DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Business Sector

(update) Argos credit-card scandal worsens

Posted on March 4, 2010 by Dissent

Fresh doubts have been raised over the online security of high street retailer Argos, following a PC Pro investigation. Yesterday, we revealed that Argos was sending customers’ unencrypted credit-card numbers and security codes in order confirmation emails, potentially exposing them to online fraud. Now it’s emerged that those very same confirmation emails contain a web…

Read more

(follow-up) Can he claim incompetent counsel?

Posted on March 4, 2010 by Dissent

Brett Matteson Jr., who represented himself when he was on trial for ID theft, was sentenced today to 37 years and 8 months in prison. He had been convicted of 48 counts of identity theft, 48 counts of unlawfully getting credit-card information and nine counts of making fake driver’s licenses. Matteson allegedly took advantage of…

Read more

Illinois Department of Insurance won’t fine MetLife… for now

Posted on March 4, 2010 by Dissent

Would the state of Illinois have treated a bank or health care provider the same way if the same data had been exposed by them? The Illinois Department of Insurance says it won’t fine insurance agency MetLife, at least for now, after a 13 News investigation revealed MetLife files were thrown into a dumpster without being…

Read more

Cyberthieves Using Bluetooth To Steal Gas Station Credit Card Data

Posted on March 4, 2010 by Dissent

Evan Schuman writes: When cyberthieves plant skimming devices inside POS PIN pads, they typically have one of two headaches. First, they have to return to the scene of the crime to retrieve the device and its stolen data, which is dangerous. If the thieves use the device to wirelessly phone the data to one of…

Read more

Argos exposes customers’ credit-card numbers in emails

Posted on March 3, 2010 by Dissent

Barry Collins reports: High street retailer Argos has compromised its customers’ security by sending their credit-card details – including the vital security code – in unencrypted emails. The company has been including the customer’s full name, address, credit-card number and three-digit CCV security code in order confirmation emails, which are sent once a customer has…

Read more

Two Men Charged For Stealing Credit Card Data Throughout East Bay

Posted on March 3, 2010 by Dissent

Two Los Angeles area men were charged in Contra Costa County Wednesday for allegedly using “skimming” devices to steal people’s ATM and PIN numbers from gas pumps in Martinez, Benicia, Livermore, Hayward, Oakland, San Mateo and Sacramento, Martinez police said Wednesday. David Karapetyan, 31, and Zhiraya Zamanyan, 30, have each been charged with 32 counts…

Read more
  • Previous
  • 1
  • …
  • 1,262
  • 1,263
  • 1,264
  • 1,265
  • 1,266
  • 1,267
  • 1,268
  • …
  • 1,350
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.