Ashley Madison Already Caved to Hackers’ Demands

"We apologize for this unprovoked and criminal intrusion into our customers’ information"

Ashley Madison, a dating site that enables spouses to surreptitiously arrange extramarital affairs, suspended fees for users who want to delete their accounts, after hackers threatened to publicly expose millions of users on Monday.

The company insisted that the delete option, which normally carries a $19 fee, would fully wipe clean the user’s personal data.

“The process involves a hard-delete of a requesting user’s profile, including the removal of posted pictures and all messages sent to other system users’ email boxes,” the website said in an official statement.

A hacker ring identified as the Impact Team warned on Monday that it would begin leaking “credit card transactions, real names and addresses, and employee documents and emails” in order to expose “cheating dirtbags.”

Ashley Madison offered a second apology to users in a public statement released on its website on Tuesday.

“We apologize for this unprovoked and criminal intrusion into our customers’ information,” the statement read. “We have always had the confidentiality of our customers’ information foremost in our minds, and have had stringent security measures in place, including working with leading IT vendors from around the world.”

TIME Security

Hackers Threaten to Expose Millions of Ashley Madison’s ‘Cheating Dirtbags’

Attackers breached adult affair website Ashley Madison

Hackers of unknown origin have begun leaking large chunks of user data from the website of Ashley Madison — a social-networking site promising “discreet encounters” for married people and which operates under the rubric “Life is short. Have an affair.”

KrebsOnSecurity — the Internet security blog run by former Washington Post cybercrime reporter Brian Krebs — says the hackers, calling themselves the Impact Team, are demanding that Avid Life Media (ALM), a Canadian company that owns Ashley Madison as well as Established Men (which promises to set successful men up with “young, beautiful women”) to take the two sites down permanently.

If ALM doesn’t comply, the hackers say they will continue releasing “all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails,” Krebs reports.

Ashley Madison gives users the option to delete their user data for the price of $19, but the hackers claim the feature is flawed and doesn’t actually successfully wipe customers’ information.

They also say Ashley Madison’s customers are “cheating dirtbags” who do not deserve discretion, Krebs writes. “With over 37 million members, mostly from the U.S. and Canada, a significant percentage of the population is about to have a very bad day, including many rich and powerful people,” the hackers reportedly stated.

ALM says it is trying to contain the huge leak and has condemned the hackers’ actions. “We’re not denying this happened,” ALM CEO Noel Biderman told Krebs. “Like us or not, this is still a criminal act.”


Read next: A Creepy Amount of Tinder Users Aren’t Even Single

Download TIME’s mobile app for iOS to have your world explained wherever you go

TIME stocks

NYSE Explains Why It Went Down Wednesday

NEW YORK, NY - JULY 08:  Traders work on the floor of the New York Stock Exchange (NYSE) at the close of the day after trading was resumed an over three hour closure of the market due to a "technical glitch" on July 8, 2015 in New York City. Trading was to resume in the afternoon.  (Photo by Spencer Platt/Getty Images)
Spencer Platt—2015 Getty Images Traders work on the floor of the New York Stock Exchange (NYSE) at the close of the day after trading was resumed an over three hour closure of the market due to a "technical glitch" on July 8, 2015 in New York City.

It all comes down to a botched software update

The New York Stock Exchange crashed Wednesday at 11:32 a.m. ET and remained down for exactly 3 hours and 38 minutes. It caught many traders off guard and raised concerns of what was happening behind the scenes that might have caused the “technical glitch,” the company said it encountered.

The NYSE now has a detailed explanation and it all comes down to the rollout of a new software release. (The one that was referenced in Fortune‘s interview with trading systems expert Scott Hunsader yesterday.)

The exchange was prepping for a July 11 industry test that’s on the horizon, which will test the platform’s SIP timestamp requirement. The software update was rolled out to one trading unit–the standard practice. But, as investors started logging on Wednesday morning, a series of communications issues popped up between customer gateways (what investors use to connect to the NYSE) and the trading unit using the new software.

It turns out that those gateways were not loaded with the proper information needed to work in tandem with the release, so the NYSE updated the gateways with the correct version of software and opened for trading as usual at 9:30 a.m.

However, the update didn’t go as planned and the communication issues proliferated, causing the exchange to send out a message that a technical issue was being investigated at 11:09 a.m. ET before suspending all trading at 11:32 a.m. ET.

