DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Contracting in the Cloud: Who Pays for a Data Breach?

Posted on October 5, 2016 by Dissent

In a recent white paper I co-authored with Protenus, Inc., we noted the significant risks of a breach involving a vendor or business associate. In following up in a subsequent post, I also included a “pop quiz” for readers to use to test their understanding about the terms of any contract they have in terms of…

Read more

CA: Apria Healthcare notifies patients of breach

Posted on October 5, 2016 by Dissent

Apria Healthcare today announced a data security incident involving unauthorized access to an employee’s email account.  Apria Healthcare is one of the nation’s leading providers of home respiratory services and certain medical equipment.  Affected individuals may have received certain medical equipment from Apria Healthcare. On August 5, 2016, Apria Healthcare discovered that the email account of…

Read more

Surgeon General warns staff that personal information may have been stolen

Posted on October 3, 2016 by Dissent

Eric Yoder reports: The Surgeon General on Monday issued a warning to his staff that is all too familiar to federal employees: Your personal information may have been stolen. In an email, Surgeon General Vice Adm. Vivek H. Murthy told “commissioned corps” employees of the Public Health Service that information, including their names, dates of…

Read more

InfoSec: FDA Needs to Rectify Control Weaknesses That Place Industry and Public Health Data at Risk

Posted on October 2, 2016 by Dissent

For years, Congress and federal regulators have been raising concerns about FDA’s infosecurity after report of a hack in 2013. So while the FDA has been issuing lots of statements about securing medical devices and mobile apps, the GAO would like them to know that they need to do a better job on securing their own data: What…

Read more

GA: Martin Army Community Hospital can’t individually notify 1,000 patients impacted by insider breach that began in 2011

Posted on October 2, 2016 by Dissent

Larry Gierer reports: All patients who received care through the Martin Army Community Hospital healthcare system are alerted that a possible HIPAA breach occurred at Fort Benning between January 2011 and December 2013. According to a news release on Sunday, the breach was discovered after the hospital was alerted of undetected criminal activity involving identity…

Read more

TN: Hutton Hotel notifying guests of breach that began in 2012

Posted on October 1, 2016 by Dissent

Hutton Hotel in Nashville is notifying guests of a that first began on September 23, 2012. In their notification, they write that after being alerted to a potential problem by their payment processor, their outside consultants determined that unknown individuals had been able to install a program on the payment processing system in September 2012. The program could have…

Read more
  • Previous
  • 1
  • …
  • 911
  • 912
  • 913
  • 914
  • 915
  • 916
  • 917
  • …
  • 1,918
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.