
It also owns the workout app MapMyFitness, which it bought in 2013. Under Armour already operates an online health and fitness network called Record, where people can store data from popular devices like the Fitbit and Jawbone. It “provides an opportunity to build long-term relationships with consumers, and ultimately we think we’re going to sell a lot more shirts and shoes,” Plank said.Įndomondo could help it grow its sales overseas, too, where more than three-quarters of the app’s 20 million users reside. Under Armor hopes to use the information to expand sales of its clothing, hiking shoes and other products. In today’s data-driven economy that could be some very valuable data, and it steps up the competition with rivals such as Nike, as well as a myriad of technology firms tackling digital health. That includes how much they sleep and exercise, what they put in their body and their nutrition needs, he said. A FAQ page set up by MyFitnessPal with further information can be viewed here.“It’s a piece in the puzzle toward having a total picture of the athlete,” said Kevin Plank, Under Armour’s CEO, in a conference call Wednesday. Users are required to change their passwords and the company is urging users to do so immediately. The notices included details on what users of the app could do to protect their accounts and a digital version of the notification can be seen here. Notifications began four days after Under Armour learned of the breach via email and in-app messaging. The investigation is ongoing, but the breach appears to affect about 150 million users. It wrote, "Payment card data was also not affected because it is collected and processed separately." Under Armour is also clear that payment data wasn't accessed in the hack. Under Armour wrote, "The investigation indicates that the affected information included usernames, email addresses, and hashed passwords - the majority with the hashing function called bcrypt used to secure passwords." Under Armor notes that all information stolen in the hack that wasn't protected via bcrypt was protected using SHA-1 160-bit hashing function.
