, customer, and nuclear information.  IHS does not believe that confidential information was compromised.  However, the hacker group claimed to have obtained the records of 8,500 customers. The hacker group is known to attack sites in order to further their goal of revealing sensitive nuclear data to pressure the Israeli government and others into disclosing their nuclear activities.

Source: 
Media

Bit9, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 27, 2013
geo: 
Waltham , MA
United States
Records Breached: 

Unknown

Hackers were able to exploit a vulnerability in a web application and use an SQL injection.  The breach occurred in July of 2012, however the server was shut down until January of 2013. Hackers then used Bit9's systems to attack other organizations who relied on Bit9 as a security platform vendor.  Three unnamed companies were affected.  The vulnerability was caused by Bit9 failing to install its own security software.

Source: 
Media

Evernote

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 3, 2013
geo: 
Redwood City , CA
United States
Extra Info: 

Evernote's breach notice can be found herehttp://evernote.com/corp/news/password_reset.php.

Records Breached: 

50,000,000 (No SSNs or financial information reported)

A hacker or hackers attacked and may have accessed Evernote's online system. Evernote reset all user passwords as a precaution.  User names, email addresses, and encrypted passwords may have been exposed. 

UPDATE (03/09/2013): A total of 50 million users were told to reset their passwords.

Source: 
Media

Facebook

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
February 15, 2013
geo: 
Menlo Park , CA
United States
Extra Info: 
Records Breached: 

Unknown

Facebook discovered that hackers had exploited a vulnerability and accessed unspecified data.  Facebook found no evidence that Facebook user data was compromised.  Malware was installed on a number of employee laptops after a small number of them visited a mobile developer website that turned out to be unsafe. Microsoft, Twitter, and Apple were affected by the same issue around the same time.

Source: 
Media

Tribune Co.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 15, 2013
geo: 
Sacramento , CA
United States
Records Breached: 

Unknown

A former employee revealed a password and username combination for Tribune Co. to hackers.  The hackers were part of anonymous and used the information to access Tribune Co.'s servers in 2010.  A number of online stories that had been published through Tribune Co. were defaced by hackers as a result.  

The former employee of a TV station owned by Tribune Co. was indicted on charges of conspiracy to cause damage to a protected computer, transmission of malicious code, and attempted transmission of malicious code.

Source: 
Media

Pinkerton Government Services (PGS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 7, 2012
geo: 
Washington , DC
United States
Records Breached: 

Unknown

The November 15 office theft of several computers may have resulted in the exposure of current and former employee information.  PGS believes that the computers were stolen for their hardware and software value rather than the information they contained.  Some former and current PGS employees had their names, addresses, Social Security numbers, and possibly other types of information exposed.

Source: 
California Attorney General

Labelmaster (American Labelmark Company)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 11, 2012
geo: 
Chicago , IL
United States
Records Breached: 

Unknown

A hacker accessed the e-commerce site labelmaster.com.  Customer names, addresses, credit card numbers, and credit card expiration dates were exposed.  

Source: 
Databreaches.net

Zybez

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Huntsville , AL
United States
Records Breached: 

353 (No SSNs or financial information reported)

A hacker or hackers accessed and exposed information from Zybez.  Usernames, email addresses, IP addresses, and passwords were exposed.

Source: 
Dataloss DB

Pages

Showing 51-60 of 619 results
Subscribe to BSO