Case Study: Under Armour Hack

Case Study: Under Armour Hack

Kylie Torres, Andrew Stevenson, Justin Hicks
ISBN13: 9781799834878|ISBN10: 1799834875|ISBN13 Softcover: 9781799834885|EISBN13: 9781799834892
DOI: 10.4018/978-1-7998-3487-8.ch006
Cite Chapter Cite Chapter

MLA

Torres, Kylie, et al. "Case Study: Under Armour Hack." Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, edited by Devjani Sen and Rukhsana Ahmed, IGI Global, 2021, pp. 145-162. https://doi.org/10.4018/978-1-7998-3487-8.ch006

APA

Torres, K., Stevenson, A., & Hicks, J. (2021). Case Study: Under Armour Hack. In D. Sen & R. Ahmed (Eds.), Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps (pp. 145-162). IGI Global. https://doi.org/10.4018/978-1-7998-3487-8.ch006

Chicago

Torres, Kylie, Andrew Stevenson, and Justin Hicks. "Case Study: Under Armour Hack." In Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, edited by Devjani Sen and Rukhsana Ahmed, 145-162. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3487-8.ch006

Export Reference

Mendeley
Favorite

Abstract

Under Armour purchased a fitness app, MyFitnessPal, that suffered a data breach shortly after Under Armour acquired the app. This breach made customers usernames, emails, and passwords available and for sale on the dark web. Under Armour informed its users of the breach and handled the crisis in the way they saw fit. During the investigation, it was found that Under Armour used a weaker encryption algorithm than it should have to encrypt customers' sensitive information. The company is currently in a lawsuit over the breach with one MyFitnessPal user.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.