The NYSE then went about canceling all open orders as well as working with customers to reconcile orders and trades, all while restarting all customer gateways and implementing a complete system restart after consulting with regulators and industry peers. After that, the NYSE got everything back up and running by 3:10 p.m. ET.

TIME Social Media

How Facebook Knows What You Look Like

Manjunath Kiran—AFP/Getty Images The 'Facebook' logo is reflected in a young Indian woman's sunglasses as she browses on a tablet in Bangalore on May 15, 2012.

The social network is good at both names and faces — until you tell it to stop

That woman from that laundry detergent commercial, you’ve seen her before in the yogurt ad. And the clerk at the convenience store you hit up this morning, that’s right — he was the guy hitting on you at the bar last week.

Making split-second connections like these is something your brain does well. In fact, according to 2008 research out of the University of California San Diego, it only takes two quick fixations before we recognize the person we’re gazing at.

But when it comes to facial recognition, computers have to put in a lot more work to get the answer right. “Recognizing people’s faces is really easy for people to do just instinctively, but it’s actually really hard for a computer,” says Rob Sherman, Facebook’s deputy chief privacy officer. Facebook uses facial recognition technology to drive its “Tag Suggestions” feature, which helps the website ID you when a picture of you gets uploaded to the social network. And while the feature may seem to work at the blink of an eye, there’s a lot more going on behind the scenes.

First, Facebook’s computers analyze your profile photo and any other picture in which you’ve been manually tagged to find similarities between the images. In general, they’re looking at the dimensions of your face, including its shape, the distance between your eyes, and how far away your facial features are from one another. The site may also scan for the color of your hair.

“Essentially what we’re looking for is the unique characteristics of this particular person,” says Sherman.

Next, once you upload a photo to Facebook, the system figures out if there’s a face in the photo. If there are no faces, then it doesn’t make sense for Facebook to run facial recognition technology. But it’s also important to note that Tag Suggestions doesn’t get deployed for just any image of people uploaded to the social network. Instead, it’s only offered when the uploader and the photo’s subject(s) are already friends — doppelgängers on the other side of the world remain a mystery.

If faces are detected in your picture, Tag Suggestions whirs to life, analyzing the new image and looking specifically for your distinct characteristics, or those of your friends. “The goal is to figure out what are the things that differentiate one person’s face from another person’s face,” says Sherman. And if the feature does detect you or your friends, Facebook highlights the face and suggests to tag the image appropriately.

According to Sherman, Facebook’s technology was designed to streamline the photo tagging experience. The idea is that if you’re already friends with someone on Facebook, then you know what they look like (and they know what you look like, too). Tag Suggestions and facial recognition just makes it quicker and easier to tag them in a picture.

But not everyone sees this technology as a matter of convenience — some see it as an invasion of privacy. For instance, in Europe, concerns over facial recognition technology has delayed the rollout of Moments, Facebook’s new photo-sharing app. Moments uses the same facial recognition technology that powers Tag Suggestions, but it’s designed to help Facebook users share photos with each other. For instance, say you’re on vacation with your friends and you all take photos with your smartphones. Moments uses facial recognition to automatically share the group members’ photos with one another. That eliminates the hassle of emailing or texting images to one another after an event is over.

If all this talk of facial scanning and recognition has you hiding from camera lenses, there’s an easier way to opt out. “If people don’t want it, obviously we want to make it easy for them to turn it off,” says Sherman. To disable Tag Suggestions on your account, log into the social network and go to the Timeline and Tagging section of your settings, where you’ll see the last question: “Who sees Tag Suggestions when photos that look like you are uploaded?” Click on the “Edit” link to the right, and change the dropdown menu from “Friends” to “No One.” Once you do that, not only will the feature be disabled, but the social network will remove your record from Facebook’s database of similarities. This will also prevent your profile from being suggested to friends when they upload images to the site.

But still, Sherman says, Facebook’s records only work on its website. “Even though we are deleting it, it’s not really useful in any other system, and that’s one of the important points,” he says in the feature’s defense. And besides, being tagged in an image isn’t necessarily a bad thing.

“Tagging is a really important way to communicate on Facebook and interact with one another,” says Sherman. When you’re tagged in photos, you know those photos exist, and you can be alerted to conversations happening about them. Otherwise, people could be talking about you behind your back — or, more accurately, behind your face.

TIME Security

This Website May Have Just Solved Passwords Forever

Now you can sign into Medium with your e-mail

Blogging site Medium has launched a password-free login system that uses only e-mail.

