Review of the New Link to Windows Application

Fig. 1. Screen Clip of the Link to Windows Application. Microsoft. Fair use Journalistic and AI created, 2025, Jeremy Swenson.

Minneapolis—

In today’s interconnected world, managing tasks across multiple devices has become second nature for many. The Link to Windows application takes this multitasking to the next level, creating a seamless bridge between Android smartphones and Windows PCs. It’s not just about convenience; it’s about enhancing productivity, ensuring security, and even adding a touch of fun to your digital life. Here’s a closer look at what the app offers, how it works, and why it’s worth integrating into your daily routine.


How It Works:

The Link to Windows app is like a personal assistant for your devices, synchronizing your Android smartphone with your Windows PC using a Microsoft account and a Wi-Fi connection.[1] Once paired, the app allows users to access essential phone functions directly from their computer. This includes:

  • Sending and receiving text messages.
  • Managing calls.
  • Accessing mobile apps right on the PC.
  • Viewing and transferring photos.
  • Mirroring notifications in real time.

Samsung and Surface Duo devices, the app is built-in, while others can easily download it from the Google Play Store. On the PC side, it integrates with Microsoft’s Phone Link app, pre-installed on Windows 10 and 11. The setup process is intuitive and guided, ensuring even beginners can start using the app with ease.


Key Benefits:

1. Security: Keeping Your Data Safe

Security is a cornerstone of the Link to Windows experience.

  • End-to-End Encryption ensures that messages and notifications are private and protected from prying eyes.
  • Granular Permissions empower users to decide exactly which features are shared between their devices, offering peace of mind.
  • For professionals, the app’s enterprise-friendly design makes it a great tool for IT-managed systems, maintaining compliance with corporate security standards.
  • Microsoft Account Integration leverages robust authentication protocols, including multi-factor authentication, to secure your data.

2. Convenience: Simplifying Multitasking

Imagine texting with the speed and ease of a full keyboard—that’s just one of the standout features of Link to Windows. Typing messages on your PC eliminates the frustration of small on-screen keyboards and lets you copy-paste content seamlessly between apps. Whether you’re drafting a quick response or multitasking during a meeting, this feature alone is a game-changer. Beyond texting, the app’s convenience extends to:

  • Unified Notifications: No more juggling devices; get all your alerts in one place and respond directly from your computer.
  • Drag-and-Drop File Transfers: Share photos, documents, and other files instantly between your phone and PC.
  • App Streaming: Run Android apps on your PC in a separate window, perfect for accessing mobile-only tools while working on a larger screen.

3. Fun: Enhancing Everyday Life

Link to Windows isn’t all about work—it’s also about fun and personalization.

  • Gaming Fans can play their favorite mobile games on a larger screen with keyboard and mouse controls for better precision.
  • Media Enthusiasts will love the ease of browsing photo galleries or streaming music directly from their phone to their PC.
  • Customization Options let you tailor notification styles and app layouts to match your workflow or personal aesthetic, making the experience uniquely yours.

Competitors in the Market:

While Link to Windows shines as a leader in device integration, it isn’t without competition. Apps like AirDroid and Pushbullet offer similar functionalities, such as file transfers, notifications, and messaging synchronization. However, these competitors often require premium subscriptions to unlock full features, whereas Link to Windows integrates seamlessly and cost-effectively with the Windows ecosystem.

Even Samsung recommends it as their own attempt at it failed: “The DeX for PC on Windows OS will end support from the One UI 7 version. We encourage customers to connect mobile phones and PCs through the Link to Windows feature.”[2]

Additionally, Apple users may point to the Apple Continuity suite, which offers exceptional integration between iOS devices and Macs. Though limited to Apple’s ecosystem, its smooth handoff capabilities, messaging sync, and call management rival those of Link to Windows. For those in mixed-device households, Link to Windows provides a more versatile alternative, particularly for Android-Windows users.


