<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Yahoo Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/yahoo/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/yahoo/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Wed, 05 Dec 2018 17:36:51 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Yahoo Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/yahoo/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Data Breaches Everywhere</title>
		<link>https://www.l2cybersecurity.com/data-breaches-everywhere/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 16:30:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[Quora]]></category>
		<category><![CDATA[VisionDirect]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1482</guid>

					<description><![CDATA[<p>It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. It really does look there&#8217;s data breaches everywhere you look. The worry about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1497" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg" alt="data breaches everywhere" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. <span id="more-1482"></span>It really does look there&#8217;s data breaches everywhere you look. The worry about this, is that people may just think that this is the new normal and put up with it.</p>
<p><strong>Updated 05/12/18:</strong> To include the Dell, potential breach.</p>
<p>Last Wednesday, Dell announced a potential cybersecurity incident. This was followed on Friday when it was revealed that Marriott International Hotels had a massive 500m  records stolen. These were all forgotten by Monday for most normal people and then later on Monday Quora, an online question and answer forum had 100m records stolen. A couple of weeks ago, Amazon notified an unknown number of customers that their name and e-mail address were exposed. Earlier in the month, VisionDirect in the UK had lost payment card data for an undisclosed number of customers.</p>
<p>That&#8217;s just 5 companies that you probably <span style="text-decoration: underline;"><strong>have</strong></span> heard of. I covered the <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/" target="_blank" rel="noopener">NUI Galway breach</a> separately a couple of weeks ago. There were lots <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-november-2018-251-286753-records-leaked" target="_blank" rel="noopener">more breached last month</a>. I&#8217;ll give a synopsis on each one of the five and then discuss what can happen.</p>
<h3>Quora have some questions to answer</h3>
<p>So <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Quora-Security-Update-2018-12-03.pdf" target="_blank" rel="noopener">Quora had ~100m records accessed</a> by persons unknown. They detected the issue on Friday 30th November and on Monday 3rd December they endeavoured to contain the issue. They logged out the impacted individuals and forced them to reset their passwords when they log back in. What was taken by the bad guys?</p>
<ul>
<li>
<blockquote><p>Account information, e.g. name, email address, encrypted (hashed) password, data imported from linked networks when authorized by users</p></blockquote>
</li>
<li>
<blockquote><p>Public content and actions, e.g. questions, answers, comments, upvotes</p></blockquote>
</li>
<li>
<blockquote><p>Non-public content and actions, e.g. answer requests, downvotes, direct messages</p></blockquote>
</li>
</ul>
<p>They claim not many subscribers used the direct messages features, so really the most important items lost here was the account information.</p>
<h3>Marriott reserve second place in the data breach tables</h3>
<p>I actually missed this <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Marriott-Announces-Starwood-Guest-Reservation-Database-Security-Incident-2018-11-30.pdf" target="_blank" rel="noopener">story on Friday the 30th November</a>, as I had promised a customer a security assessment report by the end of the week. So I stayed off social media for the day, while I completed it. There were a LOT of tweets to get through that night! ? This is currently the second biggest data breach in history after Yahoo!&#8217;s almost impossible to match <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/" target="_blank" rel="noopener">record breaking 3 billion accounts breach</a> as revealed in October 2017. So what did Marriott lose? The contents of the Starwood guest reservation database, going back as far as 2014, containing:</p>
<ul>
<li>
<blockquote><p>For approximately 327 million of these guests, the information includes some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences.</p></blockquote>
</li>
<li>
<blockquote><p>For some, the information also includes payment card numbers and payment card expiration dates, but the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128).  There are two components needed to decrypt the payment card numbers, and at this point, Marriott has not been able to rule out the possibility that both were taken.</p></blockquote>
</li>
<li>
<blockquote><p>For the remaining guests, the information was limited to name and sometimes other data such as mailing address, email address, or other information.</p></blockquote>
</li>
</ul>
<p>Some of the data lost is genuinely concerning. Particularly the payment card information.</p>
<h3>Bad guys try to ding dong Dell</h3>
<p>This may or may not have been a breach. <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Dell-Announces-Potential-Cybersecurity-Incident-2018-11-28.pdf" target="_blank" rel="noopener">Dell haven&#8217;t given away too much information</a>. Their security measures detected unauthorised activity that was &#8230;</p>
<blockquote><p>&#8230; attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords.</p></blockquote>
<p>Dell couldn&#8217;t say at this point whether these details were actually extracted from their systems by the bad guys. But even if they were unsuccessful in taking data, this just demonstrates that even massive companies like Dell can be broken into. Massive companies like &#8230; ⬇⬇⬇</p>
<h3>Prime example of poor communication from Amazon</h3>
