Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    What You Should Know About the T-Mobile, Experian Hack

    By
    Don Reisinger
    -
    October 5, 2015
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1What You Should Know About the T-Mobile, Experian Hack

      What You Should Know About the T-Mobile, Experian Hack

      A hack of Experian’s servers has affected approximately 15 million T-Mobile customers. Here’s what those users should know about the data breach.

      2It All Starts With Experian

      It All Starts With Experian

      The hack actually originated at Experian, the credit-monitoring company that provides everything from credit reports to organizations to services that allow users to track identity theft. For now, Experian said that it’s still investigating the matter, but it can confirm that its servers were hacked and accessed. It’s unknown who is behind the attacks.

      3How Does T-Mobile Get Involved?

      How Does T-Mobile Get Involved?

      So, how did this get back to T-Mobile? It’s simple: T-Mobile uses Experian for its credit checks on new customers. Whenever a person sets up a new financing account, T-Mobile sends their personal information through Experian’s servers to determine their risk level in being able to pay their bills. That’s why T-Mobile customer data was available in the Experian hack.

      4What Exactly Was Stolen?

      What Exactly Was Stolen?

      The sheer amount of data stolen is staggering. According to both Experian and T-Mobile, just about anything that a company would need from a person for a credit check was stolen, including names, Social Security numbers, home addresses, birthdates and other vital information that a hacker could use to wreak havoc on another person’s life.

      5Who Was Affected?

      Who Was Affected?

      According to T-Mobile, approximately 15 million of its customers were affected by the breach, including those who applied through the company’s device financing between September 2013 and September 16, 2015. That means customer data collected over a period of two years is at risk.

      6What Wasn’t Stolen?

      What Wasn't Stolen?

      While the items that were stolen are scary enough, T-Mobile was quick to point out that credit card numbers and bank accounts were not accessed as part of the breach. T-Mobile also said that its own systems were not compromised.

      7So Far, So Good, According to the Companies

      So Far, So Good, According to the Companies

      So far, the hackers who stole the personally identifiable information have not used it, according to both Experian and T-Mobile. That’s good news for those who have been hacked, but it doesn’t mean everything is forgotten. Quite the contrary, the hackers may be biding their time and looking to sell the information on the black market.

      8No Further Breaches Are Expected

      No Further Breaches Are Expected

      Experian claims that the loophole that the hackers used to access its data has been closed and user information is safe. Of course, as recent data breaches have shown, companies are sometimes wrong about the extent of the hacks and it’s possible more people may get caught up in this mess. For now, though, Experian doesn’t expect others to be affected.

      9Consumers Are Urged to Keep Close Tabs on Credit Reports

      Consumers Are Urged to Keep Close Tabs on Credit Reports

      The chances of identity theft are still high for those who have been affected, so it’s important that all customers keep an eye on their credit reports, according to Experian and T-Mobile. The companies are urging their customers to keep close tabs on their credit reports to see if hackers are using their personal information to open new credit cards or bank accounts. After all, with the information they have, they can effectively do whatever they want.

      10Free Credit Monitoring and Identity Protection Are Available

      Free Credit Monitoring and Identity Protection Are Available

      As part of their efforts to make things right for customers affected by the breach, T-Mobile and Experian are offering two years of free credit monitoring. In addition, they are paying for two years of identity resolution services through Protect My ID. While that may not be enough to satisfy those who have been affected, it’s better than nothing.

      11Expect T-Mobile to Ditch Its Experian Relationship

      Expect T-Mobile to Ditch Its Experian Relationship

      T-Mobile CEO John Legere has made clear that he’s extremely upset with Experian and said on his Twitter account that he’s evaluating all options. Considering how troubling the situation is, look for T-Mobile to sever ties with Experian and move on to another provider in short order.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×