DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No Child Left Inside Site Shut Down; Investigation Pending

Posted on April 9, 2010 by Dissent

Amanda Falcone reports from Connecticut:

The state Department of Environmental Protection has ordered its contractor to shut down nochildleftinside.org because someone hacked into the web site.

The web site is associated with the state’s No Child Left Inside initiative, which was established to encourage families to enjoy the outdoors, and it is a place where families can register for the Great Park Pursuit program, a seven-week family contest that is part of the initiative.

Because the Great Park Pursuit program is free, there is no record of financial information or social security numbers on the web site, but information like names, addresses and phone numbers is collected, said DEP Spokesman Dennis Schain.

Families who signed up for the program were notified of the breach.

The DEP is working with law enforcement officials, other state agencies and the Pita Group, of Rocky Hill, which operates the web site, to determine the extent of the breach, and the site will be shut down during the investigation, Schain said, adding that the DEP also shut down Facebook and Twitter accounts associated with No Child Left Inside.

Read more on Courant.com

No related posts.

Category: Government SectorHack

Post navigation

← Atlanta investigates security breach
HIMSS: More hospital security breaches in 2010, but greater awareness →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.