<p>The <a href="https://www.theregister.co.uk/2018/11/21/amazon_data_breach/" target="_blank" rel="noopener">Amazon data breach</a> on 21st November doesn&#8217;t seem too bad. All that might have been compromised was name and e-mail address. However their notification to affected customers was pretty poor.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1483 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png" alt="amazon breach email" width="648" height="296" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png 648w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email-300x137.png 300w" sizes="(max-width: 648px) 100vw, 648px" /></p>
<p>A lot of security professionals have said that this looks very &#8220;scammy&#8221;. While I would tend to agree as it&#8217;s very light on any details, there&#8217;s no suggestion that the recipient should take some urgent action. If that had been the case, I would fully agree.</p>
<h3>Is there short-sighted security in place at VisionDirect?</h3>
<p>Back on the 19th November, VisionDirect in the UK <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Customer-data-theft-_-Vision-Direct-UK-2018-11-03.pdf" target="_blank" rel="noopener">issued a statement</a> about a data breach. The breach affected customers who updated their details or placed orders between the 3rd November and 8th November. What data was accessed by the evil doers?</p>
<blockquote><p>The personal information was compromised when it was being entered into the site and includes full name, billing address, email address, password, telephone number and payment card information, including card number, expiry date and CVV.</p></blockquote>
<p>In fairness to them, they were very specific about the timeframe when the website was compromised. &#8220;Between 12.11am GMT 3rd November 2018 and 12.52pm GMT 8th November 2018.&#8221; This was repeated ad nauseam.</p>
<h3>What can happen when there are data breaches everywhere?</h3>
<p>A common feature of all the above breaches are names and email addresses. While you might not think these are worth anything, 50,000 valid email addresses can be sold for up to $50 on criminal exchanges on the &#8220;dark web&#8221;. I hate that term by the way. It&#8217;s so &#8220;hackery&#8221;. Anyway, your email address has a small, but material value.</p>
<p>Payment card data is the next thing that is of immediate value, particularly where the bad guys have the CVV/3 digit security number. These can be immediately put to work purchasing vouchers which are then immediately spent. The card numbers are also valuable on their own and sell for up to $60 each. While Marriott had the credit card numbers encrypted, they were not sure if the required information to decrypt them again was also exposed. So I would assume that it was.</p>
<p>Passwords are the next concern. Quora had &#8220;hashed&#8221; passwords which is good. These are hard (but not impossible) to crack. They also forced a password reset on affected subscribers, so that&#8217;s another mitigation. With VisionDirect, the password was totally compromised. This is because it was captured when a user was signing on to the site. They forced password changes on people who were impacted. However, if the password is used on ANY other account, particularly email, banking and social media, then you must change them all.</p>
<p>The rest of the data that was breached is still incredibly useful to the criminals. In particular from the Marriott breach. They have reservation details, probably into the future. So they know the future likely movements of people. They have loyalty card information, which, along with other data points, can be used to compromise a person&#8217;s Starwood&#8217;s Preferred Guest account and re-direct the rewards elsewhere.</p>
<p>The amount of data leaked, over such a long time at Marriott is pretty bad. This can be merged with lots of other data breaches and the evil doers can build quite a profile on each individual. I&#8217;ve discussed before how <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/" target="_blank" rel="noopener">breached data from multiple sources</a> can be put to evil use.</p>
<p>Data breaches everywhere indeed.</p>
<h3>How can we help?</h3>
<p>As the saying goes, preparation is half the battle. If you&#8217;ve not prepared to handle a data breach, it will be a much bigger struggle. We can help you prepare, both for a breach and handling the aftermath.</p>
<p>If you want to discuss further, please call on <span style="color: #0000ff;"><strong>087-436-2675</strong></span> or send an e-mail to <strong><a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a></strong> and somebody will get in touch. We will make it straightforward and easy for you to be ready for an incident.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>#GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of my 2017 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2017-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 28 Dec 2017 15:02:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1048</guid>

					<description><![CDATA[<p>I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in blue, but the full article for my 2017 predictions is here. 1. Ransomware levels will plateau, but&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1049" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg" alt="2017 Predictions" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in <span style="color: #0000ff;">blue</span>, but the full article for my 2017 predictions is <a href="https://www.l2cybersecurity.com/2017-predictions-cyber-security/">here</a>.<span id="more-1048"></span></p>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">1. Ransomware levels will plateau, but constantly change</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This might be an easy one to get right. Ransomware is already embedded in over 90%+ of all phishing e-mails, so there&#8217;s hardly any further room to keep growing. We&#8217;ve already started to see the way it is changing though. As was reported earlier this month, you could get your files unlocked if <a style="color: #0000ff;" href="http://www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends/">you infected two friends</a> with this Ransomware rather than paying money over to the hackers.</span></p>
