{"id":223517,"date":"2024-04-13T09:37:51","date_gmt":"2024-04-13T09:37:51","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/04\/13\/roku-suffered-another-data-breach-this-time-affecting-576000-accounts\/"},"modified":"2025-06-25T17:18:41","modified_gmt":"2025-06-25T17:18:41","slug":"roku-suffered-another-data-breach-this-time-affecting-576000-accounts","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/04\/13\/roku-suffered-another-data-breach-this-time-affecting-576000-accounts\/","title":{"rendered":"Roku suffered another data breach, this time affecting 576,000 accounts"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p><a data-i13n=\"cpos:1;pos:1\" href=\"https:\/\/www.engadget.com\/tag\/roku\/\" data-ylk=\"slk:Roku;cpos:1;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><\/a> has <a data-i13n=\"elm:affiliate_link;sellerN:Roku;elmt:;cpos:2;pos:1\" href=\"https:\/\/shopping.yahoo.com\/rdlw?merchantId=f3574a52-3bcf-4a37-83ee-65836ac78115&amp;siteId=us-engadget&amp;pageId=1p-autolink&amp;featureId=text-link&amp;merchantName=Roku&amp;custData=eyJzb3VyY2VOYW1lIjoiV2ViLURlc2t0b3AtVmVyaXpvbiIsImxhbmRpbmdVcmwiOiJodHRwczovL3d3dy5yb2t1LmNvbS9ibG9nL3Byb3RlY3RpbmcteW91ci1yb2t1LWFjY291bnQiLCJjb250ZW50VXVpZCI6IjlhNTc4M2M3LTVhOWMtNGJhYy1iNmQyLWRhZmVjOTFmMWI3ZCJ9&amp;signature=AQAAAb4MbTPkRbd889_0BVgYn8e5mDubcgFVtBexaKBXLLPj&amp;gcReferrer=https%3A%2F%2Fwww.roku.com%2Fblog%2Fprotecting-your-roku-account\" class=\"link  rapid-with-clickid etailiffa-link\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:disclosed a second data breach;elm:affiliate_link;sellerN:Roku;elmt:;cpos:2;pos:1;itc:0;sec:content-canvas\"><\/a> in as many months. While it was looking into a previous incident in which 15,000 accounts were affected, the company learned that another 576,000 accounts had been compromised.<\/p>\n<p>In both incidents, Roku believes that the attackers used a method called credential stuffing. &#8220;It is likely that login credentials used in these attacks were taken from another source, like another online account, where the affected users may have used the same credentials,&#8221; the company says.<\/p>\n<p>Roku added that, in fewer than 400 cases, attackers used victims&#8217; Roku accounts to buy streaming subscriptions and Roku devices using stored payment methods. However, the hackers did not gain access to full credit card numbers or other payment information.<\/p>\n<p>The company has reset the passwords for all affected accounts and informed users who have been impacted. The company is also turning on two-factor authentication for its more than 80 million active accounts. The next time you log in, you&#8217;ll get a verification email. You&#8217;ll need to click a link in the email before you can access your account. Meanwhile, Roku says it&#8217;s refunding or reversing charges in the cases where the hackers bought subscriptions or hardware.<\/p>\n<p>While the impact of this latest breach doesn&#8217;t seem too disastrous, it&#8217;s a good reminder that you should have a strong, unique password for every single one of your accounts. A <a data-i13n=\"cpos:3;pos:1\" href=\"https:\/\/www.engadget.com\/best-password-manager-134639599.html\" data-ylk=\"slk:password manager;cpos:3;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \"><\/a> makes it much easier to have robust login credentials, as you&#8217;ll only need to remember one main password or log in using biometric data.<\/p>\n<p>This article contains affiliate links; if you click such a link and make a purchase, we may earn a commission.<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/roku-suffered-another-data-breach-this-time-affecting-576000-accounts-170442223.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] has in as many months. While it was looking into a previous incident in which 15,000 accounts were affected, the company learned that another<\/p>\n","protected":false},"author":1,"featured_media":223518,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[159],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/223517"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=223517"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/223517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/223518"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=223517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=223517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=223517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}