Why It’s Revolutionary:

The magic of Link to Windows lies in its ability to make your devices feel like extensions of one another. Instead of viewing your phone and PC as separate entities, the app integrates them into a single ecosystem. For instance, you can answer a text message on your PC, drag a photo into a PowerPoint slide, and then pick up a call—all without ever touching your phone. This unified experience is not just convenient; it’s empowering.


Room for Improvement:

While the app is a stellar achievement, it does have some room for growth:

  • The initial pairing process can be slightly clunky for non-tech-savvy users.
  • Not all features, such as app streaming, are available on every Android device, which can limit its appeal.
  • Apple users are left out, as there’s no comparable integration for iOS devices, making it a missed opportunity for cross-platform connectivity.

Final Verdict:

The Link to Windows app represents a new era in device integration. It’s a must-have for Android users who rely on Windows PCs, offering unparalleled security, convenience, and even an element of fun. From the ease of sending texts with a full keyboard to the joy of playing mobile games on a larger screen, the app transforms everyday tasks into streamlined experiences.


About the Author:

Jeremy A. Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and seasoned senior management tech risk and digital strategy consultant. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. He holds a certificate in Media Technology from Oxford University’s Media Policy Summer Institute, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota’s Technological Leadership Institute, an MBA from Saint Mary’s University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire. He is an alum of the Federal Reserve Secure Payment Task Force, the Crystal, Robbinsdale, and New Hope Community Police Academy (MN), and the Minneapolis FBI Citizens Academy. You can follow him on LinkedIn and Twitter.


References:

[1] Microsoft. “Use Phone Link to Sync Your Android or iPhone”. 12/06/24. https://www.microsoft.com/en-us/windows/sync-across-your-devices?r=1

[2] Bowe, Zac. “Samsung is killing DeX for Windows — suggests Microsoft Phone Link as a replacement”. 12/03/24. https://www.windowscentral.com/software-apps/windows-11/samsung-is-killing-dex-for-windows-suggests-microsoft-phone-link-as-a-replacement

Foreign Threat Actors Amplify Disinformation Ahead of 2024 U.S. Election, Warn FBI and CISA

Minneapolis—

As the 2024 U.S. general election nears, the FBI and CISA have issued a public service announcement to alert the public about foreign disinformation campaigns.[1] These campaigns, led by foreign adversaries, aim to undermine voter confidence by spreading false narratives before, during, and after Election Day. Despite these efforts, the FBI and CISA confirm that there is no evidence of malicious cyber activity compromising U.S. election infrastructure, including voter registration systems, ballots, or vote-counting processes.

Evolving Disinformation Tactics with AI:

The disinformation campaigns have become more sophisticated due to the use of generative AI tools, which allow foreign actors to create convincing fake content, such as AI-generated articles, deepfake videos, and synthetic media.[2] These false narratives are then spread across multiple platforms, both in the U.S. and abroad. By lowering the barrier for creating and distributing disinformation, AI has made it easier for foreign actors to mislead the public and erode trust in the election process.

Disinformation Campaigns from Russia and Iran:

Russia and Iran are identified as the primary foreign actors behind many of these disinformation efforts. Russian operatives have set up AI-enhanced social media bot farms and cybersquatted on domains mimicking legitimate news websites, such as “washingtonpost.pm” and “foxnews.in,” to disseminate propaganda. The DOJ responded by seizing over 30 of these domains and indicting individuals linked to Russian government-controlled media outlets that covertly funded U.S. influence campaigns.

Iran, too, has engaged in similar efforts, with recent DOJ charges against Iranian nationals accused of hacking and leaking U.S. campaign materials to manipulate the election outcome.

Public Recommendations:

To help combat the spread of disinformation, FBI and CISA urge the public to:

  • Educate themselves about foreign influence operations, especially AI-generated content.
  • Rely on trusted sources, such as state and local election officials, to verify election-related claims.
  • Understand AI-generated content by looking for clues that content may be doctored or synthetic.
  • Report suspicious activity or disinformation attempts to the FBI.

