Technology ❯ Cybersecurity ❯ Data Breaches ❯ Hacking
The count underscores a widening gap between the attacker’s boast and ADT’s description of a limited exposure.