DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

More police departments acknowledge paying ransom to unlock their systems

Posted on April 10, 2015 by Dissent

And yet more police departments pay ransom to unlock their systems. WCSH in Maine reports: Lincoln County Sheriff Todd Brackett said four towns and the county have a special computer network to share files and records. Someone accidentally downloaded a virus, called “megacode”, that put an encryption code on all the computer data. The Sheriff…

Read more

White Lodging confirms another long-running payment card “suspected breach”

Posted on April 8, 2015 by Dissent

White Lodging, an independent hotel management company, continues to struggle to really secure customer card data. Since January 2014, when Brian Krebs reported that White Lodging card data had been compromised for most of 2013, White Lodging has attempted to harden its security. In February 2014, the firm confirmed the suspected breach of point of sales…

Read more

OK: EyeCare of Bartlesville notifies patients after hard drive locked by malware

Posted on April 6, 2015 by Dissent

EyeCare of Bartlesville in Oklahoma  reported a breach to HHS on March 13 that appeared on HHS’s public breach tool on March 19. There was no notice on their web site that I could find at that time. Nor could I locate any  public notices via a Google search.  The incident was coded on HHS’s breach tool as a…

Read more

Tewskbury Police Pay Ransom After CryptoLocker Lockup

Posted on April 6, 2015 by Dissent

Jayne W. Miller reports that when Tewksbury Police discovered that the department’s network had been locked up by CryptoLocker last December, the town decided to pay the $500 bitcoin ransom. Of course, that’s exactly what experts recommend folks NOT do, as it only encourages more attacks on others, but hey, this is the same town that just…

Read more

Hackers attack the energy industry with malware designed for snooping

Posted on April 1, 2015 by Dissent

Robert Hackett reports: Hackers have been targeting energy industry workers with malicious emails containing malware that, when opened, leave the recipients vulnerable to snooping, software security giant Symantec reported Monday. The campaign has primarily targeted Middle Eastern countries such as the United Arab Emirates, Kuwait, and Saudi Arabia. But it has also afflicted other nations as well,…

Read more

Hacked uni’s admins hand ID theft prevention reward to data burglars

Posted on April 1, 2015 by Dissent

I wish this was an April Fools’ Day prank, but it’s not. Alexander J. Martin reports that Bradley University’s response to their recent breach may just have made things worse for their employees. Keep in mind as you read the following that the breach involved Social Security numbers: The private institution then attempted to mitigate…

Read more
  • Previous
  • 1
  • …
  • 647
  • 648
  • 649
  • 650
  • 651
  • 652
  • 653
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.