DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Heartland Payment System reports 4th Quarter Gains

Posted on February 24, 2009 by Dissent

Of course, the fourth quarter ended before they announced that they had been breached. They had this to say about the breach in their press release today (via Marketwatch): Clearly our biggest challenge in 2009 will arise from the system breach we suffered. There are two main components to the challenge we face: addressing claims…

Read more

Just weeks after Heartland breach, another payment processor said to be hit

Posted on February 23, 2009 by Dissent

Jai Vijayan of Computerworld has gotten more info on the as-yet-unnamed processor breach. In addition to getting confirmation from Visa and MasterCard that the breach occurred and that the window was February 2008 to January 2009, Jai also found a more recent advisory from the Alabama Credit Union: ACU initially posted the alert on Feb….

Read more

Banks starting to report breach at unnamed processor

Posted on February 22, 2009 by Dissent

In an earlier post, I questioned whether banks were just sitting on the breach at the as-yet-unnamed processor. According to a spokesperson from the New York State Consumer Protection Board: While some banks have reported this breach, the CPB awaits formal notification pursuant to New York State law. Until such time as we can review…

Read more

Another small detail or two on as-yet-unnamed processor breach

Posted on February 22, 2009 by Dissent

Still no real facts, but more hints of impact. This from the Community Bankers Association of Illinois (emphasis added by me): (February 11,2009) Today, VISA announced that an unnamed processor recently reported that it had discovered a data breach. The processor’s name has been withheld pending completion of the forensic investigation. According to VISA officials,…

Read more

More details on the second processor breach (corrected and updated)

Posted on February 21, 2009 by Dissent

My googling skills are paying off. Found this on TVACU.com: (not CardNet as originally cited; the CardNet notice is provided below the TVACU.com notice) On the heels of the Heartland Payment Systems breach, another U.S. acquirer-processor has confirmed a network intrusion exposing primary card numbers and card expiration dates for card-not-present (CNP) transactions. Unlike the…

Read more

Valley National Bank replaces cards after Heartland

Posted on February 18, 2009 by Dissent

When payment processor Heartland Payment Systems announced it had been breached on January 20, management at Valley National Bank in New Jersey went into action. By January 26, they had notified the New York State Attorney General’s Office that they were replacing 20,013 cards as a result of the breach and had kicked into high…

Read more
  • Previous
  • 1
  • …
  • 736
  • 737
  • 738
  • 739
  • 740
  • 741
  • 742
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.