Election Security Efforts:

Federal, state, and local authorities are collaborating to safeguard U.S. elections. The FBI investigates election crimes and foreign influence campaigns, while CISA works to secure election infrastructure. Jen Easterly, director of CISA, has reassured voters that the systems are more secure than ever, with robust cybersecurity measures in place, including paper ballot records that verify vote counts in 97% of jurisdictions.

Easterly emphasized that, although foreign adversaries will continue to attempt to influence U.S. elections, they will not be able to alter the final outcome. She also encouraged patience as election results may take time to finalize and urged the public to trust official sources. Being an election judge is not a bad idea either.

Conclusion:

As Election Day approaches, foreign disinformation campaigns remain a threat, but significant efforts have been made to secure the election process. With the support of informed voters and coordinated efforts from election officials, the integrity of U.S. elections can be maintained. We in the private sector need to share and support these efforts, as CISA, and the FBI cannot be everywhere.

About the Author:

Jeremy A. Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and seasoned senior management tech risk and digital strategy consultant. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. He holds a certificate in Media Technology from Oxford University’s Media Policy Summer Institute, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota’s Technological Leadership Institute, an MBA from Saint Mary’s University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire. He is an alum of the Federal Reserve Secure Payment Task Force, the Crystal, Robbinsdale, and New Hope Community Police Academy (MN), and the Minneapolis FBI Citizens Academy. You can follow him on LinkedIn and Twitter.


[1] CISA. “FBI and CISA Issue Public Service Announcement Warning of Tactics Foreign Threat Actors are Using to Spread Disinformation in the 2024 U.S. General Election.” 10/18/24. https://www.cisa.gov/news-events/news/fbi-and-cisa-issue-public-service-announcement-warning-tactics-foreign-threat-actors-are-using

[2] CISA. “FBI and CISA Issue Public Service Announcement Warning of Tactics Foreign Threat Actors are Using to Spread Disinformation in the 2024 U.S. General Election.” 10/18/24. https://www.cisa.gov/news-events/news/fbi-and-cisa-issue-public-service-announcement-warning-tactics-foreign-threat-actors-are-using

The 9/11 Terrorist Attacks: Lessons Learned for Security and Investigation

On September 11, 2001, the United States faced one of its darkest days. Today, we remember the lives lost and the lessons learned. Nineteen terrorists, linked to the extremist group al-Qaeda, executed a coordinated series of attacks on American soil. Four commercial airplanes were hijacked: two were flown into the Twin Towers of the World Trade Center in New York City, one crashed into the Pentagon in Washington, D.C., and the fourth, United Airlines Flight 93, was downed in a field in Pennsylvania after passengers fought the hijackers.[1]

The tragic events unfolded over the span of just a few hours, forever changing the course of U.S. history. Nearly 3,000 people lost their lives, including civilians, first responders, and passengers on the hijacked planes. The attack had devastating human and emotional costs, along with far-reaching economic and geopolitical consequences. Today, a memorial stands at Ground Zero in New York City, honoring the victims and reminding future generations of the impact of terrorism.

Timeline of the Attack:

  • 8:46 AM: American Airlines Flight 11 crashes into the North Tower of the World Trade Center.
  • 9:03 AM: United Airlines Flight 175 crashes into the South Tower.
  • 9:37 AM: American Airlines Flight 77 crashes into the Pentagon.
  • 9:59 AM: The South Tower collapses.
  • 10:03 AM: United Airlines Flight 93 crashes in Pennsylvania.
  • 10:28 AM: The North Tower collapses.

The 9/11 Commission Report:[2]

The aftermath of 9/11 spurred a comprehensive investigation into how the attacks occurred and what failures enabled them. The 9/11 Commission Report, released in 2004, outlined critical lessons and provided recommendations to prevent future attacks. It focused on three key areas: the importance of collaboration, the need for enhanced information sharing, and the role of private sector innovation in improving national security.

1. The Power of Collaboration

Before 9/11, U.S. intelligence and law enforcement agencies operated in silos. The FBI, CIA, and other entities each managed their own investigations without significant interagency coordination. This fragmented approach hindered their ability to piece together warning signs that, in hindsight, could have potentially foiled the attacks. One of the most important lessons learned was the need for stronger collaboration across all government agencies.

