DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IL: Plainfield Schools Job Application Website Hacked (updated)

Posted on October 15, 2012 by Dissent

Shannon Antinori reports:

Anyone who applied online for a job in District 202 over the last few years got a nasty surprise on Saturday, after a hacker breached security on a website used by the district for employment applications.

[…]

Hernandez said District 202 officials have been in touch with the company that owns the website, www.applitrack.com.

The website was shut down early Saturday evening, according to a message sent out by the district Saturday night. Hernandez said school district officials are still working with the company to determine exactly how much information was compromised.

“What I can say with certainty is that it did not gather [social security numbers] because we don’t ask for that on job applications,” he said.

Read more on Patch.com

Update:  Arrest made.

Category: Breach IncidentsEducation SectorHackU.S.

Post navigation

← 7 Bulgarian Sites Breached, 5000+ accounts leaked by DoktorBass
UK: Greater Manchester Police force pays £120,000 penalty following data breach last year →

2 thoughts on “IL: Plainfield Schools Job Application Website Hacked (updated)”

  1. gman says:
    October 25, 2012 at 11:02 am

    I am glad they are keeping our stuff “so secure” that a fairly computer savvy kid was able to get into the servers with the passwords. Real experts, yet they are telling us “there is no evidence user data was compromised”. Well, there is no evidence to the contrary either.

  2. plaincit says:
    October 25, 2012 at 11:05 am

    The fact that the districts server had been so unsafe speaks for itself. Based on their negligence and inability to run a reasonable safe system I have no confidence in the comments stating that “there is no evidence that user data was taken”.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack pushes German napkin company into insolvency
  • WMATA Train Operators Arrested in Health Care Fraud Scheme
  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.