DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

University of Oklahoma Neurology Clinic notifies almost 20,000 of security breach

Posted on October 11, 2010 by Dissent

In the process of updating PHIprivacy.net to reflect breaches newly disclosed by the U.S. Dept. of Health and Human Services (HHS), I found reference to a breach for which I was able to find a companion statement. The University of Oklahoma-Tulsa, Neurology Clinic recently notified HHS of an incident affecting 19,264 patients. According to HHS’s…

Read more

NC: Researcher Yankaskas appeals pay cut, demotion

Posted on October 10, 2010 by Dissent

More details are emerging about why the breach involving the UNC-Chapel Hill Carolina Mammography Registry led to consequences for the researcher. C. Ryan Barber reports: […] School of Medicine Office of Information Systems officials first alerted the University to the breach in July 2009 after uncovering a virus and potential security breach on the Carolina…

Read more

Former Employee of Fannie Mae Contractor Convicted of Attempting to Destroy Fannie Mae Computer Data

Posted on October 5, 2010 by Dissent

Ah, the risks of disgruntled terminated employees. A federal jury convicted computer programmer Rajendrasinh Babubhai Makwana, age 36, of Montgomery County, Maryland, yesterday of computer intrusion arising from the transmission of malicious script to Fannie Mae’s computer servers. The verdict was announced by United States Attorney for the District of Maryland Rod J. Rosenstein and…

Read more

Education sector most affected by malware

Posted on October 4, 2010 by Dissent

Angela Moscaritolo reports: During the first six months of 2010, academia was the sector most impacted by malware, according to a report issued Monday by anti-virus firm Trend Micro. The report, which covers cybercrime incidents from January to June, states that 44 percent of all malware infections hit schools and universities, which often have “complex, distributed…

Read more

Update: Ukranian police arrest 5, targeting brains behind Zeus botnet

Posted on October 1, 2010 by Dissent

Robert McMillan and Grant Gross report: Ukrainian police on Thursday arrested five people thought to be the brains behind a scam using the Zeus Trojan to siphon money from small businesses in the U.S. The operation is part of an ongoing effort to take down a criminal empire that stole $70 million from victims’ bank…

Read more

Zeus Trojan bust reveals sophisticated ‘money mules’ operation in U.S.

Posted on October 1, 2010 by Dissent

Jaikumar Vijayan provides some interesting details on yesterday’s indictments over on Computerworld. Jai reports: All of the individuals charged in the U.S. so far are from Russia and East European countries and were either money mules who helped transfer stolen money out of the U.S., or individuals who managed or recruited them. Most of those charged…

Read more
  • Previous
  • 1
  • …
  • 698
  • 699
  • 700
  • 701
  • 702
  • 703
  • 704
  • …
  • 730
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.