国产精品美女一区二区三区-国产精品美女自在线观看免费-国产精品秘麻豆果-国产精品秘麻豆免费版-国产精品秘麻豆免费版下载-国产精品秘入口

Set as Homepage - Add to Favorites

【sex mex videos】Data of 40 million Plus Exposed in Latest T

Source:Global Hot Topic Analysis Editor:explore Time:2025-07-02 18:16:09
Feb. 24, 2021 – A T-Mobile store at a shopping mall in Pittsburgh. T-Mobile says about 7.8 million of its current postpaid customer accounts’ information and approximately 40 million records of former or prospective customers who had previously applied for credit with the company were involved in a recent data breach. T-Mobile said Wednesday, Aug. 18, that customers’ first and last names, date of birth, Social Security numbers, and driver’s license/ID information were exposed. (AP Photo/Keith Srakocic)

By MATT O’BRIEN AP Technology Writer

The names, Social Security numbers and information from driver’s licenses or other identification of just over 40 million people who applied for T-Mobile credit were exposed in a recent data breach, the company said Wednesday.

The same data for about 7.8 million current T-Mobile customers who pay monthly for phone service also appears to be compromised. No phone numbers, account numbers, PINs, passwords or financial information from the nearly 50 million records and accounts were compromised, it said.

T-Mobile has been hit before by data theft but in the most recent case, “the sheer numbers far exceed the previous breaches,” said Gartner analyst Paul Furtado.

T-Mobile, which is based in Bellevue, Washington, became one of the country’s largest cellphone service carriers, along with AT&T and Verizon, after buying rival Sprint last year. It reported having a total of 102.1 million U.S. customers after the merger.

“Yes, they have a big target on their back but that shouldn’t be a surprise to them,” Furtado said. “You have to start questioning the organization. How much are they actually addressing these breaches and the level of seriousness?”

T-Mobile also confirmed Wednesday that approximately 850,000 active T-Mobile prepaid customer names, phone numbers and account PINs were exposed. The company said that it proactively reset all of the PINs on those accounts. No Metro by T-Mobile, former Sprint prepaid, or Boost customers had their names or PINs exposed.

There was also some additional information from inactive prepaid accounts accessed through prepaid billing files. T-Mobile said that no customer financial information, credit card information, debit or other payment information or Social Security numbers were in the inactive file.

T-Mobile had said earlier this week that it was investigating a leak of its data after someone took to an online forum offering to sell the personal information of cellphone users.

The company said Monday that it had confirmed there was unauthorized access to “some T-Mobile data” and that it had closed the entry point used to gain access. “If you were affected, you’ll hear from us soon,” CEO Mike Sievert tweeted in response to a concerned customer Tuesday.

The company now says it will immediately offer two years of free identity protection services and is recommending that all of its postpaid customers — those who pay in monthly installments — change their PIN. Its investigation is ongoing.

T-Mobile has previously disclosed a number of data breaches over the years, most recently in January and before that in Nov. 2019 and Aug. 2018, all of which involved unauthorized access to customer information. It also disclosed a breach affecting its own employees’ email accounts in 2020. And in 2015, hackers stole personal information belonging to about 15 million T-Mobile wireless customers and potential customers in the U.S., which they obtained from credit reporting agency Experian.

“It’s a real indictment on T-Mobile and whether or not these customers would want to continue working with T-Mobile,” said Forrester analyst Allie Mellen. “Ultimately T-Mobile has a lot of really sensitive information on people and it’s just a matter of luck that, this time, the information affected was not financial information.”

She said the hack didn’t appear particularly sophisticated and involved a configuration issue on a server used for testing T-Mobile phones.

“There was a gate left wide open for the attackers and they just had to find the gate and walk through it,” Mellen said. “And T-Mobile didn’t know about the attack until the attackers posted about it in an online forum. That’s really troubling and does not give a good indication that T-Mobile has the appropriate security monitoring in place.”

0.2715s , 10265.421875 kb

Copyright © 2025 Powered by 【sex mex videos】Data of 40 million Plus Exposed in Latest T,Global Hot Topic Analysis  

Sitemap

Top 主站蜘蛛池模板: 国产av巨作情 | 成网站在线 | 国产av无码片毛片 | xxxwww黄色| 99精品国产自在现线10页 | 国产sp调教打屁股视频网站 | 91麻豆精品国产自 | 午夜国产私人黄色爽片 | av无码久久久久久不卡网站 | 国产91变态 | 午夜性做爰A片免费看 | 国产91精品久久久久久无码 | 韩国三级毛片一区二区 | 91国内精品久久久久影院 | 91精品欧美激情在线播放 | 国产91久久久久 | 囯产精品一区二区三区线日本中字 | www.日日爱| 91在线播放国产福利 | 91精品酒店情 | 午夜国产一区二区三区在线观看 | av无码av在线a∨天堂毛片 | 丰满熟女高潮毛 | 91在线免费看 | 高潮一区二区三区四区在线播放 | 高潮又爽又黄又无遮挡免费软件 | 午夜av免费ā片在 | 91精品福利大全在线观看 | 波多野结衣免费在线播放 | 日韩av手机在线 | 99蜜桃在线观看免费视频网站 | 国产91精选二区 | av中文字幕在綫亚洲 | 午夜免费无码视频在线观看 | 高清免费观看 | 果冻影视| www在线观看免费 | 国产97碰免费视频 | av在线免费观看 | 国产v片免费播放 | 国产不卡av网页 |