I haven’t seen this in any media source, but the Wisconsin Office of Privacy Protection updated its site to report an incident involving Breakout Apparel Co. According to the site, a burglary occurred at the business and a safe with checks from customers along with cash was stolen. A total of 222 customers who paid…
Category: Business Sector
Computer hackers victimize Portsmouth coffee shop customers
Gina Morris of Providence Journal reports: One day last August, the Secret Service paid a visit to the new owners of Custom House Coffee off West Main Road. The news they brought was bad: Computer hackers, whereabouts unknown, had used sophisticated spy software to break into the store’s wireless network and steal the credit and…
Bits ‘n Pieces
In the justice system: Federal prosecutors in Virginia have leveled conspiracy and bank-fraud charges against the alleged leader and nine members of a national organization of high-tech pickpockets called “Cannon to the Wiz” that’s been the scourge of police around the country since at least early 2007. Personal info on over 120 victims was found…
Stolen CS Stars laptop had claimants’ data
On June 2, CS Stars notified the New Hampshire Attorney General that a portable hard drive containing unencrypted personal information was stolen from an employee’s car on May 9. The total number of claimants affected was not indicated, but there were 94 residents of New Hampshire affected. According to their letter (pdf), CS Stars provides…
T-Mobile Hacked? Yes. Maybe. No.
It’s been a confusing few days for those trying to understand what T-Mobile press releases were really saying about what they found when they investigated claims on the Full Disclosure mail list. Their somewhat terse statements led some of us to conclude that they were saying that they had some evidence of data theft, while…
Update: T-Mobile confirms some data theft
I received an updated statement from T-Mobile overnight. Their revised statement confirms that at least some data were stolen, but they do not confirm that the breach described on the the Full Disclosure mail list was as extensive as the hackers claimed when they posted, “We have everything, their databases, confidental documents, scripts and programs…