DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

(follow-up) JetBlue notification letter indicates no evidence that any employee data accessed

Posted on July 5, 2011 by Dissent

As reported previously on this blog, JetBlue had a security breach involving the insertion of malware on their system. Last week, the airline notified the New Hampshire Attorney General’s Office about the incident. Their letter was somewhat imprecise about when they were informed of the problem by a federal law enforcement agency, saying only that “Earlier…

Read more

JetBlue informed of malware on their system; Crewmembers notified months later?

Posted on July 1, 2011 by Dissent

A correspondent indicates that JetBlue has reportedly notified employees of a “potential” breach of their confidential information. In a written notification sent via mail, dated June 24, 2011, JetBlue states: “A federal law enforcement agency recently informed JetBlue that malicious software may have been installed on our computer systems. Upon notification, we immediately launched an investigation…

Read more

T&T supermarket chain in Canada discloses hack affecting 58,000 customers; issues warning about malware

Posted on June 24, 2011 by Dissent

Seen at InsideToronto.com: The website of Canada’s largest Asian supermarket chain has been hacked. Richmond, BC-based T&T Supermarket Inc, which has three locations in Toronto (two in Scarborough and one in the port lands), advised the public of “unauthorized and illegal intrusions” on its website – www.tnt-supermarket.com – in a June 24 press release. The…

Read more

Ukraine says breaks up global hacker ring, banks targeted

Posted on June 23, 2011 by Dissent

Olzhas Auyezov reports: Ukraine’s state security service on Thursday said it had broken up an international hacking ring that infiltrated foreign banks’ computer networks and stole $72 million. The hacker group, organised and led by Ukrainians, used a computer virus to access bank accounts abroad, the SBU security agency said. Read more from Reuters Canada.

Read more

Man infects college PCs to steal huge database

Posted on June 23, 2011 by Dissent

Dan Goodin reports: A former college student has admitted taking part in a criminal scheme that used malware to steal and sell large databases of faculty and alumni, change grades, and siphon funds from other students’ accounts. Daniel J. Fowler, 21, of Kansas City, Missouri, pleaded guilty in federal court there to computer hacking conspiracy…

Read more

Virgin alerts infected customers

Posted on June 17, 2011 by Dissent

About 1,500 customers of internet service provider Virgin Media have been warned that their PCs are infected with a malicious virus. The targeted customers had fallen victim to the SpyEye trojan that steals log-ins for online bank accounts. Letters have been sent to those affected, giving them advice on how to clean up their computers….

Read more
  • Previous
  • 1
  • …
  • 687
  • 688
  • 689
  • 690
  • 691
  • 692
  • 693
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.