Post-9/11, the creation of the Department of Homeland Security (DHS) and the Director of National Intelligence (DNI) was designed to foster better collaboration. DHS now coordinates efforts across different agencies, while the DNI serves as the head of the U.S. Intelligence Community, overseeing the work of multiple intelligence organizations. This structure has strengthened unity across federal and local government institutions.

2. Information Sharing as a Security Best Practice

Prior to the attacks, there was a critical failure in sharing information. Multiple agencies had pieces of intelligence about suspicious activities by some of the hijackers, but these data points weren’t shared in time to create a clear threat picture.

The 9/11 Commission Report emphasized the need for robust information sharing among agencies. The report also led to the creation of fusion centers where federal, state, and local agencies can share intelligence in real time. This collaborative approach has drastically improved the ability to detect and respond to potential threats, highlighting the importance of breaking down institutional silos and fostering a culture of openness among government bodies.

The USA PATRIOT Act, enacted shortly after 9/11, further addressed this issue by expanding the sharing of information between law enforcement and intelligence agencies, though it has also sparked ongoing debates about privacy and civil liberties. Yet it was abused in some cases, resulting in the overreach of phone and internet data surveillance by the NSA, which was rolled back during the Obama administration after Edward Snowed leaked these abuses.

3. Private Sector Innovation in Security

The private sector plays a crucial role in national security, particularly in areas such as cybersecurity, surveillance technologies, and aviation security. The 9/11 Commission Report acknowledged that the private sector has the ability to innovate quickly and provide cutting-edge solutions to address security threats. In response to 9/11, the Transportation Security Administration (TSA) was created to oversee airport security, with significant input from private companies on how to better screen passengers and cargo.

In the years following the attacks, advancements in biometric technology, data encryption, and surveillance systems have all stemmed from public-private partnerships. Companies have also played a role in developing cybersecurity frameworks to protect critical infrastructure from potential digital attacks, reflecting the growing interdependence between national security and technological innovation.

Memorial and Remembrance:

The legacy of 9/11 continues through memorials and acts of remembrance. The National September 11 Memorial & Museum was built at Ground Zero, featuring two large reflecting pools where the Twin Towers once stood, with the names of the victims inscribed in bronze. It serves as a place for reflection and remembrance, while the museum educates visitors on the events of that day and the lives lost.

Conclusion:

The 9/11 terrorist attacks were a defining moment in modern history. They highlighted vulnerabilities in U.S. national security, but the response led to transformative changes in how the nation collaborates, shares information, and innovates to protect itself. The lessons learned from the 9/11 Commission Report continue to shape security and investigation best practices, with collaboration, information sharing, and private sector innovation standing at the core of these efforts. These changes honor the memory of the lives lost and aim to prevent such a tragedy from ever happening again. The private sector is critical to all of this.

About the Author:

Jeremy A. Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and seasoned senior management tech risk and digital strategy consultant. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. He holds a certificate in Media Technology from Oxford University’s Media Policy Summer Institute, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota’s Technological Leadership Institute, an MBA from Saint Mary’s University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire. He is an alum of the Federal Reserve Secure Payment Task Force, the Crystal, Robbinsdale, and New Hope Community Police Academy (MN), and the Minneapolis FBI Citizens Academy. You can follow him on LinkedIn and Twitter.

References:


[1] U.S. Gov’t.” The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)”. 2004.

[2] U.S. Gov’t.” The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)”. 2004.

The Synergy of Art and Technology: Innovation Through Music

Fig. 1. Explore the landscape of AI-Generated Music. Todd S Omohundro, 2024.

Art and technology, though seemingly different realms, have consistently converged to drive groundbreaking innovations. When these two domains intersect, they enhance each other’s potential, creating new pathways for expression, communication, and progress. Music, a quintessential form of art, has particularly benefited from technological advancements, leading to transformative changes in how music is created, distributed, and experienced. This essay explores the importance of the symbiotic relationship between art and technology in music, highlights pioneering musicians who have embraced technology, and outlines the steps to innovation in this fusion, including the significant financial and business impacts of technologies like streaming.

