Yahoo resets passwords after email hack
Yahoo suspects usernames and passwords were stolen from an unidentified third-party database
IDG News Service - Yahoo has been resetting email accounts that were targeted in an attack apparently aimed at collecting personal information from recently sent messages, the company said Thursday.
The list of usernames and passwords used for the attack was likely collected when another company's database was breached, Jay Rossiter, a Yahoo senior vice president, said in a blog post. He didn't name the third party or say how many accounts were affected.
"We are working with federal law enforcement to find and prosecute the perpetrators responsible for this attack," Rossiter wrote.
The hackers used a malicious software program to access Mail accounts with the stolen usernames and passwords, he wrote.
Free email services with large user bases from companies like Yahoo, Google and Microsoft are a rich target for hackers, who use compromised accounts to deliver spam, launch attacks on other users and collect information.
Rossiter didn't say when the attack occurred, and a Yahoo spokeswoman said the company could not share more information while the investigation is ongoing.
Yahoo said it was resetting passwords on the affected accounts and using second sign-in verification to let users resecure their accounts. The feature sends a one-time passcode to a user's phone that must be entered into a Web-based form to access the account.
Yahoo has also "implemented additional measures to block attacks against Yahoo's systems," Rossiter wrote.
He advised that users change their passwords regularly and not reuse the same password for their Yahoo Mail on other Web services.
"We regret this has happened and want to assure our users that we take the security of their data very seriously," Rossiter wrote.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cyberwarfare White Papers | Webcasts