By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    All You Need to Know About APTs
    8 months ago
    Avoid infection by dangerous Onion ransomware aka CTB-Locker
    8 months ago
    How Kaspersky Internet Security protects from ransomware
    8 months ago
    Latest News
    Safeguards against firmware signed with stolen MSI keys
    2 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
    7 days ago
    Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
    1 week ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    What’s included in the ‘Battle of Shadow and Light’ update for Halo 5: Guardians
    8 months ago
    How to fix printer spooler problems on Windows 10
    8 months ago
    How to fix error 0x80004005 starting VirtualBox VM on Windows 10
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    What is two-factor authentication | Kaspersky official blog
    3 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    5 days ago
    NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
    5 days ago
    How Oxy uses hooks for maximum extensibility
    How Oxy uses hooks for maximum extensibility
    6 days ago
    The personal threat landscape: securing yourself smartly
    6 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Screen Recording with VLC
    8 months ago
    How to delete files immediately in Windows 10?
    7 months ago
    Another Phishing Attack on WhatsApp
    8 months ago
    Latest News
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    3 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    3 days ago
    How to check USB4 devices specs from Settings on Windows 11
    3 days ago
    How to enable new header UI for File Explorer on Windows 11
    1 week ago
  • Glossary
  • My Bookmarks
Reading: Yahoo hack plot thickens
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Yahoo hack plot thickens

Vitus White
Last updated: 7 October
Vitus White 4 years ago
Share
4 Min Read

Has the shock and awe of Yahoo’s 500 million user credential hack died down yet? Everyone breathing a bit easier? Passwords changed, dead accounts deleted?

For those of you chuckling and noting, “I never had a Yahoo Account,” or “Who uses Yahoo, anyway?” you may want to look into some of your accounts because you may have a Yahoo account and not even know it.

Wait, what?

You’ve probably heard of or use Google Apps for Work, tools including e-mail that some companies use to run their businesses. What you may not know, given Google’s ubiquitous presence, is that Yahoo offers a similar service (called Aabaco Small Business).

How many companies might that affect? Well, according to a recent blog post from Graham Cluley, more than 500,000 domains use Yahoo as their e-mail provider. Any of those domains could be part of the massive theft of data, which Yahoo stated was state sponsored.

screen-shot-2016-09-26-at-1-24-18-pm

According to Kurt Baumgartner, principal security researcher on Kaspersky Lab’s Global Research and Analysis Team (GReAT): “This situation reminds us of Google’s Aurora APT incident in 2009, announced in 2010. When we compare these two breaches, it is incredible that it’s 2016 and users are being notified years after a major breach, and only after another organization made the issue public. These types of breaches highlight why all companies need to be cybersecurity leaders, implementing industry best practices and available security technologies.”

So: What can you do?

The data breach happened in 2014, and we are learning the extent of it only now. Criminals have had some time to pore over this data. Key priorities now are to change passwords and use Have I Been Pwned? to check your current e-mail addresses as well ones that you may no longer use or that were from past employers. Then, even if the accounts haven’t been breached, it’s a good idea to delete accounts you no longer use. As we’ve seen with cases such as Myspace’s data breach, criminals care about data and login credentials — it doesn’t matter if you are actively using the site; they know we humans are lazy and reuse passwords.

#Yahoo expected to confirm massive #data breach https://t.co/hgfblUpiuS pic.twitter.com/2jldXb78GF

— Kaspersky Lab (@kaspersky) September 22, 2016

Baumgartner also offers some words of caution to those caught up in the breach: “Do not fall for the social engineering schemes that will follow this incident. Everyone should be aware that any breach notice that Yahoo! emails out will go only to their email service users, and it will not provide links to click on or include any attachments, and it will not ask for personal information.”

 This is unlikely to be the final chapter of the Yahoo saga. Please stay tuned here and to Threatpost; we will surely have coverage of this moving forward.


Source: kaspersky.com

Translate this article

TAGGED: Security, Social engineering, Software, Threats
Vitus White October 7, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Safeguards against firmware signed with stolen MSI keys
Threats 2 days ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats 2 days ago
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
News 3 days ago
How to enable Taskbar End Task option to close apps on Windows 11
News 3 days ago
How to check USB4 devices specs from Settings on Windows 11
News 3 days ago

Recent Posts

  • Safeguards against firmware signed with stolen MSI keys
  • WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
  • How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
  • How to enable Taskbar End Task option to close apps on Windows 11
  • How to check USB4 devices specs from Settings on Windows 11

You Might Also Like

Threats

Safeguards against firmware signed with stolen MSI keys

2 days ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats

WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin

2 days ago
News

How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11

3 days ago
How To

What is two-factor authentication | Kaspersky official blog

3 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

What is two-factor authentication | Kaspersky official blog
Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
How Oxy uses hooks for maximum extensibility
The personal threat landscape: securing yourself smartly
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
Previous Next
Hot News
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?