The hacker published 1,300 students' names, e-mail addresses and phone numbers.
Hacker James Jeffery accessed thousands of people's personal information in 2012.
Eight computers were stolen from Sutherland Healthcare Solutions' Torrance office.
Shareholders' names, addresses, e-mail addresses, phone numbers, Social Security numbers and account information may have been exposed.
Names, addresses, phone numbers, Social Security numbers and health insurance provider policy numbers may have been exposed.
The attackers allegedly earned almost $11 million by using the stolen information to sell mobile phones.
Members of AnonGhost thought they were defacing the Web site for Yorkshire Bank -- but they defaced a well-designed phishing site instead.
More than 4,500 user credentials were published on Pastebin.
Current and former employees' names, addresses, birthdates, pay information and Social Security numbers were exposed.
Researchers at the University of Kent found that approximately one in 30 people in the U.K. have been hit by the ransomware.
The unidentified hacker stole approximately $50,000 in Bitcoins.
Names, birthdates, mailing addresses and Social Security numbers may have been exposed.
Because it doesn't have the resources to recover from the loss, Flexcoin says, it's shutting its doors immediately.
Customer names, addresses, e-mail addresses, phone numbers, credit card numbers, expiration dates and verification codes may have been accessed.
Tracy Mitchell allegedly used service members' stolen identities to file more than 1,000 fraudulent tax returns.
Roy C. Sun changed his grades from nine Fs and one incomplete to straight As.
The breach, the company says, resulted from 'a manual information processing error which we have since corrected.'
The three, surnamed Kim, Choi and Lee, allegedly stole the data from 225 different Web sites.
That's twice the rate seen in 2012, according to FireEye researchers.
Lauri Love allegedly stole names, e-mail addresses and phone numbers from Federal Reserve servers and posted the stolen data online.
A spam campaign offers a download of the supposed client, but links instead to banking malware.
The unencrypted drive contained 92 patients' personal information, along with data on drug prescriptions.
Current and former employees' names, addresses, birthdates and Social Security numbers may have been accessed.
The university is offering five years of free credit monitoring services to the more than 300,000 people affected.
Google says it's 'beefing up internal procedures to prevent such events from occurring again,' according to Bromium.
146,000 names, addresses and Social Security numbers may have been exposed.
The unencrypted drive held limited medical information, including diagnoses and some lab values.
Angelo Ponds and Sean Guillaume were sentenced to 48 months and 94 months in prison, respectively.
A Tripwire survey also found that 30 percent of IT professionals haven't changed their wireless routers' default passwords.
The unencrypted laptop contained patients' names, birthdates, genders, dates of service, types of service and physician names.
An undisclosed number of Social Security numbers and driver's license numbers were exposed in April of 2013.
Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.
The company says 12.7 percent of all apps on Google Play in 2013 were malicious, up from just 2.7 percent in 2011.
The company now says 350,000 credit and debit card numbers were exposed, not 1.1 million.
A defacement page showed a photo of Edward Snowden's passport, and accused the organization of reusing passwords.
An employee violated company policy by using an online service provider to host a document containing custodian account user names and passwords.
Names, billing addresses, credit card numbers, expiration dates and CVV codes were exposed.
Insurance agents' Social Security numbers were mistakenly exposed.
The hackers briefly took over the football club's Twitter account.
TSS mistakenly exposed 13,336 beneficiaries' Medicare Health Insurance Claim Numbers.
Energie Steiermark hasn't yet determined what data was exposed by the breach.
Carlos Gomez spent two weeks in jail and seven months under house arrest after a bank employee stole his identity and used it to launder stolen money.
309,079 names, Social Security numbers, birthdates and university ID numbers were exposed.
The primary driver for deploying encryption is to lessen the impact of data breaches, according to Thales' 2013 Global Encryption Trends Study.
The company says the data was compiled using information stolen from other sites, not from Tesco itself.
Names, nationalities, locations, boat arrival information and arrival dates were mistakenly published online.
Jacob Allen Wilkens participated in Anonymous' attack on the Angel Soft Web site on March 1, 2011.
Over 500 employees' personal information may have been exposed, according to the medical center.
User names, e-mail addresses and encrypted passwords were published online.
Job applicants' user names, passwords, names, Social Security numbers, driver's license numbers and birthdates may have been accessed.
More than 7 million patient records were exposed in 2013 alone, according to Redspin.