The e-mail login option provides an alternative to Medium’s previous login routes, which included only Facebook and Twitter, according to the site’s announcement. The change arrived after many users said they either did not have social media accounts or preferred not to use them. Other users lived in regions where Facebook and Twitter are blocked.

According to Medium, the feature works similarly to the familiar “forgot password” function. Users simply enter their e-mail addresses on the site, which sends them an e-mail with a link to login within 15 minutes.

Still, the e-mail login feature can’t detect whether a user’s e-mail has been compromised, so if someone has access to the e-mail account, they’ll be able to login.

TIME Instagram

Instagram Users in North Korea Report App Blocked

Pictures appear on the smartphone photo
Thomas Coex—AFP/Getty Images Pictures appear on the smartphone photo sharing application Instagram on April 10, 2012 in Paris.

Instagram users in North Korea have received a "blacklist" warning

Looks like North Korea has blacklisted photo-sharing social network Instagram and is denying access to it from devices in the country.

When users open the app from mobile phones on the North Korean carrier Koryolink, a warning in both English and Korean appears, The Associated Press reported on Monday. “Warning! You can’t connect to this website because it’s in blacklist site [sic],” says the English version. The Korean warning also says that the site contains harmful content.

Similar warnings also appear when accessing Instagram on computers using LAN cables on the North Korean Internet provider. Instagram still worked on some mobile phones, but not all.

The origin of the warning is still unclear. Koryolink customer support employees told The Associated Press that they weren’t aware of any policy changes regarding Instagram and there has been no notice from the government regarding the service. The block could be related to a June 11 fire at a Pyongyang hotel, often used by tourists and foreign visitors, that North Korea’s state-run media has yet to officially report on, despite photos of it leaking on the Internet.

While North Korea is still not allowing its citizens to access the Internet, with a few exceptions, it did decide in 2013 to allow foreign visitors to access 3G Internet through their mobile phones, which requires a local SIM card from Koryolink.

Other social media sites such as Facebook and Twitter are still working fine.

TIME Cyberwar

These 5 Facts Explain the Threat of Cyber Warfare

The disastrous hack of the federal government's Office of Personnel Management is the tip of the iceberg

America has spent decades and trillions of dollars building up the greatest military force the world has ever seen. But the biggest threat to national security these days comes from not from aircraft carriers or infantry divisions, but a computer with a simple Internet connection. That much became clear after the catastrophic hack—most likely by a foreign power—of sensitive federal employee data stored online. These 5 stats explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

1. Government Threats

The massive breach of the Office of Personnel Management a couple weeks ago made headlines, but Washington has been fending off cyber-attacks for years now. The federal government suffered a staggering 61,000 cyber-security breaches last year alone. This most recent wave of hacks exposed the records of up to 14 million current and former US government employees, some dating back to 1985. Compromised information includes Social Security numbers, job assignments and performance evaluations. This is dangerous information in the hands of the wrong people, which by definition these hackers are. There is a good reason why the U.S. Director of National Intelligence ranks cyber crime as the No. 1 national security threat, ahead of terrorism, espionage and weapons of mass destruction.

(CNN, Guardian, Reuters, Washington Post, PwC)

2. Business Threats

Hackers aren’t only in the game to damage governments—sometimes good old-fashioned robbery is enough. The FBI had to notify over 3,000 U.S. companies that they were victims of cyber security breaches in 2013. Victims ranged from small banks to major defense contractors to mega retailers. An astounding 7 percent of U.S. organizations lost $1 million or more due to cyber crime in 2013; 19 percent of U.S. entities have claimed losses between $50,000 and $1 million over the same span. Hacking costs the U.S. some $300 billion per year according to some estimates. Worldwide that figure is closer to $445 billion, or a full 1 percent of global income. The research firm Gartner projects that the world will spend $79.9 billion on information security in 2015, with the figure rising to $101 billion in 2018—and that still won’t be enough.

(PwC, The Wire, Washington Post, Wall Street Journal)

3. Social Media Threats

With the rise of social media also comes the rise in social media cyber crime. Social media spam increased 650 percent in 2014 compared to 2013. Nearly 30 percent of U.S. adults say one of their social media accounts has been hacked. That number is only set to grow: an estimated 10 to 15 percent of home computers globally are already infected with botnet crime-ware, and over 30,000 new websites are corrupted daily with compromising code. In a day and age where your online presence increasingly defines you to the rest of the world, hackers with access to your accounts can cause untold damage to both your personal and professional life. Back in 2011, Facebook admitted that it was the target of 600,000 cyber-attacks every day. Not wanting to scare off potential users, it hasn’t released official figures since.