<p>I haven&#8217;t seen the stats yet, but I suspect Ransomware is still as big a problem as it was 12 months ago. And as noted, the evil doers have started using new methods to get money out of people by hijacking the victims computer processing power to mine <a href="https://www.engadget.com/2017/12/15/as-online-ads-fail-sites-mine-cryptocurrency/">crypto-currencies</a> (i.e. create new currency for them). We also had the scary prospect of Ransomware worms thanks to <a href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. So I&#8217;m going to say I got this one right.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">2. Smart Device Botnets will target the big service providers</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="color: #0000ff;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">We&#8217;ve seen <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/09/have-you-smart-internet-connected-iot.html">record breaking botnets created this year</a> by poorly designed and poorly secured smart devices </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">(also referred to as IoT, e.g.- </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">internet connected cameras, digital video records, internet routers, etc.). I suspect the evil doers are building a massive army, much bigger than anything we have seen to date. I believe that they will then carry out a coordinated attack on one of the big service providers (e.g.- Google, Amazon or Microsoft). The attack won&#8217;t be fully successful, but will have caused sufficient disruption to make smart device security a focus for all manufacturers of such devices, as insecure devices will be banned from accessing the web.</span></span></p>
<p>This was a miss. While attacks did take place, there was nothing on the scale that we saw in 2016.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">3. There will be an even bigger data leak than 2016&#8217;s revelation of the Yahoo! world record leak</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yahoo! has really had a bad year, setting a world record, having already had an even <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/12/yahoo-tries-for-new-world-record-and.html">bigger world record</a>. I believe bigger leaks have already happened and will be revealed next year. I reckon the bad guys are already combing through the data, cracking passwords and will then create tools that will take the IDs and passwords they have and try these against other services (e-mail, social media, etc.) to generate a list of compromised accounts, which are extremely valuable on the dark net.</span></p>
<p>I got this one right. It was Yahoo! that did it again, with over <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">3 billion records</a> breached.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">4. Russia will be accused of interfering in elections occurring across Europe</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Russia has shown form this year, interfering with the US Presidential Election. With elections happening in the bigger European Countries (Germany, France and The Netherlands) in 2017, I would not be very surprised to discover that the Russian state hackers tried to influence the results of these.</span></p>
<p>While the German and Dutch elections were not outwardly (at least) subject to the same issues as affected the US elections, there was <a href="https://www.nytimes.com/2017/05/05/world/europe/france-macron-hacking.html">an incident</a> during the French elections which looks likely to be an attempt to influence the voters. A dump of campaign documents including emails and accounting records for Emmanuel Macron&#8217;s campaign was released just before a moratorium on communications came into effect. So I&#8217;ll take a partial on this one.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">5. More Irish people will be protecting themselves from Cyber Threats</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ll be a bit selfish with this one as I will be the one helping these people to protect themselves. People knowing how to stay safe on-line will be the least likely to be affected by a Cyber Threat.</span></p>
<p>While I did protect more Irish people in 2017 by educating them, it wasn&#8217;t as many as I would have liked. So, again I will take a partial on this one. A little something called the GDPR became more important to people so, in conjunction with <a href="http://www.mjonfc.ie/">Molly O&#8217;Neill</a>, we created training and awareness programmes for businesses.</p>
<h3>Results for my 2017 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad. I may give this another go for 2018.</p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malicious e-mail from Yahoo! breach.</title>
		<link>https://www.l2cybersecurity.com/malicious-e-mail-yahoo-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 10 Oct 2017 14:46:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=937</guid>

					<description><![CDATA[<p>I&#8217;ve received the first malicious e-mail as a result of a compromised Yahoo! e-mail account. I&#8217;ve warned the individual and hopefully he still has control of the account and can secure it again.It&#8217;s a typical &#8220;phishing&#8221; e-mail, which attempts to get you to carry out some action (e.g.- open an attachment or click on a&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/malicious-e-mail-yahoo-breach/">Malicious e-mail from Yahoo! breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-938" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-compromised-150x150.jpg" alt="malicious e-mail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-compromised-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-compromised.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I&#8217;ve received the first malicious e-mail as a result of a compromised Yahoo! e-mail account. I&#8217;ve warned the individual and hopefully he still has control of the account and can secure it again.<span id="more-937"></span>It&#8217;s a typical &#8220;phishing&#8221; e-mail, which attempts to get you to carry out some action (e.g.- open an attachment or click on a link) and this will then lead to some attempt to compromise your computer. Google&#8217;s spam filters picked it up, so I was nice and safe. It is quite likely that this e-mail account was compromised as a result of the <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">Yahoo! data breach</a> back in 2013. <a href="https://www.oath.com/press/yahoo-provides-notice-to-additional-users-affected-by-previously/">Yahoo! have admitted</a> that details of every single e-mail account they had, was leaked to evil doers.</p>
