article thumbnail

T-Mobile Suffers Data Breach Yet Again

IT Toolbox

The post T-Mobile Suffers Data Breach Yet Again appeared first on Spiceworks. The breach, discovered on March 27, occurred between February 24 and March 30.

Mobile 323
article thumbnail

How Will Mobile IDs Shape Citizen Experiences?

IT Toolbox

Mobile IDs redefine government-citizen interactions, enhancing security and convenience through smartphone-based credentials. The post How Will Mobile IDs Shape Citizen Experiences? appeared first on Spiceworks.

Mobile 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How hackers stole the personal data of 37 million T-Mobile customers

Tech Republic Security

The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The post How hackers stole the personal data of 37 million T-Mobile customers appeared first on TechRepublic.

Mobile 212
article thumbnail

1,859 Mobile Apps, Mostly iOS, Found Storing Hard-Coded Credentials for AWS Databases

IT Toolbox

Symantec research spotlights the gaping holes in secure upstream mobile application development and its potential consequences to data security and privacy. The post 1,859 Mobile Apps, Mostly iOS, Found Storing Hard-Coded Credentials for AWS Databases appeared first on Spiceworks.

Mobile 246
article thumbnail

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns. Let''s take a look at.

Mobile 226
article thumbnail

Washington state AG says T-Mobile is wrongly withholding documents in security probe

GeekWire

T-Mobile CEO Mike Sievert, speaking at a Technology Alliance event in Seattle in May, said security breaches have been a catalyst “to make sure we have the right technology, the right architecture that’s fundamentally protected, and the right level of investment.”

Mobile 110
article thumbnail

Why Every C-suite Leader Must Prioritize Cloud Security

IT Toolbox

Trends, such as data being accessed from mobile devices and home offices, and the increasing sophistication of attacks, are fuelling security risks. The post Why Every C-suite Leader Must Prioritize Cloud Security appeared first on Spiceworks.

Security 246