Preview

What Is The Massive T-Mobile Breach

Good Essays
Open Document
Open Document
241 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Is The Massive T-Mobile Breach
The breach happened to be a very experienced gentleman that hacked into the servers of T-Mobile to access some U.S confidential emails and files, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities.
“According to court records the massive T-Mobile breach first came to the government's attention in March 2004, when a hacker using the online moniker "Ethics" posted a provocative offer on muzzfuzz.com, one of the crime-facilitating online marketplaces being monitored by the Secret Service as part of Operation Firewall.” ( Google\ Tmobile.com)
The servers were easy to access because T-Mobile did not operate with firewalls and codes to help keep hackers from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The breach was not an outside job, but instead I choose it because of the relevance of the topics we have discussed thus far. The Army National Guard announced that a contracted employee transferred personally identifiable information to a data center that was not accredited by the DoD. This left the PII of all current and former Army National Guard members potentially at risk. The information included names, full Social Security Numbers, dates of birth and home addresses. The Army National Guard released the information quickly to warn current and former guard members that their data was potentially at risk and established a call center and a website that members could go to for personal worrying about their information. There they could check…

    • 141 Words
    • 1 Page
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The NOC Communications Team determines when an outage in T-Mobile network must be reported to the FCC and that Team is responsible for filing the FCC notification and reports. If an outage is FCC-reportable, a Customer Impact Message (CIM) is created. A reportable outage is the inability to complete a 911 call or provide location information to a PSAP or a Blocked Call condition where the user is on the T-Mobile network but unable to complete a call. Not all FCC reportable outages require a PSAP Notification. PSAP Notifications are sent whenever there is an FCC-reportable outage impacting 911 services directly or indirectly. These type of outages would include all blocked call and 911 network outages. Sympathy outages and non-911…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In particular, that 45% of the court circuits have adopted as broad interpretation of the law while only 36% have adopted a narrow interpretation of the law (Mikulic, 2016). The cautionary tale that the author spelled out in part I of the article was in particular an eye opener. The famous hacker and “internet troll” (Lennard, 2014) Weev (Andrew Auernheimer) was “sentenced to 41 months in federal prison for revealing to media outlets that AT&T had configured its servers to allow the harvesting of iPad owners' unsecured email addresses” (EFF, 2013). Both Weev and co-defendant Daniel Spitler used “a script that [exploited] the security hole to collect roughly 120,000 email addresses” (EFF, 2013). Weev was indicted under the provisions of the CFAA law, in particular the broad interpretation of the law. In which Weev had exploited a security hole that AT&T had failed to secure. I found that the author described a strong case where millions of Americans can be punished under the broad scope of…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    On May 2, 1011, a week later, a second security breach occurred on a different Sony network. The Sony Online Entertainment Networks was…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    T-Mobile Attack Strategy

    • 338 Words
    • 2 Pages

    John Legere, T-Mobile’s CEO recently made an appearance at an AT&T party and announced that T-Mobile would be offering a promotion to lure in new customers. Since most operators slap customers with an early termination fee if they want out of their contract, T-Mobile announced the plan to pay this fee for anyone who wants to break their existing contract and switch to T-Mobile. Galbraith talks about Legere as a CEO who is aggressive and someone who has “done a stellar job of shaking things up – while delivering strong marketing, sales, and operational execution as well.” (Galbraith, 2014). This plan was leaked a couple weeks before it was formally announced, but even with that being said AT&T launched their similar plan before T-Mobile. The only difference between the two plans is that AT&T is offering up to $450 versus T-Mobile who is offering $650. According to Rich Karpinski, a senior analyst at Yankee Group, the attack strategy will work better for T-Mobile.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Ipad's Security Breach

    • 1539 Words
    • 7 Pages

    The Goatse Security firm uncovered the mistake, and then handed the result over to Gawker Media LLC. A member of the group with Gawker media LLC said it took AT&T to long to inform customers of the security breach (The Wall Street Journal, 2010). “If not for our firm talking about the exploit to third parties who subsequently notified them, they would never have fixed it,” the board member whos name is Escher Auernheimer said. “We know what we did was right” (The Wall Street Journal, 2010).…

    • 1539 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Jail Security

    • 375 Words
    • 2 Pages

    allowed them an open line to any phone in the country, free and clear of…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Tjx Companies

    • 791 Words
    • 4 Pages

    TJX companies had very little security measures in place, and even the ones they had were mostly outdated. The company was using a Wired Equivalent Privacy (WEP) network encryption system. By today’s standards, and even at the time of intrusion, it is a fairly insecure system and is considered easy to hack into. Wi-Fi Protected Access (WPA), a more complex encryption system, was already available at the time of breach but the company did not upgrade to this more secure system. The wireless network they were using also did not have firewalls on many computers nor did they install any additional security software. Proprietary information, such as credit card data, was stored on the system for an extended period of time, and was not encrypted when it was sent.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Virgin Mobile Case Study

    • 579 Words
    • 3 Pages

    This case speaks of Dan Schulman who has just recently taken the position as CEO of Virgin Mobil USA. In the summer of 2001, he assembled a team and set a goal of 1 million subscribers by the end of the first year, and 3 million by the end of year four. Virgin although a top brand in the UK had a weak following in the states at this time. They had success in the UK with the launch of their mobile network and devices, but did not fare well in the Singapore market. Despite their setbacks, they decided to launch a joint network with Sprint in the United States purchasing minutes from Sprint on an as-used basis.…

    • 579 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    11. Mobile Malware Evolution: An Overview, Part 2, Kaspersky Labs, October 10, 2006, Alexander Gostev, Senior Virus Analyst.…

    • 2285 Words
    • 10 Pages
    Best Essays
  • Good Essays

    In 2003, Daniel Bass, a 24 year old computer-systems administrator was found to have stolen the data of millions of individuals from Acxiom’s databases. He spent two years collecting this information and stored it on compact discs (Behar, 2004). He broke into their system by simply cracking passwords (Behar, 2004). Bass was not the only hacker to crack Acxiom however. While authorities were investigating Bass, they ultimately discovered an additional hacker group from Boca Raton, Florida, who had cracked the passwords for the same server that Bass had gotten into as well. While they accessed information for millions of people; it did not appear that either hacking incident resulted in the defrauding of any of the individuals whose data was stolen (Behar, 2012). Acxiom definitely needed to do something to beef up their security measures and protect their customers’ data. They first hired a chief security officer, which had not been a position until these incidents. The chief security officer instituted mandatory encryptions, as well as working to prevent cybercrimes. Acxiom additionally began to conduct security audits (both conducted from inside and outside firms) to test for weaknesses in security.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Another story about hacking is when the famous movie Star Wars first came out, hundreds and thousands of people have to wait in line for hours to watch it. But a group of hackers have watched it and spreads it in the internet for about a week before the premiere. They successfully hacked the Star Wars database and took the movie data.…

    • 456 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime Awareness

    • 1690 Words
    • 7 Pages

    The "phone phreakers" of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. It has been suggested that as long ago as 1990, security failures at one major telecommunications carrier cost approximately £290 million, and that more recently, up to 5% of total industry turnover has been lost to fraud.…

    • 1690 Words
    • 7 Pages
    Powerful Essays