(Guardian, Wall Street Journal, Cyber Shadows, Telegraph)

4. Russia

Speaking of social media, cyber threats don’t only come in the form of traditional hacking. Moscow has set up a sophisticated “troll army” under the umbrella of its Internet Research Agency to wage a massive disinformation campaign in support for its invasion of Ukraine, and of the Kremlin in general. These trolls work hard, each one pumping out 135 comments per 12-hour shift. Furthermore, each troll is reportedly required to post 50 news article a day while maintaining at least six Facebook and ten Twitter accounts. That’s a whole lot of misinformation. Despite economic hardship caused by sanctions, Moscow believes in this mission enough to employ a full-time staff of 400 with a monthly budget of $400,000.

(New York Times, Radio Free Europe Radio Liberty, Forbes, New York Times)

5. China

But the single biggest threat to the U.S. remains China. A full 70 percent of America’s corporate intellectual property theft is believed to originate from China. That doesn’t just mean random hackers who operate within China’s borders; we’re talking about elite cyber groups housed by the government in Beijing. China decided long ago that it couldn’t compete with the U.S. in direct military strength. The US already outspends China more than 4-to-1 in that regard, making catch-up near impossible. Beijing has instead decided to focus instead on commercial and government espionage. While exact figures are hard to come by, in May 2013 two former Pentagon officials admitted that “Chinese computer spies raided the databanks of almost every major U.S. defense contractor and made off with some of the country’s most closely guarded technological secrets.” That would be really impressive if it wasn’t so terrifying.

(The Wire, International Institute for Strategic Studies, Bloomberg)

TIME Security

There’s a Massive Security Flaw in the iPhone and Mac

Verizon Store Stocks Shelves With New Apple iPhone 6
George Frey—Getty Images Apple's iPhone 6 (R) and iPhone 6 Plus (L) phones are shown together at a Verizon store in Orem, Utah on September 18, 2014 in Orem, Utah.

Malicious app that can steal passwords was approved for the App Store

Apple devices are often thought to be more secure than open platforms such as Windows and Android, but a recent study shows there are still significant malware threats for iPhone and Mac owners.

Researchers from Indiana University, Peking University and Georgia Tech have published a study highlighting security issues with the way apps communicate with each other on iOS and OS X. The researchers created an app that was able to steal users’ data from the password-storing keychain in OS X, as well as pilfer passwords from banking and email accounts via Google Chrome.

The researchers’ app was able to bypass the security measures Apple has in place to ensure one app can’t gain access to other apps’ data without permission. Methods used include hijacking a browser extension so hackers can collect passwords when users type them in and deleting passwords from the OS X keychain so they can be retrieved when the data is re-entered.

The biggest issue regarding the malicious app is that it was approved for placement in the App Store, which is supposed to be pre-screened by Apple staff for potentially malicious apps. Apple did not immediately respond to a request for comment.

The researchers said they informed Apple about the vulnerability in October but were asked to hold off on making the information public for six months. However, according to their study, the problems still persist. A system-wide update to OS X and iOS is the only way to fully protect against the vulnerabilities, according to the study’s authors.

TIME Security

This Tiny Box Is Your Home’s Defense Against Hackers

Bitdefender BOX
Bitdefender Bitdefender BOX

Meet the Bitdefender BOX

In Batman Begins, there’s a scene where the Dark Knight’s nemesis Scarecrow pours psychoactive drugs into the water supply in order to poison the people of Gotham City. Never in my life have I imagined that I’d ever use a Christian Bale movie as a metaphor for the Internet, but I can’t deny the reality that I’ve recently witnessed firsthand. Never mind super-villains — the web is crawling with real criminals continually pouring nastiness into our system of tubes, and as a result, we’re gulping down data from some seriously tainted pipes.

Recent research from Distil Networks has shown that 60% of the Internet’s traffic consists of bots, not people. Nearly a quarter of those bots are up to some pretty nasty stuff, like stealing passwords and credit card numbers. It’s an epidemic that’s only getting worse the more we rely on cloud computing. According to the report, the biggest culprits behind this — besides the hackers who unleash these bots on the web — are services like Amazon’s cloud services (where many bad bots make their home) and data networks like T-Mobile (which doesn’t do a great job of monitoring its traffic).

