DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Homebridge (formerly IHSS) notifies home service providers of data compromise and possible misuse of their information

Posted on April 13, 2015 by Dissent

In May 2012, California’s Dept of Social Services notified over 700,000 In-Home Supportive Services providers and recipients that their payroll data, including Social Security numbers, had been lost in the mail. In December 2012, 14,000 In-Home Supportive Services were notified that their personal information, including Social Security numbers, had been exposed on the Internet. Now Homebridge (formerly…

Read more

More police departments acknowledge paying ransom to unlock their systems

Posted on April 10, 2015 by Dissent

And yet more police departments pay ransom to unlock their systems. WCSH in Maine reports: Lincoln County Sheriff Todd Brackett said four towns and the county have a special computer network to share files and records. Someone accidentally downloaded a virus, called “megacode”, that put an encryption code on all the computer data. The Sheriff…

Read more

White Lodging confirms another long-running payment card “suspected breach”

Posted on April 8, 2015 by Dissent

White Lodging, an independent hotel management company, continues to struggle to really secure customer card data. Since January 2014, when Brian Krebs reported that White Lodging card data had been compromised for most of 2013, White Lodging has attempted to harden its security. In February 2014, the firm confirmed the suspected breach of point of sales…

Read more

OK: EyeCare of Bartlesville notifies patients after hard drive locked by malware

Posted on April 6, 2015 by Dissent

EyeCare of Bartlesville in Oklahoma  reported a breach to HHS on March 13 that appeared on HHS’s public breach tool on March 19. There was no notice on their web site that I could find at that time. Nor could I locate any  public notices via a Google search.  The incident was coded on HHS’s breach tool as a…

Read more

Tewskbury Police Pay Ransom After CryptoLocker Lockup

Posted on April 6, 2015 by Dissent

Jayne W. Miller reports that when Tewksbury Police discovered that the department’s network had been locked up by CryptoLocker last December, the town decided to pay the $500 bitcoin ransom. Of course, that’s exactly what experts recommend folks NOT do, as it only encourages more attacks on others, but hey, this is the same town that just…

Read more

Hackers attack the energy industry with malware designed for snooping

Posted on April 1, 2015 by Dissent

Robert Hackett reports: Hackers have been targeting energy industry workers with malicious emails containing malware that, when opened, leave the recipients vulnerable to snooping, software security giant Symantec reported Monday. The campaign has primarily targeted Middle Eastern countries such as the United Arab Emirates, Kuwait, and Saudi Arabia. But it has also afflicted other nations as well,…

Read more
  • Previous
  • 1
  • …
  • 651
  • 652
  • 653
  • 654
  • 655
  • 656
  • 657
  • …
  • 730
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.