{"id":28362,"date":"2024-04-15T23:24:00","date_gmt":"2024-04-15T23:24:00","guid":{"rendered":"https:\/\/radiantmedia.io\/?p=28362"},"modified":"2024-04-16T02:38:59","modified_gmt":"2024-04-16T02:38:59","slug":"over-72-million-att-customers-have-had-their-data-leaked-including-ssn-numbers-birth-dates-more-now-att-is-giving-away-free-identity-theft-credit-monitoring","status":"publish","type":"post","link":"http:\/\/34.197.49.85\/?p=28362","title":{"rendered":"Over 72 Million AT&#038;T Customers Have Had Their Data Leaked, Including SSN Numbers, Birth Dates, &#038; More Now AT&#038;T Is Giving Away Free Identity Theft &#038; Credit Monitoring"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Last month, an online hacker claimed to have obtained the personal information of 72.6 million AT&amp;T customers. <\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>According to reports, the breach includes AT&amp;T customers&#8217; names, addresses, mobile phone numbers, decrypted dates of birth, encrypted social security numbers, and other corporate information. AT&amp;T has now admitted that the data was released, but there is no indication that the leak originated on its servers, leading many to suspect that a third party leaked the data.<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>READ MORE: <a href=\"https:\/\/radiantmedia.io\/2022\/12\/15\/ahead-of-the-holidays-att-is-offering-up-to-1000-off-new-iphones-and-galaxy-upgrades\/\">Ahead Of The Holidays, AT&amp;T Is Offering Up To $1,000 Off New iPhones And Galaxy Upgrades<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-1024x512.webp\" alt=\"\" class=\"wp-image-28392\" srcset=\"http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-1024x512.webp 1024w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-300x150.webp 300w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-768x384.webp 768w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-1536x768.webp 1536w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-1080x540.webp 1080w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-1280x640.webp 1280w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-980x490.webp 980w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-480x240.webp 480w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909-600x300.webp 600w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/72701307007-getty-images-1247531909.webp 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>With this confirmation, AT&amp;T stated over the weekend that it will provide current and previous customers with a free year of Experian&#8217;s IdentiyWorks service to help protect their online identities. If you are eligible for this deal, you should have gotten an email from AT&amp;T. Make sure to carefully study your email before deleting it.<\/p>\n\n\n\n<p>According to reports, data from 7.6 million current and 65 million previous consumers was exposed. AT&amp;T issued the following statement on its website:<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>READ MORE: <a href=\"https:\/\/radiantmedia.io\/2024\/01\/29\/in-2024-cookies-will-eventually-die-heres-why-advertisers-should-rejoice-about-this-upgrade\/\">In 2024, Cookies Will Eventually Die. Here\u2019s Why Advertisers Should Rejoice About This Upgrade<\/a><\/strong><\/p>\n\n\n\n<p>It has come to our attention that certain AT&amp;T passcodes have been hacked. We are contacting all 7.6 million impacted clients and have reset their passcodes. In addition, we will communicate with current and previous account holders who have compromised sensitive personal information.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/de8879eefe8bf40ef8545eaecef4e62b-1024x576.jpeg\" alt=\"\" class=\"wp-image-28393\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/de8879eefe8bf40ef8545eaecef4e62b-1024x576.jpeg 1024w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/de8879eefe8bf40ef8545eaecef4e62b-980x551.jpeg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/de8879eefe8bf40ef8545eaecef4e62b-480x270.jpeg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Our internal teams are collaborating with external cybersecurity specialists to assess the situation. To the best of our knowledge, the hacked data appears to be from 2019 or earlier and does not include personal financial information or phone records.<\/p>\n\n\n\n<p>The data was originally offered for sale in 2021, but it is now available for free online. BleepingComputer claims to have evaluated the data and can confirm that some of the 72.6 million lines are correct, including social security numbers, residences, dates of birth, and phone numbers.<\/p>\n\n\n\n<p>Be wary of any calls or texts purporting to be from AT&amp;T. The disclosed data can be used to launch targeted attacks on AT&amp;T subscribers.<\/p>\n\n\n\n<p>So, what should you do if you are an AT&amp;T customer whose data may have been released online?<\/p>\n\n\n\n<p>Here are a few actions you can do to better protect yourself. While nothing you do can completely prevent you from an attack or someone using your information against you, these steps will assist to reduce the risk and make it much more difficult for scammers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"602\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01.webp\" alt=\"\" class=\"wp-image-28394\" srcset=\"http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01.webp 1024w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01-300x176.webp 300w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01-768x452.webp 768w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01-980x576.webp 980w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01-480x282.webp 480w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/OCR-Z-ATT-0331-01-600x353.webp 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Step 1: Check your passwords.<\/p>\n\n\n\n<p>If you&#8217;re like many individuals, you reuse passwords across multiple accounts. It&#8217;s a terrible practice, but considering how many accounts people manage, it&#8217;s reasonable that they&#8217;d stoop to it. If one of those passwords is compromised, a hacker could gain access to a variety of accounts and services under your name.<\/p>\n\n\n\n<p>So, if you are someone who uses the same password again, change it!<\/p>\n\n\n\n<p>Better still, sign up for a password manager, which will generate unique, complex passwords for all of your accounts, allowing you to remember only one.<\/p>\n\n\n\n<p>However, keep in mind that password managers, such as Lastpass, can be compromised, as happened late last year. Bitwarden provides a pretty complete version of their password management software for free, but providers such as 1Passworld and Dashlane provide more bells and whistles for a higher price.