Hostgator

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 23, 2013
geo: 
Houston , TX
United States
Records Breached: 

Unknown

An employee was found to have installed backdoors on more than 2,700 company servers.  The issue was discovered the day after the dishonest employee was dismissed.  He worked for Hostgator from September 2011 to February 15, 2012. The dishonest employee was arrested and charged with breach of computer security.

Source: 
Media

Vendini, Inc.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
May 22, 2013
geo: 
San Francisco , CA
United States
Extra Info: 

Those with questions may call Vendini at 800-836-0473.

Vendini's blog statement can be read here: http://blog.vendini.com/

Records Breached: 

22,900

Anyone who used Vendini for ticket purchases may have had their financial information exposed during a March breach.  A hacker accessed Vendini's server and may have obtained customer names, addresses, email addresses, credit card numbers, and credit card expiration dates.  A total of 22,900 customers from Augusta, Maine may have been affected.  It is unclear if people from other states were also affected.

UPDATE (06/12/2013): The unauthorized intrusion was first detected on April 25.  

Source: 
Media

Institutional Shareholder Services

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 23, 2013
geo: 
Boston , MA
United States
Records Breached: 

100 (No SSNs or financial information reported)

An employee of Institutional Shareholder Services (ISS) shared nonpublic voting data in exchange for $15,000 in concert tickets and $20,000 in meals.  From 2007 through early 2012 an ISS employee provided nonpublic information on how over 100 ISS clients were voting on proxy ballots to a firm that gathers shareholder votes.  ISS will pay The Securities and Exchange Commission $300,000 to settle civil charges and penalties.

Source: 
Media

Weather Shield

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 16, 2013
geo: 
Medford , WI
United States
Records Breached: 

Unknown

A total of 55 current and former Weather Shield employees across the country discovered that someone had stolen their identities and filed fraudulent tax refunds.  Several employees who were victims of identity theft in 2012 discovered that they had been affected again when filing their taxes in April of 2013. It is unclear how the 2012 or 2013 breaches occurred.

Source: 
Media

Goldman Sachs, Bloomberg LP

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 18, 2013
geo: 
New York , NY
United States
Records Breached: 

Unknown

Bloomberg News reporters were able to monitor clients' usage of data terminals leased from Bloomberg LP.  Goldman Sachs is one of the companies that has complained publicly while JP Morgan Chase, the Federal Reserve, and the United States Treasury Department have started investigations. It is unclear how many other organizations may have been affected.  

Source: 
Media

Iberdola USA, Central Maine Power

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 16, 2013
geo: 
Augusta , ME
United States
Records Breached: 

5,100 (No SSNs or financial information reported)

A hack of Iberdrola USA's recruitment website may have exposed the information of anyone who applied for a job at Central Maine Power or any of its sister companies since January 2007.  Rochester Gas and Electric Corp and New York State Electric and Gas Corp. were also affected.

Source: 
Media

Linode.com

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
May 8, 2013
geo: 
Galloway , NJ
United States
Extra Info: 

This notice appeared on Linode's website on April 16, 2013: https://blog.linode.com/2013/04/16/security-incident-update/

Those with questions may email support@linode.com.

Records Breached: 

Unknown

Hackers exploited an Adobe vulnerability and used it to access Linode Manager web servers.  One of Linode's web servers, parts of their source code, and their database were accessed.  No other components of the Linode infrastructure were accessed by the hackers.  Encrypted customer credit card numbers and passwords were obtained.  The group HTP claimed responsibility for the hack. 

Source: 
Media

Name.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 8, 2013
geo: 
Denver , CO
United States
Records Breached: 

Unknown

Hackers accessed Name.com servers and may have obtained usernames, email addresses, passwords, and credit card account information.  Customer passwords and credit card information were encrypted.  Customers were notified of the breach and received an email asking them to reset their passwords.

Source: 
Media

Reputations.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 2, 2013
geo: 
Redwood , CA
United States
Records Breached: 

Unknowm

Reputation.com experienced a hack that exposed customer names, email addresses, mailing addresses, date of birth, and employment information. Additionally, some customers had their encrypted passwords stolen.  Reputation.com immediately reset all customer passwords after learning about the breach.  Customers are encouraged to change their passwords on other sites if they reused their Reputation.com password.

Source: 
Media

Evernote

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 3, 2013
geo: 
Redwood City , CA
United States
Extra Info: 

Evernote's breach notice can be found herehttp://evernote.com/corp/news/password_reset.php.

Records Breached: 

50,000,000 (No SSNs or financial information reported)

A hacker or hackers attacked and may have accessed Evernote's online system. Evernote reset all user passwords as a precaution.  User names, email addresses, and encrypted passwords may have been exposed. 

UPDATE (03/09/2013): A total of 50 million users were told to reset their passwords.

Source: 
Media

Pages

Showing 51-60 of 640 results
Subscribe to BSO