A Defensive Computing Checklist    by Michael Horowitz
NOTE: I gave a presentation on Defensive Computing at the HOPE conference in July 2022
HOME | Full Site Index | Domain Names | VPNs | iOS | Android | About | Rules of the Road | DC Presentation |

CELL PHONE COMPANIES

While SIM Swaps are probably the biggest danger when dealing with cellphone providers, there is also the issue of their wanting to spy on you.

T-MOBILE ADVERTISING

T-MOBILE HACKS and DATA BREACHES

It seems that T-Mobile has poor internal security. Between August 2018 and January 2023, the company suffered eight, count them, 8, data breaches. A reasonable person might chose to not use their services, just for this reason. Details below:

This article was written in August 2021 and then revised in January 2023: Here’s what to do if you think you're affected by T-Mobile's latest data breach by Chris Velazco for the Washington Post. Change your password (duh). Change your PIN (another duh). Freeze your credit reports. Avoid relying on your phone number for proving your identity with a text message. Instead, use an authenticator app for two factor authorization. In other words, the article just rounds up the usual suspects. To me, the most interesting thing here were some reader comments about 2FA for T-Mobile. It seems the company does it wrong. While they do offer the use of an authenticator app, at the same time, they will also offer a text message. This should have been in the article.

T-MOBILE SELF HELP

T-MOBILE HOME INTERNET

 This page: 8 views per day (over 18 days)   Total views: 150   Created: January 20, 2023
This Page
Last Updated

January 21, 2023
Total Site
Page Views

 537,280
Site Page
Views Today

  1,631
Previous
Website View

2.2 minutes ago
Website by
Michael Horowitz
@defensivecomput
top
Copyright 2019 - 2023