From the perspective of an attacker, if the goal is to impersonate people or hijack their accounts, you have names, phone numbers, and associated account URLs. That's a lot of information in one place to get you started."
"What stands out about this incident is the sheer volume of data that’s been collected."
From the perspective of an attacker, if the goal is to impersonate people or hijack their accounts, you have names, phone numbers, and associated account URLs. That's a lot of information in one place to get you started."
"What stands out about this incident is the sheer volume of data that’s been collected."
(post is archived)