But perhaps the biggest the problem with these bad bots is that most web users never see them. They open their tap, fill their drinking glasses with dirty data, swallow it down, feel refreshed and think all is well. But using Bitdefender BOX, I was able to put my stream of data under a digital microscope. Within minutes, I couldn’t believe the viruses, malware, and other nastiness that had been flowing my way all along undetected.

Smaller than a hockey puck, Bitdefender BOX is an ethernet-connected security device that plugs in between your high-speed modem and your wireless router (it can also be used as a router itself) that will alert you to every attempted intrusion or bad piece of code that comes in from the Internet. Basically, it’s an intrusion detection system.

“Every major company, every major corporation, has a big giant box like this sitting in their network,” says Rami Essaid, CEO of Distil Networks. “It’s analyzing every packet going in, every packet going out.”

The $199 hub is designed to protect all the devices on a home’s network, whether or not they’re loaded with virus-scanning software. It comes with one free year of service, which runs $99 per year afterwards. For that price, BOX customers get continual background upgrades that protect them from the latest and scariest bugs going. The best part is that users don’t have to update virus profiles or run memory-hogging background software on their PCs. It’s a set-it-and-forget-it solution that aims to block everything from fraud to phishing.

I installed BOX on my home network on a Friday evening. Frankly, I put it off as long as possible because my home has a moderately complex Wi-Fi setup, and I didn’t want to spend a work day unraveling a knot of networking problems. I use two Apple Airport Extremes to stretch both 2.4 GHz and 5 GHz networks across my property. I also have the wireless routers run guest networks, which I have configured only my smart home devices to connect to. The only thing I had to do to make BOX work properly for my setup was toggle my primary Airport Extreme into Bridge Mode. Upon doing that, BOX was able to do its thing, and all my devices, from iPhones to lightbulbs, to computers, functioned perfectly, as if BOX wasn’t even there. (Well, sort of. It turned out that BOX didn’t support my guest networks, so all my smart home gear had to be reconnected to my main network. But I suspect this is a problem few other users would encounter, so I wouldn’t slight Bitdefender for it.)

It took Bitdefender nearly 12 hours to recognize my nearly 30 connected devices, but while it was adding and analyzing them, everything worked fine. In fact, as my wife sat poking on her iPad next to me, my iPhone started to light up with notifications like “Dangerous website blocked,” and “A malware attempt was detected.”

These alerts immediately prompted her to wonder if I could monitor what she was browsing online. Generally, I could not, but if an alert popped on the accompanying BOX iOS app, I could see where the dangerous file originated from. But keep in mind, I told her, on the web, vile files flow in from every direction, not just the pages you surf to.

If I have a complaint about Bitdefender BOX, its iPhone app might be it. Though it’s good and generally responsive, it still needs some work. For instance, you have to rekey your password every day. It’s 2015, people — time to use Touch ID, throw in some 1Password/LastKey integration, and make your app as secure as it should be. Also, once inside the app, new alerts don’t get pushed over into the history after they’re viewed, so unless you’re keeping track, you have no idea how many bugs have floated your way since the last time you’ve opened the app.

But if there was one thing that surprised me about BitDefender BOX, it’s the device’s “Private Line” feature. Essentially a Virtual Private Network (VPN) for dummies, Private Line lets users set up a tunnel between your mobile devices and BOX with the flip of a switch. In other words, when I’m out on the town using my AT&T mobile data, my web surfing will go from my handset to my home network, through the Bitdefender BOX to ensure I’m protected, and into the web. While using my iPhone 6 in this mode, I didn’t notice any lag, though there was one huge hiccup: I couldn’t send SMS messages (I could send iMessages). A representative from Bitdefender said she thought the problem might stem from AT&T not allowing messaging connections from servers other than its own. Whatever the root cause, I hope it gets resolved, because it was a Private Line deal-killer for me.

After the first week of running BOX, as its new gadget shine wore off and malware notifications piled up, complacency nearly became another deal-killer. BOX was great, but I wondered if it was doing anything more than my browser already could — after all, properly configured, they can block threats very well. Despite having more than a dozen smart home products on my network, not one of them got a nibble from a hacker.

“There are a lot of people that use bots to see what’s out there,” says Essaid, specifically calling out Dropcams and baby monitors — both of which I run 24-7. “What you’re going to start seeing is a lot of people probing you because you are connected to the web.”

