A Defensive Computing Checklist    by Michael Horowitz
NOTE: I gave a presentation on Defensive Computing at the HOPE conference in July 2022
HOME | Full Site Index | Domain Names | VPNs | iOS | Android | About | Rules of the Road | DC Presentation |

CELL PHONE COMPANIES

While SIM Swaps are probably the biggest danger when dealing with cellphone providers, there is also the issue of their wanting to spy on you.

OTHER TOPICS

T-MOBILE ADVERTISING

T-MOBILE HACKS and DATA BREACHES

It seems that T-Mobile has poor internal security. Between August 2018 and May 2023, the company suffered nine, count them, 9, data breaches. A reasonable person might chose to not use their services, just for this reason. Details below:

This article was written in August 2021 and then revised in January 2023: Here’s what to do if you think you're affected by T-Mobile's latest data breach by Chris Velazco for the Washington Post. Change your password (duh). Change your PIN (another duh). Freeze your credit reports. Avoid relying on your phone number for proving your identity with a text message. Instead, use an authenticator app for two factor authorization. In other words, the article just rounds up the usual suspects. To me, the most interesting thing here were some reader comments about 2FA for T-Mobile. It seems the company does it wrong. While they do offer the use of an authenticator app, at the same time, they will also offer a text message. This should have been in the article.

T-MOBILE HOME INTERNET

Again, there is more on cellphone company security on the SIM Swaps page.

 This page: 6 views per day (over 246 days)   Total views: 1,452   Created: January 20, 2023
This Page
Last Updated

September 21, 2023
Site Page
Views TOTAL

 684,368
Site Page
Views TODAY

  285
Previous
Website View

1.6 minutes ago
Website by
Michael Horowitz
@defensivecomput
top
Website Average Daily Page Views: August 2023: 558   See the website change log
Copyright 2019 - 2023