Set as Homepage - Add to Favorites

精品东京热,精品动漫无码,精品动漫一区,精品动漫一区二区,精品动漫一区二区三区,精品二三四区,精品福利导航,精品福利導航。

【phim ch? ?? tình d?c】Enter to watch online.Data of 40 million Plus Exposed in Latest T
Feb. 24, 2021 – A T-Mobile store at a shopping mall in Pittsburgh. T-Mobile says about 7.8 million of its current postpaid customer accounts’ information and approximately 40 million records of former or prospective customers who had previously applied for credit with the company were involved in a recent data breach. T-Mobile said Wednesday, Aug. 18, that customers’ first and last names, date of birth, Social Security numbers, and driver’s license/ID information were exposed. (AP Photo/Keith Srakocic)

By MATT O’BRIEN AP Technology Writer

The names, Social Security numbers and information from driver’s licenses or other identification of just over 40 million people who applied for T-Mobile credit were exposed in a recent data breach, the company said Wednesday.

The same data for about 7.8 million current T-Mobile customers who pay monthly for phone service also appears to be compromised. No phone numbers, account numbers, PINs, passwords or financial information from the nearly 50 million records and accounts were compromised, it said.

T-Mobile has been hit before by data theft but in the most recent case, “the sheer numbers far exceed the previous breaches,” said Gartner analyst Paul Furtado.

T-Mobile, which is based in Bellevue, Washington, became one of the country’s largest cellphone service carriers, along with AT&T and Verizon, after buying rival Sprint last year. It reported having a total of 102.1 million U.S. customers after the merger.

“Yes, they have a big target on their back but that shouldn’t be a surprise to them,” Furtado said. “You have to start questioning the organization. How much are they actually addressing these breaches and the level of seriousness?”

T-Mobile also confirmed Wednesday that approximately 850,000 active T-Mobile prepaid customer names, phone numbers and account PINs were exposed. The company said that it proactively reset all of the PINs on those accounts. No Metro by T-Mobile, former Sprint prepaid, or Boost customers had their names or PINs exposed.

There was also some additional information from inactive prepaid accounts accessed through prepaid billing files. T-Mobile said that no customer financial information, credit card information, debit or other payment information or Social Security numbers were in the inactive file.

T-Mobile had said earlier this week that it was investigating a leak of its data after someone took to an online forum offering to sell the personal information of cellphone users.

The company said Monday that it had confirmed there was unauthorized access to “some T-Mobile data” and that it had closed the entry point used to gain access. “If you were affected, you’ll hear from us soon,” CEO Mike Sievert tweeted in response to a concerned customer Tuesday.

The company now says it will immediately offer two years of free identity protection services and is recommending that all of its postpaid customers — those who pay in monthly installments — change their PIN. Its investigation is ongoing.

T-Mobile has previously disclosed a number of data breaches over the years, most recently in January and before that in Nov. 2019 and Aug. 2018, all of which involved unauthorized access to customer information. It also disclosed a breach affecting its own employees’ email accounts in 2020. And in 2015, hackers stole personal information belonging to about 15 million T-Mobile wireless customers and potential customers in the U.S., which they obtained from credit reporting agency Experian.

“It’s a real indictment on T-Mobile and whether or not these customers would want to continue working with T-Mobile,” said Forrester analyst Allie Mellen. “Ultimately T-Mobile has a lot of really sensitive information on people and it’s just a matter of luck that, this time, the information affected was not financial information.”

She said the hack didn’t appear particularly sophisticated and involved a configuration issue on a server used for testing T-Mobile phones.

“There was a gate left wide open for the attackers and they just had to find the gate and walk through it,” Mellen said. “And T-Mobile didn’t know about the attack until the attackers posted about it in an online forum. That’s really troubling and does not give a good indication that T-Mobile has the appropriate security monitoring in place.”

0.4398s , 10189.375 kb

Copyright © 2025 Powered by 【phim ch? ?? tình d?c】Enter to watch online.Data of 40 million Plus Exposed in Latest T,  

Sitemap

Top 主站蜘蛛池模板: 亚洲一线产区和二线产区的区别广告 | 久久婷婷久久一区二区三区 | 国产精品亚洲综合网熟女 | 国产免费一区二区三区 | 国产野外无码片在线观看97久久曰曰久久久 | 精品无码国产AV一区二区三区 | 2024国产激情在线观看 | 蜜桃国产а乱码精品一区二区三区 | 国产欧美一区二区久久 | 久久婷婷国产剧情内射白浆 | 97国产精品人人做人人爱 | 成人综合高清久久亚洲中文字幕精 | 国产成人一区二区三区免费视频 | 久久久久自慰系列免费看网站 | 国产一区二区三区在线看片 | 二区三区观看 | 亚洲国产成人影院播放 | 亚洲欧美一区二区三区色戒 | 两性午夜欧美高清做性 | 日本欧美一区二区三区片 | 91精品隔壁老王在线观 | 国产精品香蕉在线一区二区 | 久久不卡网 | 超薄丝袜足j一区二区 | 欧美激情一区二区久久久 | 91久久线看在观草草青青 | 大陆一级毛片国语对白 | japanesexxx护士老师高清日韩在线播放 | 国产肥熟女一区二区三区 | 亚洲精品无码 | 性一交一伦一A片免费看 | 麻豆精品一卡二卡三卡 | 国产成人综合久久精品红 | 91麻精品国产91久久久久 | 日本人做暖免费高清视频 | 国产aⅴ精品一区二区三区久 | 国产精品久久久久久久专区 | www.国产精品| 亚洲综合久久久久久中文字幕 | 久久久久综合中文字幕 | 亚洲 另类 小说 国产精品无码 |