DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Yahoo says 32m user accounts were accessed via cookie forging attack

Posted on March 2, 2017 by Dissent

Asha McLean reports: Yahoo has said that an unauthorised third party accessed the company’s proprietary code to learn how to forge certain cookies, which it said resulted in an intruder accessing approximately 32 million user accounts without a password.  “The outside forensic experts have identified approximately 32 million user accounts for which they believe forged…

Read more

It was a good day for dumpster divers…

Posted on March 2, 2017 by Dissent

Steve Barrett reports from Florida:  An Orlando man searching for scrap metal Tuesday night reported finding thousands of financial documents ripe with people’s personal information tossed in a dumpster. For identity thieves, the documents would have been a gold mine of information. “(They contained) emails, phone numbers, date of birth, child’s date of birth, you…

Read more

Eight Individuals Face Fraud, Identity Theft Charges Involving Possession of Names, Information of More Than 143,000 Individuals

Posted on February 28, 2017 by Dissent

February 17 – A 56-count federal indictment returned by a Utah grand jury charges eight individuals in connection with what the indictment alleges was a scheme to use fraudulently created identification documents and fraudulently obtained bank account information to open store credit accounts. The defendants then used the newly-obtained credit to make purchases at various merchants…

Read more

Aptos malware breach affected 40 online retail stores

Posted on February 28, 2017 by Dissent

Aptos, Inc.  provides e-commerce solutions for a number of online e-tailers. In November, 2016, Aptos discovered it had a malware breach from February, 2016 – December, 2016.  At law enforcement’s request, they delayed notification to their clients, so we are first finding out about it now as the clients begin to disclose the breach to their customers. So far,…

Read more

Roxana Police Chief: System back online after ransomware attack

Posted on February 27, 2017 by Dissent

Alex B. Heeb reports: Police have finished cleaning up computer systems impacted by a ransomware virus earlier this month. […] But the town’s police capabilities were never impacted by the attack, Roxana Police Chief Will Cunningham said. Read more on Alton Telegraph, although they still don’t disclose what type of ransomware it was.

Read more

NC health department exposed patient information in email

Posted on February 27, 2017 by Dissent

Lynn Bonner reports: The state Department of Health and Human Services sent private patient information to adult care homes by unencrypted email last year. The security lapse involved 12,731 Medicaid patients living in adult care homes. On Nov. 30, an employee sent an unencrypted email that included patient names, Medicaid numbers, and the homes where…

Read more
  • Previous
  • 1
  • …
  • 850
  • 851
  • 852
  • 853
  • 854
  • 855
  • 856
  • …
  • 1,913
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.