Labelmaster (American Labelmark Company)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 11, 2012
geo: 
Chicago , IL
United States
Records Breached: 

Unknown

A hacker accessed the e-commerce site labelmaster.com.  Customer names, addresses, credit card numbers, and credit card expiration dates were exposed.  

Source: 
Databreaches.net

Pinkerton Government Services (PGS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 7, 2012
geo: 
Washington , DC
United States
Records Breached: 

Unknown

The November 15 office theft of several computers may have resulted in the exposure of current and former employee information.  PGS believes that the computers were stolen for their hardware and software value rather than the information they contained.  Some former and current PGS employees had their names, addresses, Social Security numbers, and possibly other types of information exposed.

Source: 
California Attorney General

Library Systems and Services, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 17, 2012
geo: 
Germantown , MD
United States
Records Breached: 

Unknown

A laptop was discovered lost or stolen on November 5, 2012.  The possible theft is presumed to have taken place sometime around October 31, 2012.  The laptop may have contained employee names, Social Security numbers, addresses, and dates of birth.

Source: 
California Attorney General

World Travel Holdings (WTH)

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
December 17, 2012
geo: 
Wilmington , MA
United States
Extra Info: 

CruiseOne and Crusies Inc. are affiliated with WTH and also mailed notifications to their customers.

Records Breached: 

Unknown

An unauthorized party accessed WTH's booking system by misusing the log-in credentials of an authorized user.  Encrypted credit card numbers and expiration dates that were stored and could be decrypted in the system were exposed.

Source: 
California Attorney General

Sourcefire

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 27, 2012
geo: 
Columbia , MD
United States
Records Breached: 

500

The November 6 theft of an unencrypted laptop may have resulted in the exposure of employee Social security numbers.  It is unclear if other types of information were also exposed.  A total of 500 employees may have been affected.  

Source: 
Media

Workers United

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 21, 2012
geo: 
New York , NY
United States
Records Breached: 

Unknown

The theft of a hard drive from the office of an unnamed independent contractor resulted in the exposure of sensitive information.  The theft occurred on either October 13 or 14 of 2012 and Workers United learned of the issue on October 25.  A database with former Workers United member names and Social Security numbers was on the hard drive.

Source: 
Databreaches.net

Walz and Associates Law Firm

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 28, 2013
geo: 
Albuquerque , NM
United States
Records Breached: 

Unknown

A concerned citizen found hundreds of documents in a recycling center and notified a local news team.  The documents included criminal histories, depositions, medical records, personal phone numbers, and addresses.  Most were from the 1990's.  Most or all of the information did not need to be shredded because it was considered public record.  The local news team contacted a director from the solid waste division and the documents were removed for shredding.

Source: 
PHIPrivacy.net

Reputations.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 2, 2013
geo: 
Redwood , CA
United States
Records Breached: 

Unknowm

Reputation.com experienced a hack that exposed customer names, email addresses, mailing addresses, date of birth, and employment information. Additionally, some customers had their encrypted passwords stolen.  Reputation.com immediately reset all customer passwords after learning about the breach.  Customers are encouraged to change their passwords on other sites if they reused their Reputation.com password.

Source: 
Media

LinkedIn.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Mountain View , CA
United States
Records Breached: 

6,458,020 (No SSNs or financial information)

A file containing 6,458,020 encrypted passwords was posted online by a group of hackers. It is unclear what other types of information were taken from Linkedin users.  LinkedIn recommends that users change their passwords.

UPDATE (08/30/2012): Four potential class actions against LinkedInCorp. were consolidated.  The consolidated suits allege that LinkedIn violated its user agreement and privacy policy by failing to properly safeguard digitally stored user data. LinkedIn is also accused of not publicizing the attack in a timely manner.

Source: 
Dataloss DB

Infragard

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
June 4, 2011
geo: 
Atlanta , GA
United States
Extra Info: 

The Atlanta chapter of Infragard was affected.

Records Breached: 

180 (No SSNs or financial information reported)

The hacking group known as LulzSec published 180 usernames, hashed passwords, plain text passwords, names and email addresses from the organization.  Infragard is a non-profit that attempts to serve as an interface between the private sector, individuals and the FBI.  LulzSec targeted the organization because of its connection to the FBI.

UPDATE (6/24/2011): Infragard Connecticut may have also been breached during June.  Lulz Security (LulzSec) claims to have the information for over 1,000 accounts.

Source: 
Databreaches.net

Pages

Showing 71-80 of 630 results
Subscribe to BSO