{"id":8614,"date":"2021-08-25T21:53:24","date_gmt":"2021-08-25T19:53:24","guid":{"rendered":"http:\/\/plus.maciejpiasecki.info\/index.php\/2021\/08\/25\/the-t-mobile-data-breach-what-we-know-how-to-protect-yourself\/"},"modified":"2021-08-25T22:05:50","modified_gmt":"2021-08-25T20:05:50","slug":"the-t-mobile-data-breach-what-we-know-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2021\/08\/25\/the-t-mobile-data-breach-what-we-know-how-to-protect-yourself\/","title":{"rendered":"The T-Mobile Data Breach: What We Know &amp; How To Protect Yourself"},"content":{"rendered":"<p>T-Mobile has been in the headlines quite a bit lately, and it\u2019s not a good thing. Its customers\u2019 data has been breached yet again. It\u2019s not the first time, not even the first time in 2021.\u00a0<br \/>\nThis latest data breach was uncovered by Motherboard, and claims that 100 million T-Mobile customers had their data breached in this attack. That loosely translates to all of T-Mobile\u2019s customers. That is a very big deal.\u00a0<br \/>\nToday, we\u2019re going to go over what data was hacked in this breach, and what you can do to protect yourself. This should hopefully help you protect your data a bit better, and perhaps answer the question of whether you should leave T-Mobile or not.\u00a0<br \/>\nWhat actually happened?\u00a0<br \/>\nA hacker got its hands on data from virtually every single T-Mobile customer. And he was selling it for around 6 Bitcoin. At the time, that translated to about $270,000 USD. That amount only covered around 30 million social security numbers and driver licenses. The seller decided to privately sell the rest of the data.\u00a0<br \/>\nT-Mobile later came out after it did its investigation on the issue, and said that around 850,000 prepaid customers and 7.8 million postpaid customers were breached. Along with more than 40 million records related to former or prospective customers who had applied for credit with T-Mobile.\u00a0<br \/>\nThat\u2019s a whole lot less than what the hacker claimed to have stolen from T-Mobile. The number of hacked accounts really doesn\u2019t matter, it\u2019s the fact that they were hacked. And T-Mobile desperately needs to step up its cybersecurity.\u00a0<br \/>\nThis isn\u2019t the first T-Mobile breach this year. And has had five cyberattacks since 2018. Which makes this latest breach pretty troubling. But also not surprising. It seems like it\u2019s every other week we\u2019re hearing about another company being hacked and personal data being stolen.\u00a0<br \/>\nMany law firms have already taken action and filed class-action lawsuits against T-Mobile in Washington state (where T-Mobile is headquartered) seeking compensatory damages. As well as reimbursement for out-of-pocket costs, improvements to T-Mobile\u2019s data security systems, future annual audits and adequate credit monitoring.\u00a0<br \/>\nFor the most part, it\u2019s not if your data is breached, but when.\u00a0<\/p>\n<p>What data was breached?\u00a0<br \/>\nThe hackers stole a lot of data in this particular breach. It\u2019s pretty insane how much data they managed to get their hands on actually. In fact, Rick Tracy, the chief security officer at Telos, which is a cybersecurity firm, stated that \u201cif it\u2019s true, it\u2019s a treasure trove of personally identifiable information. This was a lot of data for a lot of customers. Unauthorized access should have triggered an alarm.\u201d<br \/>\nTracy is absolutely right here. The hackers took basically all of the data for these customers.\u00a0<br \/>\nPrepaid customers<br \/>\nFor prepaid customers, hackers stole their names, phone numbers, and account PINs. T-Mobile has reset all of the PINs on those accounts that were breached. But T-Mobile is still recommending everyone reset their PIN just in case.\u00a0<br \/>\nInterestingly, no customers from Metro by T-Mobile, Sprint prepaid or Boost Mobile customers had their information breached. Just regular T-Mobile Prepaid.\u00a0<br \/>\nPostpaid, former and prospective customers<br \/>\nThe data stolen in this group is different from the prepaid customers, because these are those that applied for financing. To do a monthly installment plan on their new phone \u2013 which Prepaid customers don\u2019t have that option.\u00a0<br \/>\nFor postpaid customers, their names, date of birth, social security number and driver\u2019s license\/ID information was stolen. And the same goes for former and prospective customers that applied for financing.\u00a0<br \/>\nT-Mobile says that phone numbers, account numbers, PINs, passwords and financial information was not compromised, however.\u00a0<br \/>\nHow you can protect yourself from these data hacks<br \/>\nWhether your data was breached or not, it\u2019s a good idea to take these steps to protect your data. Even if it didn\u2019t get hacked this time, that doesn\u2019t mean it won\u2019t in the future (or hasn\u2019t in the past). Here are a few ways to protect yourself and your data.\u00a0<\/p>\n<p>Freeze your credit<br \/>\nFreezing your credit is the best way to protect yourself from identity theft. However, you will need to contact all three credit bureaus to make this happen. That includes Equifax, Experian and TransUnion. The freeze is free, and all three credit bureaus give you a free credit report each year.