Anyone mind explaining what the hacker(s) was (were) going to do with the limited information they got? I read the security filing said they got a list of which phone numbers texted/called which phone numbers and what durations, but none of the actual content.
Anyone mind explaining what the hacker(s) was (were) going to do with the limited information they got? I read the security filing said they got a list of which phone numbers texted/called which phone numbers and what durations, but none of the actual content.