User names, e-mail addresses, mailing addresses, phone numbers and encrypted passwords were accessed.
Frantz Pierre, Terry Pierre and Christmanie Bissainthe were sentenced to 208 months, 121 months and 84 months in prison, respectively.
More than 7,000 sites have been compromised, according to Hold Security.
Patients' names, addresses, phone numbers, birthdates, insurance information and medical information may have been exposed.
The Syrian Electronic Army says the attack was launched because Forbes had 'posted many articles against the SEA, with much hate for Syria.'
The latest versions of the malware add a browser extension for Firefox, according to SecureMac.
Malinsky Bazile used Florida's driver's license database to steal the identities of 700 middle-aged women.
After a contractor failed to show up for work, the company discovered that she had previously been arrested for 'incidents related to identity theft.'
Credit card information was illegally obtained 'with a manual device,' according to the hotel.
Enterprise security firm FireEye grows revenue by 94 percent in 2013. But that increase wasn’t enough for it to turn a profit.
Thousands of legal documents were rendered inaccessible by the malware.
'Someone's got a big, new cannon,' the company's CEO tweeted. 'Start of ugly things to come.'
According to the San Francisco Chronicle, the breaches occurred during the first half of 2013.
Petr Murmylyuk was sentenced to 30 months in prison and ordered to pay $505,357.79 in restitution.
Javelin Strategy also reports that one in three people who received a data breach notification in 2013 became a victim of identity fraud.
The hackers claim that one of the police's social media accounts used the embarrassingly simple password 'abc123.'
Microsoft expands the number of security bulletins and tackles 24 vulnerabilities in Internet Explorer.
The customer files were offered for sale to rogue traders, according to an anonymous whistleblower.
Names, birthdates, healthcare provider information, healthcare billing information and occupational therapy notes may have been accessed.
OSX/CoinThief.A monitors Web traffic in order to steal Bitcoin wallet login credentials.
Christopher Michael Sudlik was also sentenced to 36 months of probation and 60 hours of community service.
As many as 20,000 employees' personal information may have been exposed.
An undisclosed number of employees' names and Social Security numbers were accidentally exposed.
The hackers claim to have breached 34 Comcast mail servers.
According to ThreatTrack, 52 percent of IT and security managers at defense contractors say they've re-evaluated employee data access privileges.
Two employees were found to have inappropriately accessed patient records.
Oliver Gayle was sentenced to 51 months in prison.
According to Brian Krebs, the hackers stole login credentials from the HVAC systems company Fazio Mechanical Services.
Patients' and employees' personal, medical and/or bank information may have been accessed by hackers.
As F-Secure's Mikko Hypponen notes, this makes the U.K. the first Western government known to have launched DDoS attacks.
The affected locations include Marriott, Holiday Inn, Sheraton, Westin, Renaissance and Radisson hotels.
Employee names, addresses, e-mail addresses, Social Security numbers, driver's license numbers, birthdates and phone numbers were illegally accessed.
22,241 e-mail addresses, user names and encrypted passwords were posted online.
A laptop and hard drive containing the students' names, birthdates and Social Security numbers were stolen from a district administrator's car.
Patients' names, Social Security numbers, birthdates, addresses and medical information may have been exposed.
According to RSA, the malware has been logging credit card data from infected systems since October 2013.
The company manages 168 hotels under a wide range of brands, including Hilton, Hyatt, Marriott, Westin and others.
An undisclosed number of customers' payment card information may have been accessed by hackers.
A tutor who allegedly provided the students with key loggers has disappeared.
The company says a list of user names and passwords 'was likely collected from a third-party database compromise.'
The hard drive contained each customer's Unity member number, birthdate, city of residence, medications and service dates.
More than 70 percent of service providers operating data centers experienced DDoS attacks last year.
Fifteen machines were compromised, including ones belonging to the Civil Administration.
Two e-mail hacking site operators and three customers have been charged.
Employees' and job applicants' names, addresses, driver's license numbers and Social Security numbers were exposed.
Five Bulgarian citizens are accused of using stolen financial data to create counterfeit payment cards and make illegal electronic transactions.
Aleksander Panin will be sentenced on April 29, 2014.
The information exposed includes patient names, medical record numbers and limited information associated with clinic visits or hospital admissions.
The company says it's working with law enforcement to investigate 'possible fraudulent activity' on payment cards that had been used at Michaels.
Several unencrypted laptops were stolen by an employee who had been assigned to maintain or dispose of them.
