DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Neiman Marcus Asks Full 7th Circuit to Consider Standing Ruling in Breach Suit

Posted on August 5, 2015 by Dissent

Michael Beder writes: A Seventh Circuit panel that allowed a data breach suit against Neiman Marcus to proceed misapplied the Supreme Court’s precedents on standing and, “if allowed to stand, will impose wasteful litigation burdens on retailers and the federal courts,” the retailer argues in a petition filed yesterday asking the full Seventh Circuit to rehear the…

Read more

Massachusetts Appeals Court Set to Consider Scope of Employer Liability for Employee Data Breaches

Posted on August 5, 2015 by Dissent

Breton Leone-Quick writes: … The legal liability of employers for data breaches by its employees is generally an underdeveloped area of the law. But a case currently pending before the Massachusetts Appeals Court will help determine the scope of this liability in Massachusetts. In the Superior Court case, Adams v. Congress Auto Insurance Agency, Inc., No. MICV2013-01322-D (Mass….

Read more

Facebook Hijacking Case Revived by 2nd Circuit

Posted on August 5, 2015 by Dissent

Adam Klasfeld reports: In a case involving sex, cyberbullying and the statute of limitations, a schoolteacher filed her lawsuit just in time to accuse of (sic)  her ex-boyfriend of taking over her Facebook account to post obscene messages, the Second Circuit ruled on Tuesday. The court warned in its opinion that the case demonstrates the “troubling” predicament…

Read more

Hacked e-mails: Boeing wants its drones to hack computers from the sky

Posted on August 5, 2015 by Dissent

Jacob Bogage reports: Drone have been used to drop bombs, spy on foreign countries and monitor how farmers work their fields. Now they could help hack into personal computers. According to e-mails posted by WikiLeaks, military contractors may want to do just that. Boeing and Hacking Team — a Milan-based company criticized for selling surveillance software to repressive governments — were in talks…

Read more

SterlingBackcheck reports stolen laptop contained background check information on job applicants (updated)

Posted on August 4, 2015 by Dissent

On May 29, a laptop with a spread sheet containing an undisclosed number of job applicants’ names, dates of birth, and Social Security numbers was stolen from a SterlingBackcheck employee’s car. SterlingBackcheck (a trademark of Sterling Infosystems) learned of the theft on May 30, and notified law enforcement. The personal information in the spreadsheet came from two sources: the…

Read more

Higher Education Institutions Increasingly Falling Victim to Cyberattacks

Posted on August 4, 2015 by Dissent

Anna C. Watterson and Sean B. Hoar write: Higher education institutions are treasure troves for hackers. Colleges and universities are huge repositories of research data, sensitive information for large populations of applicants and enrolled students (personal, academic, financial and health data), as well as sensitive personal and tax information for all faculty and staff. Higher education…

Read more
  • Previous
  • 1
  • …
  • 1,131
  • 1,132
  • 1,133
  • 1,134
  • 1,135
  • 1,136
  • 1,137
  • …
  • 1,918
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.