{"id":100282,"date":"2024-04-18T10:59:18","date_gmt":"2024-04-18T17:59:18","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100282"},"modified":"2024-04-22T09:11:35","modified_gmt":"2024-04-22T16:11:35","slug":"roku-leaks-576000-accounts-its-second-data-breach-of-2024","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/","title":{"rendered":"Roku leaks 576,000 accounts\u2014its second data breach of 2024"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100285\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>Streaming giant Roku announced that it has suffered its second data breach so far this year.<\/p>\n<p>In the first data breach, which Roku <a href=\"https:\/\/oag.ca.gov\/system\/files\/Template%20Notification%203-8-2024.pdf\" target=\"_blank\" rel=\"noopener\">acknowledged<\/a>\u00a0on March 8, attackers compromised more than 15,000 user accounts. The company stated that the breach was the result of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">credential stuffing<\/a> attack, also known as a password reuse attack. In other words, hackers tried username-and-password combinations that had leaked in past data breaches.<\/p>\n<p>Roku <a href=\"https:\/\/www.roku.com\/blog\/protecting-your-roku-account\">stated<\/a> on April 12 that hackers had accessed roughly 576,000 additional accounts in a second incident. The company claims to have determined this by closely monitoring account activity.<\/p>\n<p>Between the two incidents, there were fewer than 400 cases where &#8220;malicious actors\u2026 made unauthorized purchases of streaming service subscriptions and Roku hardware products using the payment method stored in these accounts.&#8221;\u00a0 Roku claims that the attackers &#8220;did not gain access to any sensitive information, including full credit card numbers or other full payment information.&#8221; The company said that it has refunded or reversed all fraudulent charges.<\/p>\n<h3>What Roku did\u2014and didn&#8217;t do\u2014right<\/h3>\n<h4><strong>The bad<\/strong><\/h4>\n<p>It&#8217;s unclear why Roku&#8217;s supposedly &#8220;close&#8221; monitoring did not enable the company to stop the second attack much sooner. Additionally, it&#8217;s unfortunate that Roku evidently didn&#8217;t significantly reduce the feasibility of credential stuffing attacks after the first incident.<\/p>\n<p>Instead, the company blamed its users for their bad password hygiene. Roku claimed that &#8220;it is likely that login credentials used in these attacks were taken from another source, like another online account, where the affected users may have used the same credentials.&#8221;<\/p>\n<h4><strong>The good<\/strong><\/h4>\n<p>On the bright side, Roku said after the second incident that it had proactively enabled <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">two-factor authentication (2FA)<\/a> for all of its 80 million user accounts.<\/p>\n<p>The next time users attempt to log in, they&#8217;ll get a verification link via e-mail. We&#8217;ll walk you through this process below.<\/p>\n<h3>How to set up two-factor authentication for your Roku account<\/h3>\n<p>In addition to using a separate, unique password for each of your online accounts, you should also use two-factor authentication (2FA; also called MFA for multi-factor authentication, or 2SV for two-step verification).<\/p>\n<p>Most services make 2FA optional, but Roku now requires it. You should ideally <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">enable 2FA for all of your accounts<\/a> to add an additional layer of protection in case your password is ever exposed in a data dump.<\/p>\n<p>Now whenever you try to sign into your Roku account, you&#8217;ll see a &#8220;Verify it&#8217;s you to finish signing in&#8221; screen. This screen shows you your registered e-mail address, to which a verification link is sent.<\/p>\n<p>Next, check your e-mail and look for a brand new message from noreply@roku.com with the subject, &#8220;Roku | Signing in?&#8221; The e-mail will look similar to the following:<\/p>\n<div id=\"attachment_100291\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100291\" loading=\"lazy\" class=\"size-full wp-image-100291\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-signing-in-verification-email.jpg\" alt=\"\" width=\"300\" height=\"496\" \/><p id=\"caption-attachment-100291\" class=\"wp-caption-text\">Roku&#8217;s &#8220;Signing in?&#8221; verification e-mail as of April 2024. Note that your first name will appear after &#8220;Hi&#8221; on the first line.<\/p><\/div>\n<p>Note that you should only receive such an e-mail\u2014and should only click or tap on the &#8220;Yes, sign me in&#8221; link\u2014if you&#8217;re actively attempting to log in at that time. (Otherwise, it may be a phishing e-mail, or someone else may be trying to break into your account.)<\/p>\n<p>The &#8220;Yes, sign me in&#8221; link begins with <code>https:\/\/click.web.roku.com\/<\/code>. After clicking or tapping on the link, you&#8217;ll be redirected to a page hosted at <code>https:\/\/my.roku.com\/<\/code>.<\/p>\n<p>If the site asks you to change your password, verify that the domain in the address bar ends in &#8220;.roku.com&#8221; first. Otherwise, the page will automatically redirect to <code>https:\/\/my.roku.com\/dashboard<\/code>.<\/p>\n<h4><strong>Convenience is the enemy of security<\/strong><\/h4>\n<p>Roku considers the ability to access your e-mail to be the &#8220;something you have&#8221; second-factor option. So unlike most sites, Roku doesn&#8217;t require you to configure an authenticator app or get a text message as your second factor.