DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Most attacks on federal networks financially motivated

Posted on August 15, 2010 by Dissent

Jill R. Aitoro reports: Most malware attacks against federal agencies are financially motivated, seeking to trick computer users into buying fake security software or providing personal information that can be used to hack into their bank accounts. Although espionage and terrorism often are considered the primary motivations for breaking into government networks, 90 percent of…

Read more

Doherty Hotel’s database fraudulently accessed; 150 credit cards subject of probe

Posted on August 14, 2010 by Dissent

Cindy Cranmer reports: More than 150 credit card holders who frequented a local business that had its database accessed have seen fraudulent charges appear on their cards in a case that is being investigated by the U.S. Secret Service, according to authorities. It was determined in the ongoing investigation that the “location that was compromised”…

Read more

NY: Rent-a-Center papers with personal info found on Buffalo road

Posted on August 14, 2010 by Dissent

Eli George reports: Top secret personal information was found scattered to the wind. That’s right; it happened again. Paperwork containing private financial information was found in the street. It’s hard enough protecting personal information, but when it’s out on the street, for anyone to see, it’s impossible. Well, let’s just say two young women were…

Read more

Feds still questioning AT&T iPad site hackers

Posted on August 14, 2010 by Dissent

Elinor Mills reports: Several members of a hacker group responsible for exposing a hole on an AT&T Web site for iPad customers have been questioned by a federal grand jury about the incident, the group confirmed to CNET on Friday. “No warrants or indictments yet. Two Goatse analysts, ‘Sloth’ and ‘Rucas,’ went before a grand…

Read more

OK: Customers’ credit information stolen at local restaurant

Posted on August 13, 2010 by Dissent

Joleen Chaney reports: A popular restaurant in the western Oklahoma is the latest target of a fraudulent high-tech scheme used to steal the credit card numbers customers. […] Schumacher says his customers’ card information has never been stored on their computers but was stolen as it passed through the system. “It grabs the number as…

Read more

Loma Linda offers help after desktops stolen in June

Posted on August 13, 2010 by Dissent

Darrell R. Santschi reports: Loma Linda University’s dental school has hired a credit monitoring and repair firm to help potential identity theft victims. Kroll Inc. will offer assistance to any of the 10,100 patients whose personal information was contained in three desktop computers stolen from the school the weekend of June 12, university spokesman Dustin…

Read more
  • Previous
  • 1
  • …
  • 1,658
  • 1,659
  • 1,660
  • 1,661
  • 1,662
  • 1,663
  • 1,664
  • …
  • 1,917
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.