The Convergence of Art and Technology in Music

Music and technology have been intertwined since the earliest days of instrument development. From the invention of the piano to the electric guitar, technological advancements have continually expanded the boundaries of musical expression. In the modern era, digital technology has revolutionized music production, distribution, and consumption.

The importance of this convergence lies in its ability to democratize music creation and distribution. Technology enables musicians to produce high-quality recordings without the need for expensive studio time, distribute their music globally via digital platforms, and interact with their audience in real-time through social media. This democratization has not only increased the diversity of music available but has also given rise to new genres and forms of expression that were previously unimaginable.

Pioneering Musicians in Technology

Several musicians have stood out as pioneers in integrating technology into their art, pushing the boundaries of what is possible in music.

  1. Brian Eno: Often regarded as the godfather of ambient music, Brian Eno’s work in the 1970s with synthesizers and tape machines laid the foundation for electronic music. His innovations in the use of the studio as an instrument and his development of generative music, which uses algorithms to create ever-changing compositions, have had a lasting impact on the music industry.
  2. Björk: Icelandic artist Björk is renowned for her avant-garde approach to music and technology. Her 2011 album “Biophilia” was released as a series of interactive apps, each corresponding to a different track. This innovative format allowed listeners to explore the music through visual and tactile interaction, blending auditory and digital experiences.
  3. Imogen Heap: British musician Imogen Heap has been at the forefront of music technology with her development of the Mi.Mu gloves. These wearable controllers allow musicians to manipulate sound and effects through hand gestures, providing a new way to perform and interact with music.
  4. Prince: Prince was a visionary who seamlessly integrated technology into his music. He was one of the first major artists to sell an album (1997’s “Crystal Ball”) directly to fans via the internet, bypassing traditional distribution channels. Prince’s use of digital recording techniques and electronic instruments in his music, along with his pioneering approach to online music distribution, showcased his forward-thinking approach to the convergence of music and technology.
  5. Billy Corgan: As the frontman of The Smashing Pumpkins, Billy Corgan has been an advocate for technological advancements in music. He embraced the digital recording revolution early on and has continually pushed the boundaries of what can be achieved in the studio. His use of layered guitars and innovative recording techniques has influenced countless artists and producers.

Financial and Business Impacts of Music Technology

The fusion of music and technology has not only transformed artistic expression but has also had significant financial and business impacts. The advent of digital streaming platforms like Spotify, Apple Music, and Tidal has revolutionized the music industry’s economic model.

  1. Revenue Streams: Streaming has created new revenue streams for artists, labels, and tech companies. While physical album sales have declined, the revenue from streaming subscriptions and ad-supported models has surged, offering artists new ways to monetize their work.
  2. Global Reach: Technology has enabled artists to reach global audiences instantly. Musicians can now distribute their music worldwide with a single click, breaking down geographical barriers and allowing for a more diverse and inclusive music industry.
  3. Data Analytics: Streaming platforms provide valuable data analytics to artists and labels, offering insights into listener behavior, preferences, and trends. This information helps musicians make informed decisions about marketing, touring, and production.
  4. Direct-to-Fan Engagement: Social media and other digital tools allow artists to engage directly with their fans, fostering a more personal connection and enabling innovative marketing strategies. Crowdfunding platforms like Kickstarter and Patreon have also emerged, allowing fans to directly support their favorite artists’ projects.

Steps to Innovation in Music Technology

Innovation at the intersection of music and technology follows several key steps:

