DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Author: Dissent

Details on the Jackson South Community Hospital breach

Posted on December 12, 2012 by Dissent

Details have been disclosed about a breach I noted yesterday. According to NBC in Miami: A baby born at Jackson South Community Hospital was at the center of an internal investigation into a breach of patient privacy and hospital policy – and two hospital administrators no longer work there as a result, sources said. According to sources, the…

Read more

Miami Family Medical Centre able to access/recover ransomed patient records; didn't pay ransom (UPDATED)

Posted on December 12, 2012 by Dissent

Danny Garcia reports on some good news for Miami Family Medical Centre in Australia. As I previously noted, their patient records had been encrypted by an overseas hacker who was demanding ransom to give them the encryption key: Garcia reports that Essential IT Services, a Gold Coast based reseller, was able to get them back into…

Read more

Jackson South Community Hospital managers resign in wake of privacy breach

Posted on December 11, 2012 by Dissent

Hmmm. I don’t remember reading about this breach. John Dorschner reports: Jackson Health System announced Tuesday that two managers have resigned under pressure because of an alleged breach of patient privacy in the obstetrics unit in October at Jackson South Community Hospital. Jackson spokesman Edwin O’Dell said that South’s chief nursing officer and the head…

Read more

Now-former student arrested in the University of Nebraska hack

Posted on December 11, 2012 by Dissent

Leslie Reed reports an arrest in a hacking incident that affected the University of Nebraska and state college system; A former computer science and math major at the University of Nebraska-Lincoln now faces a federal computer hacking charge from last spring’s breach of a key computer system serving both NU and the state college system….

Read more

State of California mistakenly posted 14,000 Social Security numbers on the Internet

Posted on December 11, 2012 by Dissent

KCRA has the media exclusive on a web exposure breach affecting 14,000 In-Home Supportive Services (IHSS) providers: The list includes Medi-Cal providers in 25 California counties, including Amador, Calaveras, Colusa, Nevada, Placer, Sutter, Tuolumne and Yuba. In an exclusive interview with KCRA 3, state officials from the Department of Health Care Services admitted to posting…

Read more

Pathetic, pathetic, pathetic

Posted on December 10, 2012 by Dissent

And yet again: A resident contacted Target 11 saying he had discovered boxes of documents from a non-profit development agency in the West End of Pittsburgh. He said the documents, including names and Social Security numbers, were sitting right out in the open next to a dumpster on a public sidewalk. “They contained people’s Social Security numbers, row…

Read more
  • Previous
  • 1
  • …
  • 4,132
  • 4,133
  • 4,134
  • 4,135
  • 4,136
  • 4,137
  • 4,138
  • …
  • 5,662
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.