<p>These details included weakly protected passwords, so it is likely that the bad guys have accessed this individual&#8217;s account and downloaded his contacts. Here is the malicious e-mail in question, I&#8217;ve redacted the name portion of the e-mail address to protect the individual:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-940 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-spam1-1.jpg" alt="malicious e-mail" width="733" height="312" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-spam1-1.jpg 733w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-spam1-1-300x128.jpg 300w" sizes="auto, (max-width: 733px) 100vw, 733px" /></p>
<ul>
<li>So the Subject of the e-mail is &#8220;Statement from &lt;<em><strong>compromised e-mail address</strong></em>&gt;&#8221;.</li>
<li>The individual&#8217;s e-mail address is buried in the &#8220;From&#8221; address in the e-mail.</li>
<li>Also the last line of the e-mail is the name part of the e-mail address.</li>
<li>However this malicious e-mail did not actually come from that person&#8217;s Yahoo! account, but rather that &#8220;rimports.hostpilot.com&#8221; domain that Google picked up on. This e-mail originated in the Philippines.</li>
</ul>
<p>The use of the address is all an attempt to make it look like this e-mail is from somebody you know and perhaps trust and you may therefore be inclined to click on the link, as in this case. I&#8217;ve also redacted a part of the link in case any of my curious readers attempt to go to that address. I don&#8217;t want you to compromise yourselves. <span id="c128" class="notranslate">?</span></p>
<p>Even without Google&#8217;s spam filters, I would have been suspicious of this e-mail, as I had only ever exchanged 2 e-mails with him 3 years ago. So I would have abided by <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, I was not expecting that e-mail from that individual, so I certainly wouldn&#8217;t have clicked on the link.</p>
<p>So please watch out for any unusual e-mails that come to you from people with Yahoo e-mail addresses.</p>
<p>Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/malicious-e-mail-yahoo-breach/">Malicious e-mail from Yahoo! breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Yahoo breach &#8211; Round 3 &#8230; Billion! ?</title>
		<link>https://www.l2cybersecurity.com/yahoo-breach-round-3/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 09:31:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=931</guid>

					<description><![CDATA[<p>If you had a Yahoo!, BT or Sky e-mail account (also AT&#38;T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.It&#8217;s a record that will be hard to beat, but they have now confirmed that all 3 BILLION Yahoo! based customers had their account information stolen.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">Yahoo breach &#8211; Round 3 &#8230; Billion! ?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-932" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it-150x150.jpg" alt="yahoo! breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />If you had a Yahoo!, BT or Sky e-mail account (also AT&amp;T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.<span id="more-931"></span>It&#8217;s a record that will be hard to beat, but <a href="https://www.oath.com/press/yahoo-provides-notice-to-additional-users-affected-by-previously/">they have now confirmed</a> that all <span style="text-decoration: underline;"><strong>3 BILLION</strong></span> Yahoo! based customers had their account information stolen. They are all being contacted now with information on the compromise.</p>
<p>&nbsp;</p>
<blockquote><p>Subsequent to Yahoo&#8217;s acquisition by Verizon, and during integration, the company recently obtained new intelligence and now believes, following an investigation with the assistance of outside forensic experts, that all Yahoo user accounts were affected by the August 2013 theft.</p></blockquote>
<p>That&#8217;s an absolute world record number of accounts to have been compromised. Only Google or Microsoft would have more e-mail accounts than Yahoo!</p>
<p>As <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">I&#8217;d indicated at the time</a> of the first Yahoo breach notice, they also provide e-mail services to a number of other internet service providers such as BT and Sky in Ireland and the UK. These accounts will have been compromised too. I provided a <a href="https://www.l2cybersecurity.com/yahoo-already-had-world-record/">number of helpful tips</a> in my second Yahoo! post when they went and set the previous world record for accounts breached, I&#8217;ll include them again here for you.</p>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Two-factor authentication:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This will absolutely improve your on-line account protection by a huge amount. Particularly if you use an authenticator app like <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Google Authenticator</a>. There is even an entire <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, because it is that good!</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Use unique passwords on every site:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yes, we know it’s difficult to do this, but this is where the bad guys win. If you haven’t received the <a href="https://www.l2cybersecurity.com/security-awareness-training/">excellent training</a> available from <i><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a></i>, then use a Password manager.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Check auto-forwarding settings:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If the evil doers have compromised your e-mail account, they may have done this in a very sneaky fashion by logging on once, and setting your account to automatically forward all received e-mail to them. This is a particularly stealthy way for them to spy on you. Go to your account settings now and check if there is any forwarding of mail going on.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Don’t save welcome e-mails or password resets:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">When you sign-up to services or accounts, you provide your e-mail address and that service or account sends you a “are you the person who just signed up to us” type e-mail, followed by a “welcome to our service” type e-mail. You might also have forgotten your password for such accounts and requested a password reset which they helpfully send to you in an e-mail. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well you really should delete all such e-mails after you have read them, because these will lead the evil doers to these accounts, where they will do another password reset and then compromise that account too. If they don’t know what services you subscribe to, they can’t do anything to them.</span></p>