\u00a0<br \/>\nWhen you do freeze your credit, it\u2019s going to require some extra work when you want to apply for new accounts like a credit card, car loan or even to rent an apartment. But it is worth it, for that peace of mind. Additionally, you won\u2019t be opening new accounts all that often.\u00a0<br \/>\nIt\u2019s also a good idea to sign up for Credit Karma. It\u2019s completely free and will alert you when it sees new things on your credit report. It also updates your credit report weekly (and updates the TransUnion score daily). So you can keep tabs on your credit and remove things that shouldn\u2019t be there.\u00a0<br \/>\nAlways good to check your credit from time to time, as you may not know when or if your data has been hacked. But checking your credit report will make it apparent a lot sooner that it has been breached.\u00a0<br \/>\nChange and beef up your password<br \/>\nYou\u2019ve probably heard this every time there\u2019s a data breach, but it is a good idea to change your password from time to time. And it\u2019s a good idea not to use the same password everywhere.\u00a0<br \/>\nGo ahead and change your password, and also make sure it is a pretty complex password. That\u2019s going to make it tougher for hackers to get into your account. Yeah, it\u2019ll make it tougher to remember, but you can also use a password manager to remember these passwords for you.\u00a0<br \/>\nUse two-factor authentication<br \/>\nIt\u2019s annoying, but two-factor authentication is really useful for securing your accounts. And many websites are now forcing you to use two-factor authentication. Particularly financial institutions.\u00a0<br \/>\nWith two-factor authentication or 2FA, those hacking your account will need to know more information about you, and\/or have access to your smartphone or email to actually get into your account. Which is a whole lot harder, and thus tougher for them to get into your account.\u00a0<br \/>\nHowever, that also means that every time you try to log into that account, you\u2019ll need to get a code send to your email or phone number. Which is not particularly easy, and does take some extra time to actually get into your account. But it is worth the trade-offs.\u00a0<br \/>\nYou could also opt for a physical security key. Google has their own, which they force all of their employees to use, and since then, they\u2019ve had zero hacks on their employees accounts. Which is rather impressive. But that\u2019s because the user would need that hardware key plus your passwords to get into your account.\u00a0<br \/>\nDelete unused accounts<br \/>\nWe\u2019ve all signed up for services, and then never used them again. But that could make it easier for hackers to hack your data. Especially if you use the same email and password for multiple websites and apps. Most of us use the same email for different accounts, which isn\u2019t a problem. The problem comes from using the same password with those accounts.\u00a0<br \/>\nAn easy way to find and delete these accounts is to Google your common username and your email address (separately of course), to find those accounts. Then you can go in and delete those accounts.\u00a0<br \/>\nWhy is this a big deal? Well if its an unused account, then you likely have not changed the password in quite some time. Which is going to make it super easy to hack that account.\u00a0<\/p>\n<p>Should I leave T-Mobile over this breach?<br \/>\nWhile this breach is very upsetting, especially given the amount of data that was breached. It might not be the biggest reason to leave T-Mobile. Of course, that decision is up to you anyways.\u00a0<br \/>\nAfter all, AT&amp;T also had a data breach very recently. Though we\u2019ve heard nothing about one at Verizon yet. So changing cell phone carriers might not solve your problem, unfortunately.\u00a0<br \/>\nBut if you go through the steps above and follow them to protect yourself and your data, you should be okay with T-Mobile. Let\u2019s just pray that T-Mobile does work to bolster its cybersecurity, though.\u00a0<br \/>\nUltimately, consumers have the power to vote with their wallet. So if you don\u2019t like the fact that T-Mobile doesn\u2019t appear to be taking these breaches seriously, jump to another carrier. If enough people do it, they\u2019ll get the message.<br \/>\nThe post The T-Mobile Data Breach: What We Know &amp; How To Protect Yourself appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2021\/08\/social.jpeg\" width=\"1280\" height=\"640\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T-Mobile has been in the headlines quite a bit lately, and it\u2019s not a good thing. Its customers\u2019 data has [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":8615,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/8614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=8614"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/8614\/revisions"}],"predecessor-version":[{"id":8616,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/8614\/revisions\/8616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/8615"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=8614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=8614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=8614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}