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/2E027F90-C027-471F-807DA2A00B82F700_source.webp\" alt=\"\" class=\"wp-image-28395\" srcset=\"http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/2E027F90-C027-471F-807DA2A00B82F700_source.webp 600w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/2E027F90-C027-471F-807DA2A00B82F700_source-300x200.webp 300w, http:\/\/34.197.49.85\/wp-content\/uploads\/2024\/04\/2E027F90-C027-471F-807DA2A00B82F700_source-480x320.webp 480w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Just keep in mind that they are not immune to attacks (as Lastpass demonstrated), so you may need to be prepared to switch services if one fails to sufficiently protect you.<\/p>\n\n\n\n<p>Step 2: Two-factor authentication.<\/p>\n\n\n\n<p>Adding a second layer of security to your most important accounts is also essential. That frequently involves two factor authentication, in which you are given a second, randomized password or pin number to input in addition to your ordinary password, confirming that you are, in fact, you.<\/p>\n\n\n\n<p>This is a function provided by all banks and many services, so make use of it wherever available.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/2017_ATT_JZ_OAKLAWN-5-1_compressed-1024x678.jpg\" alt=\"\" class=\"wp-image-28396\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/2017_ATT_JZ_OAKLAWN-5-1_compressed-980x649.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/2017_ATT_JZ_OAKLAWN-5-1_compressed-480x318.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Many provide text message-based multi-factor authentication, but considering how readily your cellphone number may be compromised, security experts urge utilizing an app-based authentication program such as Google Authenticator or Authy. For individuals who are especially attentive, a physical fob like one from Yubikey is the best choice.<\/p>\n\n\n\n<p>Step 3: Work with credit agencies.<\/p>\n\n\n\n<p>You can place a fraud alert with the three credit bureaus: Experian, TransUnion, and Equifax. If someone files a credit application in your name, the agencies will contact you for verification.<\/p>\n\n\n\n<p>Keep in mind that the fraud alert is only valid for one year, after which you can manually extend it.<\/p>\n\n\n\n<p>You can also request to freeze or lock your credit, which limits or prevents other firms from accessing it. Keep in mind that this can be inconvenient if you&#8217;re signing up for internet service, as the freeze prevents the company from accessing your data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/ATT-Data-breach-1024x576.jpg\" alt=\"\" class=\"wp-image-28397\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/ATT-Data-breach-1024x576.jpg 1024w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/ATT-Data-breach-980x551.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/04\/ATT-Data-breach-480x270.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Step 4: Continue monitoring your credit and accounts.<\/p>\n\n\n\n<p>Even once you have locked down your credit, you must continue to monitor your various accounts. However, this can be extremely stressful at times, and it is only natural for that attentiveness to decrease with time.<\/p>\n\n\n\n<p>You can join up for a program like Norton LifeLock or American Express CreditSecure to keep track of your accounts and passwords. These services monitor whether your passwords or accounts have been compromised and send you regular updates.<\/p>\n\n\n\n<p>At this stage, it&#8217;s also a good idea to check any dormant accounts, whether they&#8217;re old emails or for a retailer, and close them. The smaller your digital trace, the more difficult it is for a scammer to detect you.<\/p>\n\n\n\n<p><a href=\"https:\/\/cordcuttersnews.com\/over-72-million-att-customers-have-had-their-data-leaked-including-ssn-numbers-birth-dates-more-now-att-is-giving-away-free-identity-theft-credit-monitoring\/\">Source<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center has-vivid-red-color has-text-color has-link-color has-medium-font-size wp-elements-ff9e2db4a6c4c5f6c36606f49d21fb44\"><em><strong>Radiant TV, offering to\u00a0elevate your entertainment game!\u00a0Movies, TV series, exclusive interviews, music, and more\u2014download now on various devices, including iPhones, Androids, smart TVs, Apple TV, Fire Stick, and more.<\/strong><\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"993\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-1024x993.jpg\" alt=\"\" class=\"wp-image-22795\" style=\"width:363px;height:auto\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-980x950.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-480x465.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-social-links aligncenter has-huge-icon-size is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-16018d1d wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/teamradiant\/mycompany\/?viewAsMember=true\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/RadiantTechnologiesLV\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-instagram  wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/radianttechnologieslv\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a href=\"https:\/\/twitter.com\/RadiantTechlv\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Last month, an online hacker claimed to have obtained the personal information of 72.6 million AT&amp;T customers. According to reports, the breach includes AT&amp;T customers&#8217; names, addresses, mobile phone numbers, decrypted dates of birth, encrypted social security numbers, and other corporate information. AT&amp;T has now admitted that the data was released, but there is no [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":28391,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"1080","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-28362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-news"],"aioseo_notices":[],"_links":{"self":[{"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/posts\/28362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/34.197.49.85\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28362"}],"version-history":[{"count":1,"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/posts\/28362\/revisions"}],"predecessor-version":[{"id":28398,"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/posts\/28362\/revisions\/28398"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.197.49.85\/index.php?rest_route=\/wp\/v2\/media\/28391"}],"wp:attachment":[{"href":"http:\/\/34.197.49.85\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.197.49.85\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28362"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.197.49.85\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}