DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

(update) ME: Voter database breach came from Millinocket, no information compromised

Posted on August 27, 2011 by Dissent

Eric Russell updates a report on a breach involving the Maine voter database: The Secretary of State’s Office said Thursday that it appears no personal information was compromised during a potential security breach of Maine’s Central Voter Registration database. The apparent breach was the result of malware — or malicious computer software — found on a workstation…

Read more

Maine voter registration system breached

Posted on August 24, 2011 by Dissent

Kevin Miller reports: The Maine Secretary of State’s Office said Wednesday it is investigating a potential security breach in the computer system that contains records on Maine’s registered voters. The state was notified Wednesday afternoon by the cybersecurity monitoring arm of the U.S. Department of Homeland Security that Maine’s Central Voter Registration system had been…

Read more

VA: Amherst store owner reacts to becoming victim of international hacking

Posted on August 11, 2011 by Dissent

Hmmm… one I missed in April, it seems. Justin Ward reports: It’s a practice many of us do daily: use our credit card.  Now dozens of people at one Amherst County store are discovering they’re victims of credit card theft. The computer system at Country Corner Market was hacked, compromising the information of 125 customers. …

Read more

Energy Federation Incorporated detects malware, notifies customers

Posted on August 11, 2011 by Dissent

A breach notification by Energy Federation Incorporated to the New Hampshire Attorney General’s Office indicates that on July 12, they discovered two pieces of malware on their server that had been inserted on July 7 and July 10.  The malware “was designed to allow a third part to remotely search and collect” information on the server,…

Read more

UW-Milwaukee breach includes 75,000 names, Social Security numbers (updated)

Posted on August 10, 2011 by Dissent

A computer security breach at the University of Wisconsin-Milwaukee may have exposed the names and Social Security numbers of about 75,000 people associated with the school. The incident primarily affected current and former employees and students. The university said in a press release that it is sending letters to those who may be affected. […] University technology…

Read more

Widespread malware attack affects some Ascensus clients

Posted on July 31, 2011 by Dissent

Ascensus Inc.  notified the New Hampshire Attorney General’s Office this week that  on April 15, they were notified by federal investigators that computers on their network had been infected by a “new malware virus” that had infected a lot of companies’ computers.  A forensic examination revealed that the malware had created files containing some individuals’…

Read more
  • Previous
  • 1
  • …
  • 686
  • 687
  • 688
  • 689
  • 690
  • 691
  • 692
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.