DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Under the media radar: recently reported breaches

Posted on July 15, 2010 by Dissent

In a recent press release, the Identity Theft Resource Center (ITRC) pointed out that in some cases, we only find out about breaches because a state lists the reports it receives online. Some recent submissions to the New Hampshire Attorney General’s Office are a case in point. Although most of the breaches reported below would probably be considered “minor,” they do suggest that focusing mainly on stolen laptop cases may yield an incorrect impression about the nature of most breaches.

  1. Attorneys for Nix Check Cashing recently notified the New Hampshire Attorney General’s Office that during a burglary, a computer was stolen from one of the firm’s branches. The computer contained personal information on customers, including their names, addresses, phone numbers, and Social Security Numbers or driver’s license numbers. The burglary was reported to law enforcement on May 17, and letters were sent out the week of June 30 to those affected. The firm offered those affected free credit monitoring services. Over one hundred New Hampshire residents were being notified, but the total number of affected individuals was not reported.
  2. NBTY, a manufacturer of vitamins and supplements, notified the New Hampshire Attorney General’s Office on July 7 that an e-mail containing some current and former employees’ and plan participants’ personal information had been sent to the wrong recipient on June 15. Information included names, dates of birth, and Social Security Numbers. Those affected were notified by letter on July 2 and offered free credit monitoring services.
  3. Alcoa recently notified the New Hampshire Attorney General’s Office that an electronic folder containing personal information on current and former expatriates as well as others who received assistance from Alcoa’s Global Mobility Group had been inadvertently shared as a public folder within its network. Information on individuals included names, dates of birth, family members’ names and dates of birth, salary compensation, Social Security Numbers, and in some cases, medical information.  Alcoa discovered its error in permissions on the file on May 7 and has notified everyone affected although they say there is no indication that anyone accessed or viewed the file inappropriately and the file was not shared outside of its own internal network.
  4. Equifax reported that someone had compromised the access and request information for Takapu International Exports. Takapu is a customer of Equifax Mortgage Services and the account was misused to make obtain merged credit reports, i.e., reports from Equifax, TransUnion, and Experian. It is not clear from Equifax’s notification how many people, total, may have had their information accessed by misuse of the account. Equifax reports that it suspended Takapu’s login information at the time and was working with Takapu to determine what had happened and to prevent future recurrences.

Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
Category: Breach IncidentsBusiness SectorExposureFinancial SectorTheftU.S.Unauthorized Access

Post navigation

← Top 50 Sites to Learn About Information Privacy
Visa To Acquirers: Stop Forcing PAN Retention →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.