</div>
<p>Lets be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">Yahoo breach &#8211; Round 3 &#8230; Billion! ?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Breach Handling &#8211; 3 recent examples.</title>
		<link>https://www.l2cybersecurity.com/data-breach-handling-3-recent-examples/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 25 Jul 2017 11:08:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[AA]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Bupa]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Swedish Government]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=817</guid>

					<description><![CDATA[<p>You might remember that last year, Yahoo! were shown to have suffered a data breach not once, but twice which led to the personal data associated with ~1.5 billion accounts being stolen by evil doers. This was a pretty massive story at the time and it was widely reported. Data breaches occur on a frighteningly&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-handling-3-recent-examples/">Data Breach Handling &#8211; 3 recent examples.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-818" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Data-breach-2-150x150.jpg" alt="Data breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Data-breach-2-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/07/Data-breach-2.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />You might remember that last year, <em>Yahoo!</em> were shown to have suffered a data breach not <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">once</a>, but <a href="https://www.l2cybersecurity.com/yahoo-already-had-world-record/">twice</a> which led to the personal data associated with ~1.5 billion accounts being stolen by evil doers. This was a pretty massive story at the time and it was widely reported.<span id="more-817"></span></p>
<p>Data breaches occur on a frighteningly regular basis, which may not necessarily make it into the mainstream press and is simply discussed among cyber security and data privacy types, but with the impending EU General Data Protection Regulation (GDPR) coming into force in May 2018, <span style="text-decoration: underline;"><strong>all organisations</strong></span> will need to be aware that they will be bound by the breach reporting aspects of the GDPR, specifically Articles <a href="https://www.privacy-regulation.eu/en/33.htm">33</a> and <a href="https://www.privacy-regulation.eu/en/34.htm">34</a>.</p>
<p>So in this post I take a look at 3 data breaches that have been reported on this month, which occurred to some well known organisations.</p>
<h2>The AA Shop data breach:</h2>
<p>First up is the Automobile Association (AA) in the UK. They were notified back in April that backup copies of their customer databases were publicly available on a cloud service, which they took down fairly promptly. However they did nothing more at that time. They were subsequently notified that details of over 100,000 user accounts from their on-line Accessories Shop had been exposed, which they did acknowledge, blamed a third party service provider, but claimed that no sensitive data or credit card information had been leaked as a result.</p>
<p>However security researchers <a href="https://www.grahamcluley.com/aa-apologises-confirms-customers-partial-credit-card-data-exposed/">begged to differ</a> and provided evidence of partial payment card information being exposed as well. By 7th of July the AA had to make a <a href="http://www.theaa.com/about-us/newsroom/aa-public-statement-personal-data">grovelling apology</a> and properly set out their position. Interestingly this apology does not show up on Google searches, but is buried in their website. <span id="c128" class="notranslate">?</span></p>
<p>The Information Commissioners Office (ICO) in the UK have now become involved in the matter and, while I can&#8217;t pre-judge the outcome, I would expect the AA to get some sanction for such awful handling of such a serious matter. If the GDPR were in force, the financial penalty for this handling would likely be much more significant, because they would be in breach of Articles 33 and 34.</p>
<h2>Bupa&#8217;s rogue staff member causes a data breach:</h2>
<p>Next was <em>Bupa</em>, the health insurance provider in the UK (and formerly of the Irish Market). An employee of their international health insurance division <em>Bupa Global </em>had made a copy of personal data belonging to 108,000 insurance policy holders and removed this copy from their offices. In their notification to their customers, Bupa states:</p>
<blockquote><p>The information does not include any financial or medical data, and relates to a portion of customers with international health insurance.  &#8230;</p>
<p>We are contacting those policy holders who are affected to apologise and advise them as we believe the information has been made available to other parties. The data includes: names, dates of birth, nationalities, and some contact and administrative details including Bupa insurance membership numbers.</p></blockquote>
<p>On discovery of the breach, they immediately dismissed the employee, then at some point notified the ICO, the Financial Conduct Authority and the Police. They also state they&#8217;re tightening up procedures. Their website gives a full, clear <a href="https://www.bupa.com/corporate/about-us/customer-update">outline</a> of what happened, what steps customers can take to protect themselves, an e-mail and dedicated phone line for more advice. This even shows up on a Google search. <span id="c116" class="notranslate">?</span></p>
