Crown Castle International Corp

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 25, 2013
geo: 
Canonsburg , PA
United States
Pennsylvania US
Records Breached: 

Unknown

Crown Castle determined on October 31 that their payroll information may have been accessed by hackers.  Employee names, Social Security numbers, and compensation may have been exposed.

Source: 
Media

Comcast Phone

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
October 3, 2013
geo: 
Bay Area , CA
United States
California US
Records Breached: 

74,000

The California Public Utilities Commission launched an investigation into the unauthorized disclosure and publication of Comcast subscribers' unlisted names, telephone numbers and addresses to determine whether Comcast violated the laws, rules, and regulations of California.

UPDATE (8/25/2014): An evidentiary hearing has been scheduled in this case for September 2014 to investigate whether or not Comcast broke the law.

 

Source: 
Government Agency

Hogan Services Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 17, 2012
geo: 
Saint Louis , MO
United States
Missouri US
Records Breached: 

1,134 (No SSNS or financial information reported)

An email or emails with sensitive health information related to a health care premium plan was mistakenly emailed to or accessed by unauthorized people.  The incident occurred or was discovered sometime around March 30, 2012.  The incident was posted on the HHS website on June 8.

Source: 
HHS via PHIPrivacy.net

Crowne Plaza

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Columbus , OH
United States
Ohio US
Records Breached: 

Unknown

A hotel employee accidentally downloaded malware to front desk computers.  The malware was active for about ten days during the first half of March of 2012.  Customer names, addresses, credit card numbers, and credit card expiration dates may have been exposed.  

Source: 
Dataloss DB

InfoLink, ServerPronto, CloudPronto

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 9, 2012
geo: 
Fort Lauderdale , FL
United States
Florida US
Records Breached: 

1,926 (1,820 encrypted card numbers)

A hacker or hackers accessed the database information of InfoLink and posted the information online.  The intrusion appears to have taken place in November of 2011.  The leaked data included 46 administrator names, passwords and email addresses.  A total of 1,820 client names, email addresses, passwords, payment methods, card types, last four digits of payment cards, and encrypted full payment card numbers were exposed.  ServerPronto and CloudPronto affiliates were also affected.

Source: 
Dataloss DB

L-3 Communications Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 15, 2012
geo: 
New York , NY
United States
New York US
Records Breached: 

Unknown

A thumb drive containing information from a small number of current employees, former employees, and applicants was discovered to have been misplaced from the workstation of an employee sometime around April 16.  The drive contained names and Social Security numbers. Those who were affected were mailed notifications on May 16.  

Source: 
Dataloss DB

Iwacu Online

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 19, 2012
geo: 
Baltimore , MD
United States
Maryland US
Records Breached: 

948 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Iwacu Online.  Usernames, first names, email addresses, and passwords were exposed.

Source: 
Dataloss DB

Friendping.com

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 7, 2012
geo: 
Denver , CO
United States
Colorado US
Records Breached: 

647 (No SSNs or financial information reported)

A hacker or hackers accessed and posted sensitive information from Friendping.com.  Passwords and email addresses were exposed.

Source: 
Dataloss DB

DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Next Day Flyers (Postcard Press, Inc.)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 6, 2012
geo: 
Torrance , CA
United States
California US
Records Breached: 

Unknown

On April 2, 2012, an electronic file was discovered on Next Day Flyer's system.  The file was storing transaction information for customers who placed orders through the company's website between March 23, 2012 and April 2, 2012.  It was discovered when the company found out that an unauthorized person was trying to disrupt traffic to Next Day Flyer's website.  The file was removed, but customer names, credit card information, email addresses, and postal addresses may have been exposed.  

Source: 
California Attorney General

Pages

Showing 91-100 of 738 results
Subscribe to BSO