  1. Identification of a Need or Opportunity: Innovation begins with recognizing a gap or potential for improvement. For instance, the traditional music industry’s limitations in distribution and production led to the development of digital audio workstations (DAWs) and streaming platforms.
  2. Research and Development: This step involves exploring existing technologies and experimenting with new ideas. Musicians like Brian Eno experimented with tape loops and synthesizers to create new sounds, while modern artists might explore artificial intelligence to compose music.
  3. Implementation and Dissemination: Once a viable innovation is developed, it must be implemented and shared with the broader community. Digital platforms like SoundCloud and Bandcamp have been instrumental in distributing new music technologies and innovations.
  4. Feedback and Iteration: Continuous improvement based on feedback is essential. As technology evolves, so too must the tools and methods used by musicians. This iterative process ensures that innovations remain relevant and effective.
  5. Collaboration: Innovation often requires interdisciplinary collaboration. Musicians work with software developers, engineers, and designers to create new instruments, applications, and performance tools. Björk’s “Biophilia” project, for example, involved collaboration with app developers, designers, and scientists.
  6. Prototyping and Testing: Creating prototypes and testing them in real-world scenarios is crucial. Imogen Heap’s development of the Mi.Mu gloves involved numerous iterations and live performance testing to refine the technology.

Conclusion

The fusion of art and technology, particularly in music, has led to profound innovations that have reshaped the landscape of the industry. Pioneering musicians like Brian Eno, Björk, Imogen Heap, Billy Corgan, and Prince have not only expanded the boundaries of musical expression but have also democratized the creation and distribution of music. The integration of technology in music production and distribution has had significant financial and business impacts, revolutionizing revenue streams, global reach, data analytics, and fan engagement. By following a structured approach to innovation, which includes identifying opportunities, research and development, collaboration, prototyping, implementation, and iteration, artists can continue to push the envelope and create transformative experiences. As technology continues to evolve, the potential for new and exciting innovations in music is boundless, promising a future where the synergy of art and technology will continue to inspire and amaze.

About the Author:

Jeremy Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and senior management tech risk consultant. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. He holds an MBA from St. Mary’s University of MN, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire. He is an alum of the Federal Reserve Secure Payment Task Force, the Crystal, Robbinsdale and New Hope Citizens Police Academy, and the Minneapolis FBI Citizens Academy.

AT&T Faces Massive Data Breach Impacting 73 Million and Negligence Lawsuits

Fig 1. AT&T Data Breach Infographic, WLBT3, 2024.

After weeks of denials, AT&T Inc. (NYSE:T), a leading player in the telecommunications sector, has recently unveiled a substantial data breach originating from 2021, leading to the compromise of sensitive information belonging to 73 million users [1]. This data breach has since surfaced on the dark web, exposing a trove of personal data including Social Security numbers, email addresses, phone numbers, and dates of birth, impacting both current and past account holders. The compromised information encompasses names, addresses, phone numbers, and for numerous individuals, highly sensitive data such as Social Security numbers, dates of birth, and AT&T passcodes.

How can you determine if you were impacted by the AT&T data breach? Firstly, ask yourself if you ever were a customer, and do not rely solely on AT&T to notify you. By utilizing services like Have I Been Pwned, you can ascertain if your data has been compromised. Additionally, Google’s Password Checkup tool can notify you if your account details are exposed, especially if you store password information in a Google account. For enhanced security, the premium edition of Bitwarden, a top-rated recommended password manager, offers the capability to scan for compromised passwords across the internet.

One prevalent issue concerning data breaches is the tendency for individuals to overlook safeguarding their data until it’s too late. It’s a common scenario – we often don’t anticipate our personal information falling into the hands of hackers who then sell it to malicious entities online. Regrettably, given the frequency and magnitude of cyber-attacks, the likelihood of your data being exposed has shifted from an “if” to a “when” scenario.

Given this reality, it’s imperative to adopt measures to safeguard your identity and data online, including [2]:

  1. Implementing multi-factor authentication – a crucial step in thwarting hackers’ attempts to infiltrate your accounts, even if your email address is publicly available.
  2. Avoiding password reuse and promptly changing passwords if they are compromised in a data breach – this practice ensures that even if your login credentials are exposed, hackers cannot infiltrate other accounts you utilize, including the one that has experienced a breach.
  3. Investing in identity protection services, either as standalone solutions or as part of comprehensive internet security suites – identity protection software can actively monitor the web for data breaches involving you, enabling you to take proactive measures to safeguard your identity.

