Alissa Zhu reports: City Utilities has identified up to 9,000 customers who used payment kiosks or a certain mobile app to pay their utilities bills. Those customers’ personal information may be affected by a possible security breach, according to a news release. Information potentially at risk for those individuals include names, addresses, phone numbers, utility billing accounts, bank…
Category: Exposure
Compromised payroll documents contained personal info of current, former Humboldt County staff, dependents
Will Houston reports: Sensitive personal information — including social security numbers and bank account information — for several former and current Humboldt County employees, including some of their dependents, were found in boxes of missing county records that suspiciously turned up in Trinity County, according to a recently completed county review. When asked by the…
Data security breach at Rutgers leaves the information of 1,700 students unprotected
Saige Francis reports: On Nov. 8 and 9, Rutgers experienced a “data security” breach that left the information of nearly 1,700 students unprotected, said Neal Buccino, a University spokesperson. This incident affected students in the Department of Computer Science and revealed information including Rutgers I.D. numbers, cumulative GPAs and Spring 2018 class schedules. Sensitive information,…
Stanford University data glitch exposes truth about scholarships
Nanette Asimov reports: Stanford Business School officials are admitting that for years they have given steep price breaks to preferred applicants while claiming the scholarships were only for needy students — and say they will close a glitch that allowed public access to thousands of confidential student financial aid records. A student discovered in February…
Florida-based credit firm left 111GB of sensitive customer data exposed on AWS server
Patrick Howell O’Neill reports: A Florida-based credit repair company left 111 gigabytes of extremely sensitive customer information and internal company data publicly accessible on the internet possibly for up to two years. The National Credit Federation publicly exposed 47,000 files that included customer names, addresses, dates of birth, driver’s licenses, Social Security cards, credit reports,…
More than two years after compromise, Combat Brands was still battling malware?
First, there was this: On January 25, 2017, Combat Brands began investigating some unusual activity reported by its credit card processor. Combat Brands immediately began to work with third-party forensic experts to investigate these reports and to identify any signs of compromise on its systems. On February 23, 2017, Combat Brands discovered that it was…