Yahoo has had 500 million accounts exposed in what is believed to be the world’s biggest data breach. It couldn’t have come at a worse time for the company, who are in the process of being bought by Verizon in a $5 billion deal. The consequences may be severe for Yahoo, but what does it mean for you?

Find out what really happened, how you can find out if you've been affected and what you should do in the event of an attack: 

First of all, what happened?

The breach is thought to have taken place in late 2014 by a “state-sponsored actor” – in other words, a foreign government. It’s the second time this year that a Yahoo hack has hit the news, but the two incidents aren’t thought to be related. The stolen information includes names, email addresses, encrypted passwords, phone numbers, birth dates and security question answers.

Does that mean I’ve been hacked?

Not necessarily. Fortunately, Yahoo encrypts their user’s password using ‘hashing’, which makes them much harder to crack. This means that even if the hackers have obtained your details, they may not be able to use them. However, too many people still use common and easily guessable passwords which even the best cryptology can’t protect.

So how will I know if I’ve been affected?

Yahoo have stated that they will be contacting all affected users, but with so many users having moved onto another platform (i.e. Hotmail or Google), it’s likely that many victims will never get the memo. It’s best to be proactive and take action now to protect your accounts, even if you’re not sure.

And what should I do if I think I have been hacked?

Yahoo have recommended all its users – whether active or not – change their passwords if they’ve not done so since 2014. Make sure you also change any sites or accounts that use the same passwords. 

Yahoo have advised watching for any suspicious activity on your email and bank accounts. “Avoid clicking on links or downloading attachments from suspicious emails,” Yahoo said in a post on their Tumblr page. “Be cautious of any unsolicited communications that ask for personal information or refer to you to a web page asking for personal information.

Wayne Barber
Wayne Barber
Managing Director, Oosha
RELATED ARTICLES

Why the Cloud is the saviour of business continuity

Every business in virtually every industry you can think of has had its world turned upside down by the Covid-19 pandemic. And as the lockdown has progressed, it’s become increasingly clear that things won’t be...

Remote working for risk-averse law firms

Legal practices are relaxing their traditional caution to take advantage of the numerous benefits of remote working. Benefits that can easily be undone by inadequate security. In this blog, we look at the advan...

How law firms can benefit from Office 365

In the past, there has been some resistance within law firms to using cloud IT solutions. But that is now eroding as more and more firms realise the potential offered by cloud-based platforms like Office 365. L...

blog-subscribe-bg

Like what you see?

Join our mailing list to receive the latest insights on legal and accounting technology