DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

It was a good day for dumpster divers…

Posted on March 2, 2017 by Dissent

Steve Barrett reports from Florida:  An Orlando man searching for scrap metal Tuesday night reported finding thousands of financial documents ripe with people’s personal information tossed in a dumpster. For identity thieves, the documents would have been a gold mine of information. “(They contained) emails, phone numbers, date of birth, child’s date of birth, you…

Read more

Eight Individuals Face Fraud, Identity Theft Charges Involving Possession of Names, Information of More Than 143,000 Individuals

Posted on February 28, 2017 by Dissent

February 17 – A 56-count federal indictment returned by a Utah grand jury charges eight individuals in connection with what the indictment alleges was a scheme to use fraudulently created identification documents and fraudulently obtained bank account information to open store credit accounts. The defendants then used the newly-obtained credit to make purchases at various merchants…

Read more

Aptos malware breach affected 40 online retail stores

Posted on February 28, 2017 by Dissent

Aptos, Inc.  provides e-commerce solutions for a number of online e-tailers. In November, 2016, Aptos discovered it had a malware breach from February, 2016 – December, 2016.  At law enforcement’s request, they delayed notification to their clients, so we are first finding out about it now as the clients begin to disclose the breach to their customers. So far,…

Read more

Roxana Police Chief: System back online after ransomware attack

Posted on February 27, 2017 by Dissent

Alex B. Heeb reports: Police have finished cleaning up computer systems impacted by a ransomware virus earlier this month. […] But the town’s police capabilities were never impacted by the attack, Roxana Police Chief Will Cunningham said. Read more on Alton Telegraph, although they still don’t disclose what type of ransomware it was.

Read more

NC health department exposed patient information in email

Posted on February 27, 2017 by Dissent

Lynn Bonner reports: The state Department of Health and Human Services sent private patient information to adult care homes by unencrypted email last year. The security lapse involved 12,731 Medicaid patients living in adult care homes. On Nov. 30, an employee sent an unencrypted email that included patient names, Medicaid numbers, and the homes where…

Read more

Niagara-Wheatfield School District warning of possible credit card fraud

Posted on February 27, 2017 by Dissent

Mia Summerson reports: Officials with the Niagara-Wheatfield School District are warning of a possible link between a recently used ticket sales platform and credit card fraud. Several people who purchased tickets online to attend Edward Town Middle School’s production of “The Lion King” are now reporting that they have become victims of credit card fraud….

Read more
  • Previous
  • 1
  • …
  • 852
  • 853
  • 854
  • 855
  • 856
  • 857
  • 858
  • …
  • 1,914
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.