Kaspersky, Microsoft and Trend Micro all currently fail to detect the malware, according to VirusTotal.
An undisclosed number of customers' names, bank routing numbers and bank account numbers were mistakenly exposed.
The four men operated as identity brokers in cities across the U.S., selling stolen identies for prices ranging from $700 to $2,500.
The FBI has already uncovered about 20 breaches in the past year that leveraged the type of malware recently used against Target and Neiman Marcus.
The funds were stolen via internally installed, Bluetooth-enabled skimming devices.
The malware is designed to steal text messages and block incoming phone calls from specific numbers.
The retailer said in a recent announcement that approximately 2,400 of the cards have been used fraudulently.
The breach exposed 520 documents, which included 16 companies' bank account information.
Approximately 6,000 customers' names, addresses, phone numbers, e-mail addresses and credit information may have been accessed.
Porscha Kyles was sentenced to three years in prison for stealing more than 100 people's names, birthdates and Social Security numbers.
A GFI Software survey also found that 7 percent have lost a mobile device containing company data.
The hackers apparently accessed the data by breaching the computer systems of the Puerto Rico College of Physicians and Surgeons.
Romanian authorities claim former cab driver Marcel Lazar Lehel, 42, is the prolific hacker.
The breach was discovered during an analysis of botnets, according to Germany's BSI.
The information was mistakenly made available online from January 9 to January 13, 2014.
Steve and Robin Barone allegedly stole 396 JPMorgan Chase and Wells Fargo account holders' identities.
Anonymous hackers defaced the company's Korean Web site and published stolen data online.
Site visitors were provided with access to other veterans' medical and financial data.
As part of her job, Sasha Webb had access to inmates' personal information, which she allegedly sold for use in filing fraudulent tax returns.
The company says any hacker who uncovers and responsibly discloses a critical security flaw in the app will be given a reward of up to $100,000.
An IT employee allegedly copied the data onto a USB stick and sold it to marketing companies.
Data on 6,000 medical responses was exposed, along with 231 firefighters' birthdates, Social Security numbers, and limited medical information.
According to Barracuda Labs, the site was found to be serving malware to visitors for the second time in the past few months.
The hackers claim to have accessed classified data, but haven't leaked any of it.
Emmanuel Effiong was sentenced to 81 months in prison for stealing several thousand patients' personally identifiable information.
The country hosted 44 percent of all malware detected by Solutionary in Q4 2013.
According to Doctor Web, the cybercriminals behind the malware are currently earning about $1,500 a day from the botnet.
Donor names, phone numbers, e-mail addresses, bank account numbers, credit card numbers, security codes and expiration dates may have been accessed.
Rakecia Brame sold her clients' personal information to others for use in perpetrating tax fraud.
The exercises are being organized by HITRUST and the Department of Health and Human Services in coordination with several companies in the industry.
The device, called Blackphone, will run a custom build of Android named PrivatOS.
The group's leaks.sea.sy site was defaced by members of Turk Guvenligi.
Matthew Buchanan faces up to five years in prison at his sentencing on March 28.
Adrienne Pritchett stole the identities of more than 450 clients of an insurance company.
More than one in four government employees say they haven't received mobile security training.
6,777 patients' personal information may have been exposed.
The company hasn't yet determined how many customers' credit card information may have been accessed.
The company's news and Xbox support Twitter accounts were compromised, along with Microsoft's official TechNet blog.
User names, e-mail addresses and hashed passwords were exposed.
Student names, addresses, phone numbers, dates and places of birth, dates of attendance, and school schedules were exposed.
Joshua Rogers told Public Transportation Victoria (PTV) about the vulnerability -- and PTV called the police.
The company will be required to have its information security program evaluated by a certified third party every other year for the next 20 years.
Customers' user names, passwords, full names, birthdates, phone numbers, addresses, e-mail addresses and diagnoses may have been accessed.
The lawsuit seeks $1,000 per class member, plus penalties, damages, interest and attorney's fees.
1,918 names, protected health information, birthdates and addresses were exposed.
Names, birthdates, addresses, diagnostic results or information related to treatment and insurance information may have been exposed.
Jonathan Wolberg faces up to 10 years in prison.
Customer names, addresses, Social Security numbers and/or driver's license numbers were accessed.
2,031 user names, e-mail addresses and passwords were leaked, along with 10 admin user names and passwords, all in clear text.
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?