Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 29 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Yahoo Mail suffers attempted hack against email accounts thwarted

by The Gurus
October 5, 2020
in Editor's News
Share on FacebookShare on Twitter

An attempt to gain access to Yahoo Mail accounts was thwarted.

In a statement, Yahoo senior vice president of platforms and personalisation products Jay Rossiter, said that it identified “a coordinated effort to gain unauthorized access to Yahoo Mail accounts” and upon discovery “took immediate action to protect our users, prompting them to reset passwords on impacted accounts”.

Yahoo said that while there is no evidence that the passwords used to try and access the accounts were obtained directly from Yahoo’s systems, he did say that the list of usernames and passwords that were used to execute the attack were “likely collected from a third-party database compromise”.

He said: “Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts.” As a precaution, it is resetting passwords on what it deems to be “impacted accounts”, and was using second sign-in verification to allow users to re-secure their accounts. It has also implemented additional measures to block attacks against Yahoo’s systems. It was also unclear as to when the attempted attack took place.

Commenting, Ashish Patel, regional director at Stonesoft, a McAfee Group Company, said that this highlights the growing responsibility of businesses to do far more to protect users’ data.

“If it is indeed the result of a third-party database compromise, Yahoo needs to have greater insight into the security systems of the third parties it is sharing data with to avoid a repeat performance and ensure it remains a trusted brand,” he said.

“Any organisation can be at risk to a cyber threat, with information both an asset to be protected and a weapon to be used. Because of this, security teams within all industries need to assess their current protection, deploy appropriate measures and remain vigilant.”

George Anderson, product marketing director at Webroot, said that companies should be more   responsible when holding customers’ data and should put security at the heart of their operations.

“Encryption is one way forward, as is the requirement to change the password every three months or so. However, although organisations like Yahoo have a big role to play in ensuring user data is stored safely and securely, at the end of the day it’s also the responsibility of consumers to do everything they can to keep their credentials safe,” he said.

Ross Brewer, vice president and managing director for international markets at LogRhythm, said: “It is unfortunate that Yahoo has once again become associated with such a high profile breach, but this only highlights the increased determination and sophistication of hackers today.

“What’s more, the fact that initial reports suggests a third party database breach continues a worrying trend of cyber criminals targeting the weakest points to gain a foothold into bigger, more lucrative organisations. Sadly, the point of entry becomes irrelevant as it is Yahoo itself facing the reputational repercussions now.”

FacebookTweetLinkedIn
Tags: attackemailpassword
ShareTweet
Previous Post

(ISC)2 announces 2014 board of directors

Next Post

Lastline aim for targeted malware market

Recent News

Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023
software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information