Hurry up! Change your password!

“Yahoo” released a press stating that 500 million users’ accounts were breached in a 2014 hack of their systems. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information.

download It further reveals that:

‘A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently on Yahoo’s network.’    

Were you a victim of the attack?  Take these steps!

Meanwhile, the attack has been detected, you should immediately inform the staff members and your IT department or managed services provider.

Also, there are a variety of government and law enforcement agencies that collect and investigate such events.

  • Let your local police department know.

The agency you often hear the most about is the Federal Bureau of Investigation. You’ll want to get in touch with the FBI Internet Crime Complaint Center (IC3)

download (1)

  • The Secret Service does more than protect the president. They also have an Electronic Crimes Task Forcewhere reports on cyber attacks can be reported.


download (1)

Additionally, many of the above agencies offer a newsletter with alerts, tips, tricks and other cybersecurity resources.


Leave a Reply

Your email address will not be published. Required fields are marked *