Crown Castle International Corp

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 25, 2013
geo: 
Canonsburg , PA
United States
Pennsylvania US
Records Breached: 

Unknown

Crown Castle determined on October 31 that their payroll information may have been accessed by hackers.  Employee names, Social Security numbers, and compensation may have been exposed.

Source: 
Media

The Flamingo Resort and Spa

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
November 28, 2013
geo: 
Santa Rosa , CA
United States
California US
Extra Info: 

Employees with questions may call 1-(800)-848-8300.

Records Breached: 

Unknown

A virus was discovered on The Flamingo Resort and Spa payroll computer.  Employee names, Social Security numbers, bank routing numbers for those who used direct deposit, dates of birth, phone numbers, and home addresses may have been exposed.

Source: 
Media

Bell Helicopter

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 4, 2013
geo: 
Hurst , TX
United States
Texas US
Records Breached: 

Unknown

On July 3, Bell Helicopter learned that some people who attended Bell Helicopter Training Academy were receiving phishing emails from a source claiming to be Bell. It appears that Bell's database of attendee information was accessed by a cyber intruder.  Attendees may have had their email addresses and credit card numbers exposed.

Source: 
Media

ICG America (Amazing Clubs, Games2U, Flying Noodle, Monster Brew, Texas Irons, California Reds)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 28, 2013
geo: 
Austin , TX
United States
Texas US
Records Breached: 

Unknown

ICG America Learned that its payment processing system was the target of a cyber attack.  The attack began on January 2, 2013 and continued until August 2, 2013.  Customers who made purchases from companies operated by ICG America may have had their names, credit card and debit card numbers, expiration dates, CVV codes, addresses, and email addresses exposed.

Source: 
Media

LexisNexis, Dun & Bradstreet, Kroll Background America

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 26, 2013
geo: 
Short Hills , NJ
United States
New Jersey US
Records Breached: 

Unknown

Hackers were able to access an underground database of stolen consumer information.  It was discovered that the network was set up to receive information from internal systems at several large data brokers.  LexisNexis was one of the data brokers that was affected and discovered that their networks may have been compromised for at least five months.  Dun & Bradstreet discovered that their systems had been compromised as far back as March 27, 2013.  The breach of Kroll Background America, Inc. had began as far back as June 2013.

Source: 
Media

GitHub

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 20, 2013
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

A hacker or hackers compromised some of the user accounts of GitHub.  The hackers used a brute force attack to expose passwords.  GitHub reset the passwords of users who were affected.

Source: 
Media

CorporateCarOnline.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 4, 2013
geo: 
Kirkwood , MO
United States
Missouri US
Records Breached: 

850,000

Hackers stole and stored information online related to customers who used limousine and other ground transportation.  The online information included plain text archives of credit card numbers, expiration dates, names, and addresses.  Many of the customers were wealthy and used credit cards that would be attractive to identity thieves.

Source: 
Media

Ektron

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 31, 2013
geo: 
Nashua , NH
United States
New Hampshire US
Records Breached: 

22

The June 15 hack of Ektron resulted in the exposure of current and former employee information.  Names, Social Security numbers, immigration visas, passport numbers, and employee authorization cards were exposed.  Ektron learned of the breach in July and hired a third party firm to investigate the scope of the breach in August.

Source: 
Databreaches.net

Paragon Benefits Inc, TSYS Employee Health Plan

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 31, 2013
geo: 
Columbus , GA
United States
Georgia US
Records Breached: 

5,232

An employee of a temporary staffing agency who was working at Paragon Benefits Inc. emailed personal information to his own Gmail account for fraudulent purposes.  The information came from TSYS employees. The dishonest employee was arrested and charged with felony identity theft.  Two spreadsheets that contained names, Social Security numbers, dates of birth, and home addresses were sent.  At least 1,000 TSYS former employees and 11 family members had their information exposed.

Source: 
Media

Clarity Media Group

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 21, 2013
geo: 
Denver , CO
United States
Colorado US
Records Breached: 

Unknown

The October 12 theft of a laptop resulted in the exposure of current and former employee information.  Current and former employees of Clarity Media Group's subsidiaries and of Freedom Communications were also affected.  Names, Social Security numbers, mailing addresses, email addresses, phone numbers, dates of birth, salaries, and 401(k) balances were on the laptop.  The dependents of employees may have also had their information exposed.

Source: 
Media

Pages

Showing 71-80 of 743 results
Subscribe to BSO