• SatanicNotMessianic@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      8 months ago

      No, they’ve been heading south for years. I would have loved for it to be a drop in response to the data breach, but this was just a company that was run incompetently.

    • usualsuspect191@lemmy.ca
      link
      fedilink
      arrow-up
      4
      arrow-down
      2
      ·
      8 months ago

      Which data were they negligent with? I thought it was breaches on other sites that gave reused passwords.

      • tiredofsametab@kbin.social
        link
        fedilink
        arrow-up
        6
        ·
        8 months ago

        There are still all kinds of things a company can do to mitigate at least some of this. New browser, new location, forced two-factor auth, etc.

        • wreckedcarzz@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          4
          ·
          8 months ago

          Cmon, we know their target market was dumbasses. How many dumbasses do you know that use mfa, or that actually look at a login notification before hitting “yes, it’s me”?

      • Hegar@kbin.social
        link
        fedilink
        arrow-up
        6
        ·
        edit-2
        8 months ago

        Credential stuffing is a well understood part of the threat landscape that 23 and me negligently failed to account for, allowing hackers to access 7 million people’s info after hacking only 14 thousand users.