Compete Inc

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 22, 2012
geo: 
Boston , MA
United States
Records Breached: 

Unknown

Compete Inc. reached an agreement with the Federal Trade Commission regarding the collection of consumer information. Compete agreed to obtain end users' consent before collecting future online browsing data.  Compete will also delete or anonymize consumer data already collected and provide direction for removing tracking software installed on the computers of those who had their data collected.

Source: 
Dataloss DB

Symantec, ImageShack

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 4, 2012
geo: 
Mountain View , CA
United States
Records Breached: 

1,000 (No SSNs or financial information exposed)

A hacking spree resulted in unauthorized access to the ImageShack server and a Symantec portal. Names, phone numbers, emails, domains, passwords, usernames, and other information were exposed.

Source: 
Dataloss DB

Adobe

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 14, 2012
geo: 
San Jose , CA
United States
Records Breached: 

230 (No SSNs or financial information reported)

A hacker released the names, email addresses, and encrypted passwords of 230 members of Adobe's company database.  The hacker claimed to have access to over 150,000 records.  Adobe announced that it would reset approximately 150,000 passwords of members of the Connectusers.com site.

Source: 
Databreaches.net

Labelmaster (American Labelmark Company)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 11, 2012
geo: 
Chicago , IL
United States
Records Breached: 

Unknown

A hacker accessed the e-commerce site labelmaster.com.  Customer names, addresses, credit card numbers, and credit card expiration dates were exposed.  

Source: 
Databreaches.net

Pinkerton Government Services (PGS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 7, 2012
geo: 
Washington , DC
United States
Records Breached: 

Unknown

The November 15 office theft of several computers may have resulted in the exposure of current and former employee information.  PGS believes that the computers were stolen for their hardware and software value rather than the information they contained.  Some former and current PGS employees had their names, addresses, Social Security numbers, and possibly other types of information exposed.

Source: 
California Attorney General

Library Systems and Services, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 17, 2012
geo: 
Germantown , MD
United States
Records Breached: 

Unknown

A laptop was discovered lost or stolen on November 5, 2012.  The possible theft is presumed to have taken place sometime around October 31, 2012.  The laptop may have contained employee names, Social Security numbers, addresses, and dates of birth.

Source: 
California Attorney General

Rollins, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 27, 2013
geo: 
Atlanta , GA
United States
Records Breached: 

Unknown

An administrative error caused a mailing distribution to contain the Social Security numbers of some people.  Rollins learned of the issue on March 12.  The Rollins TODAY quarterly issue mailed during the week of March 4 contained Social Security numbers within a number sequence on the mailing label.

Source: 
California Attorney General

MOAB Training International

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 1, 2012
geo: 
Kulpsville , PA
United States
Records Breached: 

1,442 (No SSNs or financial information reported)

A hacker or hackers accessed and publicly posted usernames, email addresses, and encrypted passwords from MOAB. Many law enforcement officials and heads of security were among the users who were affected.

Source: 
Dataloss DB

Ravelry.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2011
geo: 
Boston , MA
United States
Records Breached: 

Unknown

Hackers accessed one of Ravelry's second servers and obtained names, encrypted passwords, and possibly email addresses. Business transactions occur on the site, but no financial information was exposed during the breach.  Since hackers may be able to decrypt the passwords and link them to names and email addresses, Ravelry suggested that users immediately change their Ravelry passwords.  Users should also make different passwords for other accounts if their Ravelry password is the same as the one used for those accounts.

Source: 
Databreaches.net

Eaton Group

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 27, 2011
geo: 
Baton Rouge , LA
United States
Records Breached: 

Unknown

A local news team was alerted to a group of scattered documents near a lake and an interstate.  Most of the documents were labeled with an "Eaton Group" stamp.  The owner of the law group and collection service was not sure how the documents came to be exposed rather than properly disposed of.  The court case documents exposed names, Social Security numbers, addresses, bank statements, bank account numbers, Mastercard account numbers, and other sensitive information.

Source: 
Databreaches.net

Pages

Showing 71-80 of 623 results
Subscribe to BSO