<p>Bupa handled this incident extremely well and were upfront and honest about what happened. From a GDPR perspective, the only area of concern is the timeframe for them to notify the ICO? This is not clear from my research. It seems that Bupa became aware of the incident in or around the 23rd of June, but customers were not notified about it until the 12th of July. It&#8217;s possible they did notify the ICO in good time, but when the GDPR rolls into town, they will need to have done so within 72 hours of discovery, in a case such as this. This is definitely an example of how a data breach should be handled &#8230; kudos to Bupa. <span id="c427" class="notranslate">?</span></p>
<h2>The Swedish Government&#8217;s data breach:</h2>
<p>You read that right &#8211; a Government has had a data breach and this one is significant, deeply embarrassing and potentially life-threatening <span id="c103" class="notranslate">?</span>. The Swedish Government is desperately trying to keep this under wraps, but it&#8217;s such an omnishambles they can&#8217;t even do that right. Expect to hear more on this in due course, here is some initial <a href="https://www.privateinternetaccess.com/blog/2017/07/swedish-transport-agency-worst-known-governmental-leak-ever-is-slowly-coming-to-light/">reportage</a>.</p>
<p>The background to this is that back in 2015, the Swedish Government&#8217;s transport agency outsourced the managing of it&#8217;s databases and networks to IBM, who placed all of this in the &#8220;cloud&#8221;. These databases contain the details of every vehicle in the country, including those of:</p>
<ul>
<li>Private citizens</li>
<li>Police</li>
<li>Military</li>
<li>Special Forces<strong><span style="color: #ff0000;">*</span></strong></li>
<li>Individuals in Witness protection/relocation programmes<strong><span style="color: #ff0000;">*</span></strong></li>
</ul>
<p style="padding-left: 30px;"><span style="color: #ff0000;"><strong>*</strong></span>This is the reason I said that this breach was potentially life-threatening &#8211; their identities must be kept secret.</p>
<p>The non-secret parts of these databases are considered public information and are regularly provided to marketing companies who subscribe to receive the lists.</p>
<p>So what happened was that somebody in IBM sent an e-mail with a copy of the entire database (secret and not-secret) to the marketers. This was a huge mistake on it&#8217;s own. What they should have done next , was e-mail a copy of the database with the not-secret information in it and instruct the recipients to destroy/wipe the previous e-mail (perhaps throw in a threat of national security, etc.) But what they actually did was much, much, much more dangerous.</p>
<p>An IBM agent sent an open, clear text (i.e. not encrypted) e-mail, which could potentially be intercepted, to the marketers <span style="text-decoration: underline;"><strong>pointing out and identifying</strong></span> the secret records and asking the marketers themselves to remove them from the database. <span id="c123" class="notranslate">?</span> THIS is why this has got to be the most embarrassing and dangerous data breach imaginable at this time.</p>
<p>Other databases that were outsourced include ones that contain the weight capacity of all roads and bridges (which is crucial for warfare, and says a lot about what roads are intended to be used as wartime airfields) and another which stores the type, model, weight, and any defects of any and all government and military vehicles, including their operator, which says a great deal about the structure of military support units.</p>
<p>The very fact that these databases were outsourced to IBM, who stored them in data centres in Eastern Europe (Czech Republic and Serbia) without any apparent security controls, means that Swedish military secrets have been exposed to foreign entities. This is simply intolerable.</p>
<p>If this happened after May 2018 when GDPR is in place, I&#8217;m not sure what would happen to the transport agency, but IBM, as a data processor, would certainly be likely to be severely sanctioned by being hit with a big financial penalty. They could also be exposed to being sued by individuals for distress, as a result of their secret identity being revealed. It simply boggles the mind how awful a service they provided here.</p>
<h2>Conclusion:</h2>
<p>Give data breaches some consideration in your organisation before the GDPR comes into effect. Come up with a plan to handle them in keeping with Articles <a href="https://www.privacy-regulation.eu/en/33.htm">33</a> and <a href="https://www.privacy-regulation.eu/en/34.htm">34</a> and be sure to test that the plan works for you. You don&#8217;t want to be like The AA or worse, like the Swedish Government/IBM.</p>
<p>You can find out more about the GDPR <a href="https://www.l2cybersecurity.com/gdpr/">here</a> and if you want to contact us to learn how we can help you then simply send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> or call us on +353-87-436-2675.</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breach-handling-3-recent-examples/">Data Breach Handling &#8211; 3 recent examples.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Yahoo! tries for new world record and wins &#8230; but it already had the world record!</title>
		<link>https://www.l2cybersecurity.com/yahoo-already-had-world-record/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 23:42:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=483</guid>

