League of Legends, Riot Games

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 20, 2013
geo: 
Santa Monica , CA
United States
California US
Records Breached: 

120,000

A security breach has resulted in the usernames, email addresses, first and last names, and encrypted passwords of League of Legends users to be exposed.  About 120,000 transaction records from 2011 may have been accessed.  The transaction records contained hashed and salted (encrypted) credit card numbers. The information was stored on a system that had not been used since 2011.

Source: 
Media

Northrop Grunman

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2013
geo: 
Suwanee , GA
United States
Georgia US
Records Breached: 

70,000

People who were linguists or applied to be linguists within Northrop Grunman Technical Services, inc. Balkans Linguist Support Program may have had their personal information exposed. A database that contained names, Social Security numbers, dates of birth, blood types, contact information, and additionaly types of government-issued identification numbers was accessed by unauthorized parties.  The breach occured sometime between November 2012 and May 2013 and was discovered on July 26.

Source: 
Media

Quayside Publishing Group

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
July 2, 2013
geo: 
Minneapolis , MN
United States
Minnesota US
Extra Info: 

Qbookshop.com, Qbookshop.net, Motorbooks.com, and WalterFoster.com were affected.

Records Breached: 

Unknown

A credit card breach resulted in the exposure of information. Customers who made online purchases at Quayside Publishing Group had their information exposed sometime around April 29.  Names, addresses, and credit card numbers were exposed until June 17.

Source: 
California Attorney General

US Airways Group

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2013
geo: 
Tempe , AZ
United States
Arizona US
Records Breached: 

7,700

US Airways customers with Divident Miles accounts may have had their information compromised.  Dates of birth, security question answers, last four digits of credit card numbers, and frequent-flier miles may have been accessed and compromised.

UPDATE (08/02/2013): Names, email addresses, and Known Traveler numbers were exposed.  in some cases mileage was stolen from the accessed accounts.

Source: 
Media

US Airways, Advanced Data Processing

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 30, 2013
geo: 
Tempe , AZ
United States
Arizona US
Records Breached: 

40,000

A programming error at Advanced Data Processing (ADP) caused employee names, Social Security numbers, and total taxable W-2 wages for the tax years 2010, 2011, and 2012 to be exposed.  A group of other US Airway employees were able to download the payroll information of their colleagues.  ADP corrected the issue in early May and notified US Airways in early June.

Source: 
Media

US Airways, McKesson, City of Houston, Automatic Data Processing (ADP), AlliedBarton Security Services

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 30, 2013
geo: 
Tempe , AZ
United States
Arizona US
Records Breached: 

4,500

A programming error at ADP resulted in the exposure of employee names, Social Security numbers, and other information on W-2 forms.  Employees could have inadvertently downloaded the W-2s of other employees.  The error was corrected on May 4 and involved W-2 forms for tax years 2010, 2011, and/or 2012. ADP alerted US Airways to the issue on June 6, 2013.

UPDATE (09/13/2013): McKesson and the city of Houston were also affected by the breach.

Source: 
Media

Academy Studios

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 16, 2013
geo: 
Novato , CA
United States
California US
Records Breached: 

Unknown

Personnel records were discarded in a public dumpster after Academy Studios. The non-profit closed in April and many of its assets were sold in an online auction on May 21.  The personnel paperwork included names, Social Security numbers, dates of birth, copies of passports, copies of drivers' licenses, I-9 forms, and other employee information.

Source: 
Media

InterContinental Mark Hopkins San Francisco

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 3, 2013
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

A July 4 burglary resulted in the exposure of guest information.  The names, addresses, email addresses, phone numbers, and credit and debit card numbers of guests were on a computer hard drive that was stolen.  The hotel learned of the possibility of a breach of guest data on July 14 and alerted guests around August 8.

Source: 
Media

Comcast Phone

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
October 3, 2013
geo: 
Bay Area , CA
United States
California US
Records Breached: 

74,000

The California Public Utilities Commission launched an investigation into the unauthorized disclosure and publication of Comcast subscribers' unlisted names, telephone numbers and addresses to determine whether Comcast violated the laws, rules, and regulations of California.

UPDATE (8/25/2014): An evidentiary hearing has been scheduled in this case for September 2014 to investigate whether or not Comcast broke the law.

 

Source: 
Government Agency

MongoHQ

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 29, 2013
geo: 
Mountain View , CA
United States
California US
Records Breached: 

Unknown

MongoHQ's internal system was compromised.  The system allowed certain administrative users to appear as other users.  MongoHQ reset all employee accounts and will enable devices, email, and internal applications after a credential reset and audit.  

Source: 
Media

Pages

Showing 71-80 of 708 results
Subscribe to BSO