The information leaked in the breach involves personally identifiable information as well as genetic ancestry data, potential relatives, and geolocations.
Go to Source
Author: Dark Reading Staff, Dark Reading
Cyber Security Expert
Go to Source
Author: Dark Reading Staff, Dark Reading