<\/p>\n<p>This may seem convenient\u2014but you&#8217;ll need to ensure you aren&#8217;t reusing the same password for both your e-mail account and your Roku account; if you are (and if you aren&#8217;t using 2FA for your e-mail account), then an attacker just needs to take an additional step to break into both accounts. As we&#8217;ve mentioned before, it&#8217;s crucial to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">never reuse any passwords<\/a> and to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">always use 2FA<\/a>.<\/p>\n<h3>How can I avoid falling victim to credential stuffing attacks?<\/h3>\n<p>Regardless of whether or not you have a Roku account, there are two important takeaways:<\/p>\n<ol>\n<li><strong>Use unique passwords for each and every site.<\/strong> Never reuse a password.<\/li>\n<li><strong>Use two-factor authentication wherever possible.<\/strong> Enable 2FA for every site that offers it.<\/li>\n<\/ol>\n<p>These key points will help you avoid becoming a victim of future credential stuffing attacks. Be sure to check out the additional links below for more details.<a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>We discussed the Roku data breaches on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-can-take-over-your-phone-by-sim-swapping-intego-mac-podcast-episode-340\/\">episode 340<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+6Pb8JAxA?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>We&#8217;ve previously covered: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">what 2FA is<\/a>; why to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-sms-how-it-works-why-its-insecure-and-why-we-still-need-it\/\">avoid using SMS text messages for 2FA<\/a> to prevent <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-protect-yourself-from-sim-swapping-attacks\/\">SIM swapping attacks<\/a>; and how to use <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authorization-apps-for-ios\/\">authenticator apps<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-a-security-key-to-protect-sensitive-online-accounts\/\">physical security keys<\/a> for 2FA.<\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.<\/p>\n","protected":false},"author":14,"featured_media":100306,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[43],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Roku leaks 576,000 accounts\u2014its second data breach of 2024 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-18T17:59:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T16:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Roku logo with pink background and blue leak drip\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/\",\"name\":\"Roku leaks 576,000 accounts\\u2014its second data breach of 2024 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage\"},\"datePublished\":\"2024-04-18T17:59:18+00:00\",\"dateModified\":\"2024-04-22T16:11:35+00:00\",\"description\":\"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Roku leaks 576,000 accounts\\u2014its second data breach of 2024\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Roku leaks 576,000 accounts\\u2014its second data breach of 2024\",\"datePublished\":\"2024-04-18T17:59:18+00:00\",\"dateModified\":\"2024-04-22T16:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage\"},\"wordCount\":907,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg\",\"keywords\":[\"Data Breach\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/","og_locale":"en_US","og_type":"article","og_title":"Roku leaks 576,000 accounts\u2014its second data breach of 2024 - The Mac Security Blog","og_description":"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-04-18T17:59:18+00:00","article_modified_time":"2024-04-22T16:11:35+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg","width":400,"height":260,"caption":"Roku logo with pink background and blue leak drip"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/","name":"Roku leaks 576,000 accounts\u2014its second data breach of 2024 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage"},"datePublished":"2024-04-18T17:59:18+00:00","dateModified":"2024-04-22T16:11:35+00:00","description":"Roku has already suffered two data breaches this year, about a month apart. Learn more about what steps you can take to protect all of your online accounts from similar attacks.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Roku leaks 576,000 accounts\u2014its second data breach of 2024"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Roku leaks 576,000 accounts\u2014its second data breach of 2024","datePublished":"2024-04-18T17:59:18+00:00","dateModified":"2024-04-22T16:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#webpage"},"wordCount":907,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg","keywords":["Data Breach"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/roku-leaks-576000-accounts-its-second-data-breach-of-2024\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Roku-logo-pink-background-leak-drip-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q5s","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100282"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100282"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100282\/revisions"}],"predecessor-version":[{"id":100337,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100282\/revisions\/100337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100306"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}