					<description><![CDATA[<p>You all heard the headlines during the year about the massive Yahoo! hack, where in late 2014, hackers had stolen the names, addresses, mobile telephone numbers, dates of birth, security questions and passwords of 500+ million accounts. This was a new world record for the amount of user accounts stolen on the internet. Well bless&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-already-had-world-record/">Yahoo! tries for new world record and wins &#8230; but it already had the world record!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://1.bp.blogspot.com/-gqJYUl7BpLQ/WFmvu7Sp_GI/AAAAAAAAA6E/33MFbl5O7iAAYvI_hvqIlH1Uiy4ABU9mQCLcB/s200/yahoo-email-account-hacked-2013.jpg" alt="Yahoo Hacked" width="200" height="76" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">You all heard the <a href="http://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">headlines</a> during the year about the massive Yahoo! hack, where in late 2014, hackers had stolen the names, addresses, mobile telephone numbers, dates of birth, security questions and passwords of 500+ million accounts. This was a new world record for the amount of user accounts stolen on the internet.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well bless their cotton socks, Yahoo! had actually already done even better and they didn&#8217;t even realise it. In 2013 over 1 billion accounts had the same type of information stolen, including poorly protected passwords. Yahoo! had no idea that this had happened. It wasn&#8217;t until somebody provided the authorities with details that they had come across on the web. The authorities brought this to Yahoo! in October/November, which was when they were still thrashing around after the the September revelations about the 500m accounts, and I can just imagine their response&#8230;</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-yZfYO_zqWYQ/WFm2sVLWH9I/AAAAAAAAA6Y/HCfQOXqh8Wsp2Td-5gQdUjHkO1DIw7ITACLcB/s1600/Picard%2BFFS.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-yZfYO_zqWYQ/WFm2sVLWH9I/AAAAAAAAA6Y/HCfQOXqh8Wsp2Td-5gQdUjHkO1DIw7ITACLcB/s200/Picard%2BFFS.jpg" width="200" height="150" border="0" /></span></a><span id="more-483"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Seriously though, this went further than just a huge amount of normal e-mail addresses. It would seem that <a href="http://www.computerworld.com/article/3150901/security/yahoo-breach-means-hackers-had-3-years-to-abuse-user-accounts.html">150,000 US Government and Military accounts</a> may be at risk as they used Yahoo! mail accounts as backup e-mail addresses.</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-LXG6ZAJFXmE/WFm4oLpar7I/AAAAAAAAA6k/jY6I9pgbNAYr6YQnqIIwzG7wC1XsHasggCLcB/s1600/Triple%2Bfacepalm.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-LXG6ZAJFXmE/WFm4oLpar7I/AAAAAAAAA6k/jY6I9pgbNAYr6YQnqIIwzG7wC1XsHasggCLcB/s400/Triple%2Bfacepalm.jpg" width="400" height="230" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This is simply beyond embarrassing for Yahoo! and I wonder how much Verizon will knock off the purchase price after this doozey.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Enough with the Yahoo! bashing &#8230; What can you do to help protect yourself:</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Two-factor authentication:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This will absolutely improve your on-line account protection by a huge amount. Particularly if you use an authenticator app like <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Google Authenticator</a>. There is even an entire <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, because it is that good!</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Use unique passwords on every site:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yes, we know it&#8217;s difficult to do this, but this is where the bad guys win. If you haven&#8217;t received the <a href="http://www.l2cybersecurity.com/#ourservices">excellent training</a> available from <i><a href="http://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a></i>, then use a Password manager.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Check auto-forwarding settings:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If the evil doers have compromised your e-mail account, they may have done this in a very sneaky fashion by logging on once, and setting your account to automatically forward all received e-mail to them. This is a particularly stealthy way for them to spy on you. Go to your account settings now and check if there is any forwarding of mail going on.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Don&#8217;t save welcome e-mails or password resets:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">When you sign-up to services or accounts, you provide your e-mail address and that service or account sends you a &#8220;are you the person who just signed up to us&#8221; type e-mail, followed by a &#8220;welcome to our service&#8221; type e-mail. You might also have forgotten your password for such accounts and requested a password reset which they helpfully send to you in an e-mail. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well you really should delete all such e-mails after you have read them, because these will lead the evil doers to these accounts, where they will do another password reset and then compromise that account too. If they don&#8217;t know what services you subscribe to, they can&#8217;t do anything to them.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;m a BT or Sky e-mail subscriber. I&#8217;m not at risk from Yahoo:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Ahhhh &#8230; No you&#8217;re not. As mentioned in our earlier <a href="http://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">post</a>, BT and Sky (and many others) used Yahoo! as their back-end e-mail provider. If you had a BT or Sky account back in 2013, then these may be at risk. Refer to the steps above and secure your account now.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Conclusion:</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yahoo! have some serious, serious questions to answer. but you need to protect yourself, So take the above steps at the very least.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Brian Krebs has an excellent Q&amp;A about this mess available <a href="https://krebsonsecurity.com/2016/12/my-yahoo-account-was-hacked-now-what/">here</a>. It&#8217;s worth a read.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If you need advice, you can call us on 087-436-2675 or e-mail us on <a href="mailto:info@L2CyberSecurity.com" data-blogger-escaped-href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> &#8230; and of course:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-NlQDtG8lSQA/WFnAj4gl4sI/AAAAAAAAA60/kqePqRG3h68Sdgl69bAiQKeBMYvVsFMmACLcB/s1600/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-NlQDtG8lSQA/WFnAj4gl4sI/AAAAAAAAA60/kqePqRG3h68Sdgl69bAiQKeBMYvVsFMmACLcB/s320/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" width="320" height="213" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-already-had-world-record/">Yahoo! tries for new world record and wins &#8230; but it already had the world record!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Here is a worrying aspect of the Yahoo breach.</title>