And that’s what Bitdefender is banking on. The big idea behind BOX is that it can stand guard between the bad guys and your smart home gear, most of which is defenseless. In fact, according to a study by ThroughTek, cybersecurity is the number one concern for buyers of smart home products, with 25% of people concerned about their personal data getting out. Until I had this device, I had no idea if someone was trying to digitally break into my home. I just hoped that they weren’t. But the more attacks I see bouncing off my phones, tablets, and computers, the more I’m convinced Bitdefender has the chops to keep all my Internet-connected gear safe. So in that way, Bitdefender may just be the hero the Internet of Things deserves, just not the one it needs right now.

TIME Security

What RadioShack’s Bankruptcy Means for Your Credit Card Data

RadioShack Announces Its Closing Over 1,000 Stores
Justin Sullivan—Getty Images People walk by a Radio Shack store on March 4, 2014 in San Francisco, California.

Your personal information is traded every day, but not like this

When RadioShack declared bankruptcy in February, it marked the potential end for one of the country’s most recognizable brands. But it was also the beginning of a process that stripped the once popular electronics chain for parts. Everything from the company’s name to its batteries was offered for sale along the way — including its trove of customer data. And as disappointed as techies were to see their favorite place for wires and cables shuttered, they were aghast to learn their phone number, address, and even credit card numbers could be sold to the highest bidder. While companies share customer data with each other all the time, it rarely happens like this.

Pretty much every organization — including non-profits, universities, and corporations — has customer data, and it’s among their most valuable assets. Letting others use this information is like handing over your smartphone to someone else. If they’re borrowing it to make a call, you’re better off dialing the number for them and passing the handset along, or else they may paw through all your apps and contacts without your permission. Likewise, the use of others’ customer data is similarly guarded. Companies rent out their lists all the time, though under strict terms and conditions.

Shoppers’ data is big business in the U.S. According to the Direct Marketing Association, sharing customer data added $156 billion in revenue to the U.S. economy in 2012, the most recent year the industry was studied. That’s bigger than the dairy industry. And speaking of putting food on the table, customer data sharing also fueled about 675,000 jobs that year, too. And as we’ve become an increasingly data-driven economy, those numbers are certain to grow.

“Any time there is a customer transaction,” says Senny Boone, the DMA’s senior vice president of corporate and social responsibility, “you’re picking up financial information, things like the date and amount of the purchase, that might help a business to stock its warehouse . . . it is vitally important customer data to a particular company that’s holding that data.”

As a result, companies don’t typically hand over their lists willy-nilly. Instead, they rent them out through a third-party company, and usually saddle the data with a lot of restrictions, like one-time-only use. These third-parties include companies like Experian, which is known to most people as a credit-rating service, and Acxiom, which works with data from companies ranging from United Airlines to Macy’s. Typically, these companies stay within the bounds of safe, smart, and considerate data usage, and watchdog agencies like the Federal Trade Commission watch over them to make sure they do.

On the consumer side, the DMA encourages companies (especially its members) to be accessible for fielding complaints and work with people to make sure their data concerns are met. Consumers should be able to communicate with companies two ways, says Boone. One is through DMAChoice, a service that helps consumers manage the ways companies can send them marketing information. Another way is by contacting companies either through email, postal mail, or over the phone, whatever is in the business’s privacy policy — which should be clearly posted on their website.

In the case of RadioShack, the company’s brand and data was eventually bought by hedge fund Standard General, which is partnering with Sprint to keep some locations open as combination RadioShack/Sprint stores. Still, because Standard General didn’t craft the company’s original privacy statement, it caused concern on many fronts, not just with consumers but also with companies like Apple and AT&T, whose phones and services were sold at the store.

“If you are selling an asset, whoever is purchasing that asset will have full control as the owner,” says Boone. In RadioShack’s case, those assets included Social Security numbers, dates of birth, phone numbers and other details for some 117 million customers. Alarm over the future of that personally identifiable information caused the FTC and 40 states’ attorneys general to act to stop the sale. Thankfully for RadioShack customers, the bankruptcy judge involved in the case severely limited the amount and kinds of shoppers’ data Standard General could buy in the deal — it would get no credit card data, Social Security numbers or dates of birth; Standard also promised to abide by RadioShack’s original privacy policy when dealing with the remaining information.

So the next time you get a telemarketing phone call or a catalog from a company you’ve never done business with before, keep in mind that your name probably came from a company you have done business with previously. But don’t blame RadioShack — its not only out of business, but with its list in tatters, it’s now also out of commission.

Your browser is out of date. Please update your browser at http://update.microsoft.com