DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More details start to emerge about Summit County Fair breach

Posted on September 6, 2014 by Dissent

Thanks to some solid reporting by David Burger, we now have some more details about the Summit County Fair data breach reported previously on this blog:

The Federal Bureau of Investigation has joined the Summit County Sheriff’s Office in investigating a security breach that resulted from a third-party vendor selling tickets to two events at the recent Summit County Fair.

[…]

According to Julie Booth, Summit County public and community affairs coordinator, the County learned Aug. 27 that EZTicketLive, a third-party online vendor contracted for the ticketing, suffered a credit and debit card breach affecting people who bought tickets for the two Fair events.

About 950 online transactions were made in buying tickets for the rodeo and demolition derby at the Fair, Booth said.

Other counties utilizing this vendor are experiencing a similar breach, Booth said, including Juab County.

A July 30, 2014 editorial in the Aberdeen News, a newspaper in South Dakota, reported that the same vendor was used for its own recent Brown County Fair, and that numerous people “expressed concerns that their credit cards have been compromised after buying their fair tickets online.

Read more on Park Record.

It appears that EZTicketLive, which was formerly hosted on EZTicketLive.com, has moved to a new server and domain name: EZTicketLive.info.

Category: Government SectorID TheftSubcontractorU.S.

Post navigation

← CSU- East Bay discloses data breach that went undiscovered for one year
Don’t value stolen computer only by its cover →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.