Trilegiant Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 14, 2011
geo: 
Stamford , CT
United States
Records Breached: 

Unknown

A call center employee who worked for a Trilegiant vendor used his phone to take pictures of customer names and credit or debit card numbers.  The dishonest employee was seen doing this at least once, but no misuse of customer information had been reported as of December 14, 2011.

Source: 
Databreaches.net

Mr. Janitor, Eagle Harbor Country Club

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 13, 2011
geo: 
St. Augustine , FL
United States
Records Breached: 

Unknown

The owner of a cleaning company called "Mr. Janitor" was arrested for stealing personal information from Eagle Harbor Country Club members.  An unknown number of members had their information stolen and used to open fraudulent credit cards and bank accounts in their names.  The owner of the cleaning company was charged with identity theft of more than $50,000 and/or affecting more than twenty persons.

Source: 
Databreaches.net

Amsterdam Hospitality Group

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 4, 2011
geo: 
New York , NY
United States
Records Breached: 

237

An auditor for the Amsterdam Hospitality Group sold credit card information to another man for identity theft purposes. As an employee for the Amsterdam Hospitality Group, the auditor had access to the credit card account information and identifying information of people who stayed at a number of Manhattan hotels.  It is unclear which hotels were affected. Over $840,000 in fraudulent credit card purchases were made with the stolen information.

Source: 
Databreaches.net

IQCR

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 8, 2011
geo: 
Rock Hill , SC
United States
Records Breached: 

100

An employee of IQCR wrote down names, Social Security numbers, and dates of birth from records. The records came from a gas company in Chicago and were processed by IQCR.  That information was then used to apply for credit cards.  This occurred in October of 2011.  The dishonest employee and her partner were caught after people alerted authorities about being declined for credit cards they had not requested.  Authorities discovered that the fraudulent credit requests all came from the same computer IP address and went to the same residential address.

Source: 
Databreaches.net

Craigslist

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 27, 2012
geo: 
Hempstead , NY
United States
Records Breached: 

250

More than 250 people in 30 states were victims of scams perpetrated on Craigslist.com by two New York residents.  The women posted phony Craigslist ads for nonexistent jobs and apartments to gather the personal information of victims between February of 2010 and October of 2011.  That information was then used to obtain fraudulent state income tax returns, bank loans, and credit cards.  More than $75,000 was fraudulently obtained.

Source: 
Databreaches.net

SegMark Solutions

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 31, 2012
geo: 
Fairfield , CT
United States
Records Breached: 

Unknown

A former employee was able to access the Segmark Solutions computer system.  It is unclear if the former employee guessed passwords, used passwords that had not been changed, or used some other method to access the computer system.  He then used credit card information in the system to make fraudulent purchases. Damages caused a total of $7,000.  The former employee was caught after a six-month investigation and charged with second degree computer crime and illegal use of credit cards.

Source: 
Databreaches.net

VeriSign Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 2, 2012
geo: 
Reston , VA
United States
Records Breached: 

Unknown

VeriSign was hacked repeatedly in 2010. The hackers stole undisclosed information.  VeriSign is responsible for the integrity of web addresses ending in.com, .net, and .gov. If hackers were able to obtain certain information, it is possible that .com, .net, and .gov websites could be imitated more easily.  Hackers may be able to direct people to faked website and intercept email from federal employees or corporate executives using the .gov addresses.

Source: 
Databreaches.net

Security Savings Systems, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
February 3, 2012
geo: 
New Cumberland , PA
United States
Records Breached: 

2,038

A printing error caused thousands of taxpayers to receive 1099-G forms from 2011 with the Social Security number and tax refund of another taxpayer.  The mistake occurred because the company was trying to conserve paper.  The forms were supposed to be cut below a certain point, but the bottom half remained attached.  

Source: 
Databreaches.net

ValueOptions, National Elevator Industry

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 9, 2011
geo: 
Newtown Square , PA
United States
Records Breached: 

7,019

On July 6, 2011, four tape cartridges with sensitive information were shipped in a container from VOI.  The container was placed into a cardboard shipping box and shipped.  ValueOptions Inc. (VOI) was informed that the package had not arrive as of August 1. An outside agency investigated the loss of the packages until September 22.  Notification that the tapes had been lost was sent on November 4.  The tapes contained names, addresses, phone numbers, dates of birth, Social Security numbers, and plan subscriber ID numbers.

Source: 
Databreaches.net

Providencenightlife.net

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 13, 2011
geo: 
Providence , RI
United States
Records Breached: 

50,000 (No SSNs or financial information reported)

Hackers posted data from providencenightlife.net users onto Pastebin.  The data included usernames, clear-text passwords, and email addresses.  

Source: 
Databreaches.net

Pages

Showing 91-100 of 651 results
Subscribe to BSO