		<link>https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 16:48:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=486</guid>

					<description><![CDATA[<p>Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account. Yahoo provides e-mail services to some big internet service providers (ISPs), over in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://1.bp.blogspot.com/-8EJZw55EX-U/V-VZ9S-st4I/AAAAAAAAAZg/fyZ9OhxST109aBuR3LdTURkTZ2eoehrhwCLcB/s200/Yahoo.jpg" alt="Yahoo hacked" width="200" height="129" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Yahoo provides e-mail services to some big internet service providers (ISPs), over in the US <a href="http://att.yahoo.com/" data-blogger-escaped-target="_blank">AT&amp;T</a>, <a href="http://ca.rogers.yahoo.com/" data-blogger-escaped-target="_blank">Rogers</a> and <a href="http://login.frontier.com/webmail/">Frontier.com</a>. Over on this side of the Atlantic <a href="http://www.sky.com/">Sky</a> and <a href="http://home.bt.com/">BT</a> are large ISPs operating in Ireland and the UK. Their e-mail services are powered by Yahoo.</span></p>
</div>
<p><span id="more-486"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There are <a href="http://www.bbc.com/news/world-us-canada-37447016">reports</a> that Sky and BT are contacting their customers, so that at least should hopefully highlight to those people that, yes, you do have a Yahoo account too, it&#8217;s just by a different name.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #1</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A large amount of the Yahoo accounts will no doubt be dormant and no longer in use by their owners. I certainly had a Yahoo account quite some time ago, but I never associated it with myself (shock/horror &#8211; I lied on the Internet ?) or with any other account. The bad guys are welcome to it, as I know it can&#8217;t connect to me.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">However if you used the same user name on a Yahoo account (dormant or not) on some other accounts (GMail, Facebook, LinkedIn, Microsoft, etc.) then the Yahoo account details could be tried by the evil doers against these other services.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Of course, you will have used the same password on them all, so that&#8217;ll make their life so much easier to ruin yours. ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So the first tip is to change your Yahoo account password now. You should also change this password on all of the other online accounts that you use it on. However this time you might take the sensible decision and give every account a unique password. You can learn how to do this easily at the <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Safety Training</a> which L2 Cyber Security Solutions deliver. However if you struggle to come up with the means to do this, then you should invest in a <a href="https://en.wikipedia.org/wiki/Password_manager">Password Manager</a>. This can do the hard work for you.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #2</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">On any on-line service that you use, if it has a means to implement, what is called, Two Factor Authentication, then turn it on NOW! I cannot stress how much this improves your security position just by turning this feature on.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I go into in more detail <a href="https://www.l2cybersecurity.com/protect-online-accounts/">here</a>, but briefly, if you are using Facebook or Dropbox (to name but two, there are dozens that subscribe to this method) you can download the <a href="https://support.google.com/accounts/answer/1066447?hl=en">Google Authenticator</a> App onto your smart phone (available on <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Android</a> and <a href="https://itunes.apple.com/en/app/google-authenticator/id388497605?mt=8">Apple</a>). Then inside in the account security settings of your on-line service, activate the Two Factor Authentication, telling it you use Google Authenticator. It will put up a QR code on screen, which you show to the App and it will then start generating a 6 digit code that changes every 30 seconds.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So now what happens is that if you (or some evil doer) tries to sign on to your account from a different device or location, even if they have your password they will also now need the 6 digit code that is showing up on your Google Authenticator App. Without it, they get nowhere.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If the on-line service does not support Google Authenticator, then they might send you a text message instead. This is not quite as secure as the App, but it is better than nothing.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #3</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">It wasn&#8217;t just user name and passwords that were stolen, but details like date-of-birth, mobile phone number and answers to security questions.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Details like date-of-birth and mobile number are kinda hard to change, but the security questions are another concern. If you have some other on-line accounts that use the same security questions, now would be a good time to go and change these.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A much simpler solution would be to implement Two Factor Authentication, as outlined above.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Conclusion</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The internet is a wonderful but dangerous place and there are a lot of bad guys who are making a lot of money from your accounts. So &#8230;</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s1600/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s400/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" width="400" height="266" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
