麻豆蜜桃精品无码视频-麻豆蜜臀-麻豆免费视频-麻豆免费网-麻豆免费网站-麻豆破解网站-麻豆人妻-麻豆视频传媒入口

Set as Homepage - Add to Favorites

【republic porno】Enter to watch online.Data of 40 million Plus Exposed in Latest T

Source:Global Perspective Monitoring Editor:knowledge Time:2025-07-03 18:17:06
Feb. 24, 2021 – A T-Mobile store at a shopping mall in Pittsburgh. T-Mobile says about 7.8 million of its current postpaid customer accounts’ information and approximately 40 million records of former or prospective customers who had previously applied for credit with the company were involved in a recent data breach. T-Mobile said Wednesday, Aug. 18, that customers’ first and last names, date of birth, Social Security numbers, and driver’s license/ID information were exposed. (AP Photo/Keith Srakocic)

By MATT O’BRIEN AP Technology Writer

The names, Social Security numbers and information from driver’s licenses or other identification of just over 40 million people who applied for T-Mobile credit were exposed in a recent data breach, the company said Wednesday.

The same data for about 7.8 million current T-Mobile customers who pay monthly for phone service also appears to be compromised. No phone numbers, account numbers, PINs, passwords or financial information from the nearly 50 million records and accounts were compromised, it said.

T-Mobile has been hit before by data theft but in the most recent case, “the sheer numbers far exceed the previous breaches,” said Gartner analyst Paul Furtado.

T-Mobile, which is based in Bellevue, Washington, became one of the country’s largest cellphone service carriers, along with AT&T and Verizon, after buying rival Sprint last year. It reported having a total of 102.1 million U.S. customers after the merger.

“Yes, they have a big target on their back but that shouldn’t be a surprise to them,” Furtado said. “You have to start questioning the organization. How much are they actually addressing these breaches and the level of seriousness?”

T-Mobile also confirmed Wednesday that approximately 850,000 active T-Mobile prepaid customer names, phone numbers and account PINs were exposed. The company said that it proactively reset all of the PINs on those accounts. No Metro by T-Mobile, former Sprint prepaid, or Boost customers had their names or PINs exposed.

There was also some additional information from inactive prepaid accounts accessed through prepaid billing files. T-Mobile said that no customer financial information, credit card information, debit or other payment information or Social Security numbers were in the inactive file.

T-Mobile had said earlier this week that it was investigating a leak of its data after someone took to an online forum offering to sell the personal information of cellphone users.

The company said Monday that it had confirmed there was unauthorized access to “some T-Mobile data” and that it had closed the entry point used to gain access. “If you were affected, you’ll hear from us soon,” CEO Mike Sievert tweeted in response to a concerned customer Tuesday.

The company now says it will immediately offer two years of free identity protection services and is recommending that all of its postpaid customers — those who pay in monthly installments — change their PIN. Its investigation is ongoing.

T-Mobile has previously disclosed a number of data breaches over the years, most recently in January and before that in Nov. 2019 and Aug. 2018, all of which involved unauthorized access to customer information. It also disclosed a breach affecting its own employees’ email accounts in 2020. And in 2015, hackers stole personal information belonging to about 15 million T-Mobile wireless customers and potential customers in the U.S., which they obtained from credit reporting agency Experian.

“It’s a real indictment on T-Mobile and whether or not these customers would want to continue working with T-Mobile,” said Forrester analyst Allie Mellen. “Ultimately T-Mobile has a lot of really sensitive information on people and it’s just a matter of luck that, this time, the information affected was not financial information.”

She said the hack didn’t appear particularly sophisticated and involved a configuration issue on a server used for testing T-Mobile phones.

“There was a gate left wide open for the attackers and they just had to find the gate and walk through it,” Mellen said. “And T-Mobile didn’t know about the attack until the attackers posted about it in an online forum. That’s really troubling and does not give a good indication that T-Mobile has the appropriate security monitoring in place.”

0.1441s , 10120.9140625 kb

Copyright © 2025 Powered by 【republic porno】Enter to watch online.Data of 40 million Plus Exposed in Latest T,Global Perspective Monitoring  

Sitemap

Top 主站蜘蛛池模板: 日韩午夜福利精品在线视频 | 三级a片在线观看 | 中文字幕五区 | 欧美日韩一区二区三区高清在线 | 91md天美精东蜜桃传媒在 | 国产无遮挡免费观看美女被靠视频 | AV私库在线 | 亚洲午夜精品一区二区 | www.色com| 亚洲欧美高清精品ⅴ | 91视频| 日韩精品――色哟哟 | 亚洲精彩一区二区三区 | 国产呦精品一区二区三区下载 | 国产老色批免费视 | 日韩欧美手机在线视频 | 久久久无码精品人妻二区 | 中文字幕爆乳区 | 熟妇区毛片蜜桃 | 一级a做日韩精品视频 | 国产色秀视频在线播放 | 91国语精品自产 | 麻豆网页 | 亚洲精品国产 | 中文字幕无线乱码视频 | 久操线在视频在线观看 | 欧美va亚洲va国产 | 精品推荐午夜看理论片 | 蜜桃传媒91在线日本无码 | 亚洲 欧美 精品 | 美艳人妻被迫抽搐呻吟视频 | 日韩在线视频网址 | 禁止18点击进 | 日本欧美中文字幕 | 欧美日皮视频 | 91中文字幕在线观看 | 中文字幕人妻伦伦 | 亚洲熟妇无码av在线观看 | 欧美午夜日韩剧场 | 日韩一级婬片A片AAA电影网 | 欧美日韩国产第 |