AT&T defines a customer’s passcode as a numeric Personal Identification Number (PIN), typically consisting of four digits. Distinguishing it from a password, a passcode is necessary for finalizing an AT&T installation, conducting personal account activities over the phone, or reaching out to technical support, according to AT&T.

How to reset your AT&T passcode:

AT&T has taken steps to reset passcodes for active accounts affected by the data breach. However, as a precautionary measure, AT&T advises users who haven’t altered their passcodes within the last year to do so. Below are the steps to change your AT&T passcode:

  1. Navigate to your myAT&T Profile.
  2. Sign in when prompted. (If additional security measures are in place and sign-in isn’t possible, AT&T suggests opting for “Get a new passcode.”)
  3. Locate “My linked accounts” and select “Edit” for the passcode you wish to update.
  4. Follow the provided prompts to complete the process.

Here is AT&T’s official statement on the matter from 03/03/24 [3]:

“Based on our preliminary analysis, the data set appears to be from 2019 or earlier, impacting approximately 7.6 million current AT&T account holders and approximately 65.4 million former account holders. Currently, AT&T does not have evidence of unauthorized access to its systems resulting in exfiltration of the data set. The company is communicating proactively with those impacted and will be offering credit monitoring at our expense where applicable. We encourage current and former customers with questions to visit http://www.att.com/accountsafety for more information.”

The hackers behind this, allegedly ShiningHacker, endeavored to profit from the pilfered data by listing it for sale on the RaidForums data theft forum, initiating the bidding at $200,000 and entertaining additional offers in increments of $30,000 [4]. Moreover, they demonstrated readiness to promptly sell the data for $1 million, highlighting the gravity and boldness of the cyber offense.

Not surprisingly, AT&T is currently confronting numerous class-action lawsuits subsequent to the company’s acknowledgment of this data breach, which compromised the sensitive information of 73 million existing and former customers [5]. Among the ten lawsuits filed, one is being handled by Morgan & Morgan, representing plaintiff Patricia Dean and individuals in similar circumstances.

The lawsuit levels allegations of negligence, breach of implied contract, and unjust enrichment against AT&T, contending that the company’s deficient security measures and failure to promptly provide adequate notification about the data breach exposed customers to significant risks, including identity theft and various forms of fraud. It seeks compensatory damages, restitution, injunctive relief, enhancements to AT&T’s data security protocols, future audits, credit monitoring services funded by the company, and a trial by jury [6].


About the Author:

Jeremy Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and senior management tech risk consultant. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. He holds an MBA from St. Mary’s University of MN, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire. He is an alum of the Federal Reserve Secure Payment Task Force, the Crystal, Robbinsdale and New Hope Citizens Police Academy, and the Minneapolis FBI Citizens Academy.

References:


[1] AT&T. “AT&T Addresses Recent Data Set Released on the Dark Web.” 03/30/24: https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html

[2] Colby, Clifford, Combs, Mary-Elisabeth; “Data From 73 Million AT&T Accounts Stolen: How You Can Protect Yourself.” CNET. 04/02/24: https://www.cnet.com/tech/mobile/data-from-73-million-at-t-accounts-stolen-how-you-can-protect-yourself/

[3] AT&T. “AT&T Addresses Recent Data Set Released on the Dark Web.” 03/30/24: https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html

[4] Naysmith, Caleb. “73 Million AT&T Users’ Data Leaked As Hacker Said, ‘I Don’t Care If They Don’t Admit. I’m Just Selling’ Auctioned At Starting Price Of $200K”. https://finance.yahoo.com/news/73-million-t-users-data-173015617.html

[5] Kan, Michael. “AT&T Faces Class-Action Lawsuit Over Leak of Data on 73M Customers.” PC Mag. 04/02/24: https://www.pcmag.com/news/att-faces-class-action-lawsuit-over-leak-of-data-on-73m-customers

[6] Kan, Michael. “AT&T Faces Class-Action Lawsuit Over Leak of Data on 73M Customers.” PC Mag. 04/02/24: https://www.pcmag.com/news/att-faces-class-action-lawsuit-over-leak-of-data-on-73m-customers