DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Seattle court worker charged with id theft

Posted on January 27, 2010 by Dissent

Levi Pulkklinen reports more on a story previously mentioned on this blog: A week after her alleged conspirators were charged, federal prosecutors have a Seattle Municipal Court employee with bank fraud and identity theft. […] Searching the vehicle, investigators found a number of “profiles” bearing Seattle Municipal Court customers’ names and credit-card numbers, according to…

Read more

UCSF patient records possibly compromised

Posted on January 27, 2010 by Dissent

Victoria Colliver reports: Medical records for about 4,400 UCSF patients are at risk after thieves stole a laptop from a medical school employee in November, UCSF officials said today. The laptop, which was stolen on or about Nov. 30, was found in Southern California on Jan. 8. There is no indication that unauthorized access to…

Read more

FL: Medical files in Port St. Lucie trash bin could have led to ID fraud, police say

Posted on January 27, 2010 by Dissent

Will Greenlee reports: Police on Tuesday turned up medical files containing information that could be used to commit identity theft in a trash bin near University Medical Clinics, a police spokesman said Wednesday. Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University…

Read more

Commerce Dept. slow to notify employees of security breach

Posted on January 27, 2010 by Dissent

Joe Davidson reports on a Commerce Dept. breach that involved the transmission of unencrypted PII: Why did it take the Commerce Department so long to notify employees that their personal information, including Social Security numbers, had been let loose on the Internet? On Monday, employees were informed by letters mailed to their homes about “a…

Read more

TN: BlueCross computer theft already costs $7 million

Posted on January 26, 2010 by Dissent

Dave Flessner reports: What was initially assumed to be just a glitch in some soon-to-be-discarded computer equipment last fall has grown into one of Chattanooga’s most expensive property crimes of the year. BlueCross BlueShield of Tennessee said Monday it already has spent more than $7 million to respond to the theft last October of computer…

Read more

Update on Columbus Public Health incident

Posted on January 23, 2010 by Dissent

Bill Bush provides additional information on a breach first reported yesterday involving personal information of Columbus Publc Health employees: None of the health department’s 450 employees have reported identity theft, said spokesman Jose Rodriguez. The department thinks the information of as many as 300 current employees and about 100 former employees was compromised, he said….

Read more
  • Previous
  • 1
  • …
  • 1,740
  • 1,741
  • 1,742
  • 1,743
  • 1,744
  • 1,745
  • 1,746
  • …
  • 1,914
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.