Downeast Energy & Building Supply

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 16, 2009
geo: 
Brunswick , ME
United States
Records Breached: 

800

Downeast sent a notice after discovering that hackers had broken in and stolen more than $200,000 from the company's online bank account. Sometime prior to September, attackers planted keystroke logging malware on Downeast's computer systems, and stole the credentials the company uses to manage its bank accounts online. Hackers had gained access to the bank account the company uses to let customers pay for fuel with electronic transfers from their checking accounts. Then, on or around Sept. 2, the hackers used

Source: 
Dataloss DB

Williams Cos. Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 1, 2009
geo: 
Tulsa , OK
United States
Records Breached: 

4,400

A laptop containing personal and compensation information for more than 4,400 current and former employees was stolen from a worker's vehicle. The computer had names, birth dates, Social Security numbers and compensation data for every Williams employee since Jan. 1, 2007.

Source: 
Dataloss DB

SemGroup LP

Type of breach: 
Type of organization: 
Year of Breach: 
Date Breach Made Public: 
February 10, 2009
geo: 
Tulsa , OK
United States
Records Breached: 

160

Online banking bandits pulled thousands of dollars from the accounts of current and former employees after personal information was inadvertently left on a bankruptcy court document made public.

Source: 
Dataloss DB

Wyndham Hotels & Resorts

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
February 16, 2009
geo: 
Parsippany , NJ
United States
Records Breached: 

21,000

In mid-September 2008, the company discovered that a sophisticated hacker penetrated the computer systems of one of the hotels. By going through the centralized network connection, the hacker was then able to access and download information from several, but not all, of the other WHR properties and create a unique file containing payment card information of a small percentage of WHR customers. Potentially exposed through this breach are guest and/or

Source: 
Dataloss DB

Google

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 7, 2009
geo: 
Mountain View , CA
United States
Records Breached: 

(Not added to total. It does not appear that SSNs or financial account numbers were exposed.)

Google contacted some of its users to let them know about a situation that affected its Google Docs users. They believe the problem affected less than 0.05% of all documents. Google identified and fixed a bug where a small percentage of users shared some of their documents inadvertently. The bug occurred when the document owner, or a collaborator with sharing rights, selected multiple documents and presentations from the documents list and then

Source: 
Media

Sprint

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 11, 2009
geo: 
Overland Park , KS
United States
Extra Info: 

(800) 300-6868

Records Breached: 

Unknown (It does not appear that SSNs or financial account numbers were exposed.)

Sprint is warning several thousand customers that a former employee sold or otherwise provided their account data without permission. It appears this employee may have provided customer information to a third party in violation of Sprint policy and state law. They have terminated this employee. The information that may have been compromised includes name, address, wireless phone number, Sprint account number, security question answer, and the name of the authorized point of contact for account.

Source: 
Dataloss DB

Dezonia Group

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 12, 2009
geo: 
Chicago , IL
United States
Records Breached: 

63,000

The city of Chicago bills people for ambulance rides -- $600 and up. It uses a third party, Dezonia Group, for billing. An employee's laptop, containing patient names, addresses and Social Security numbers, was stolen from the company. Reports differ as to whether or not the data was encrypted.

Source: 
Dataloss DB

Comcast

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2009
geo: 
Philadelphia , PA
United States
Records Breached: 

4,000 Not added to total. SSNs and financial account numbers were not accessed.

A list of over 8,000 Comcast user names and passwords were available to the public via Scribd for two months, before a Wilkes University professor discovered it over the weekend after doing a search for his identity online. Comcast is saying it looks like the result of a phishing scam and isn't an inside job, and that there are so many duplicate entries on the list that it's closer to 4,000 customers who were exposed.

Source: 
Media

Symantec

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 31, 2009
geo: 
Cupertino , CA
United States
Records Breached: 

200

Symantec is warning a small number of customers that their credit card numbers may have been stolen from an Indian call center used by the security vendor. Symantec sent out warning letters , after the BBC reported that it managed to purchase credit card numbers obtained from Symantec's call center from a Delhi-based man. The letters were sent to just over 200 customers. Most of those notified are in the U.S., but the company also notified a handful of customers in the U.K. and Canada.

Source: 
Dataloss DB

MySpace

Type of breach: 
Type of organization: 
Year of Breach: 
Date Breach Made Public: 
April 16, 2009
geo: 
Los Angeles , CA
United States
Extra Info: 

(877) 369-1369

Records Breached: 

Unknown

Confidential employee information, including at least name, Social Security numbers and compensation, was taken by an employee in the company's benefit's department without authorization, beginning in June 2008 or earlier. The information was used to annoy selected individuals and the now former employee was arrested and is being prosecuted by the High Tech Crimes Division of the Los Angeles County District Attorneys Office.

Source: 
Dataloss DB

Pages

Showing 561-570 of 619 results
Subscribe to BSO