DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Internet Scammers Change Some Boston University Direct Deposit Accounts

Posted on January 8, 2014 by Dissent

Rich Barlow reports: Apparently using a common internet deception called phishing, scammers obtained log-in information allowing them to change direct deposit routing information for the paychecks of 10 BU employees in December. The employees’ monthly paychecks were then routed elsewhere. […] Shamblin says that users of suspicious internet protocol (IP) addresses gained access to the…

Read more

AU: Schoolboy hacks Public Transport Victoria website

Posted on January 8, 2014 by Dissent

Adam Carey reports: Personal information about public transport users in Victoria has been exposed to potential identity theft because government authority Public Transport Victoria failed to secure its website. The security flaw in the PTV website was discovered by schoolboy Joshua Rogers, 16, who used a simple hacking technique to unearth a database containing the…

Read more

PA: Waiter skimmed customers’ cards

Posted on January 3, 2014 by Dissent

Amanda Christman reports that a man who waited tables at the Jumbo China Buffet in Hazle Township skimmed customers’ credit and debit card numbers. Read more on CitizensVoice. Probably wasn’t a great idea on his part to skim some police officers’ cards….

Read more

Georgia man indicted in inmate identity theft scheme

Posted on January 3, 2014 by Dissent

Associated Press reports that Qadir Shabazz of Atlanta has been indicted by a grand jury on charges he used prisoners’ personal information in a nationwide ID theft scheme involving fraudulent tax returns. Officials say Shabazz and co-conspirators operated a business named “Indigent Inmate” and distributed information to prisoners in facilities across the country. Inmates were…

Read more

Alleged Snapchat hackers explain how and why they leaked data on 4.6 million accounts

Posted on January 2, 2014 by Dissent

Chris Ziegler reports: The individual or team claiming responsibility for SnapchatDB has responded to The Verge‘s requests for comment the morning after the database went online, containing a leaked collection of some 4.6 million apparent Snapchat usernames and partial phone numbers. “Our motivation behind the release was to raise the public awareness around the issue, and also put…

Read more

This was all too predictable…

Posted on January 1, 2014 by Dissent

Remember how I posted about how some frustrated researchers at Gibson Security had gone public with a SnapChat vulnerability that the firm allegedly hadn’t addressed? Well, now it seems 4.6 million SnapChat users’usernames and phone numbers have been leaked.

Read more
  • Previous
  • 1
  • …
  • 1,377
  • 1,378
  • 1,379
  • 1,380
  • 1,381
  • 1,382
  • 1,383
  • …
  • 1,918
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.