Another Discovered Yahoo Data Breach (2013)

by Tech Mainstream Staff


December 15, 2016


Another Discovered Yahoo Data Breach (2013)


In November, Yahoo determined through law enforcement officials that an unauthorized third party stole data files which contained Yahoo user data. In an official Yahoo statement, the details are given: "Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016."

The compromised user data may have contained "names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers." It has also been determined that "clear text, payment card data, or bank account information" was not part of the data breach.

How did this happen? The intruder(s) learned to forge "cookies that could allow an intruder to access users’ accounts without a password. Based on the ongoing investigation, we [Yahoo] believe an unauthorized third party accessed our proprietary code to learn how to forge cookies." For individuals that have been affected by this data breach, Yahoo offers this advice, "We are notifying potentially affected users and have taken steps to secure their accounts, including requiring users to change their passwords." As for the cookie forgery issue, Yahoo remarks, "we invalidated the forged cookies and hardened our systems to secure them against similar attacks." For a complete analysis of the data breach and additional security tips visit Yahoo Security Notice December 14, 2016

 

TECH IN A SECOND     

Read All News...


Upcoming Tech Events

August 12-16, 2019- Visual Studio Live! Microsoft HQ

September 9-11, 2019- Digital Transformation Connect

September 9-11, 2019- WorkSpace Connect

September 17-18, 2019- Developing Modern Web Apps with Azure

September 17-19, 2019- Network Virtualization & SDN Americas

September 25-27, 2019- Talent Connect 2019

October 8-11, 2019- Future in Review Conference

October 23-24, 2019- Android Dev Summit

October 29-30, 2019- Training Seminar: SQL Server Live!

November 4-8, 2019- Microsoft Ignite

November 4-10, 2019- Cloud & DevOps Security Summit

November 5, 2019- Software Defined Operations

November 5-6, 2019- NVIDIA’s GPU Technology Conference

November 13-14, 2019- SMX® East

November 17-22, 2019- Visual Studio Live! Orlando

November 19-22, 2019- Open Data Science Conference


Tech Definitions in the News

Augmented Reality is an enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the real-world, thus enhancing one’s current perception of reality.

Source: https://www.realitytechnologies.com/ augmented-reality/

Chatbot is a piece of software that interacts with users in a conversational way.

Source: https://snatchbot.me/insight/250/ intelligent-chatbots


Deep Learning is a new area of Machine Learning research, which has been introduced with the objective of moving Machine Learning closer to one of its original goals: Artificial Intelligence.

Source: http://deeplearning.net/


DevOps is a set of software development practices that combines software development (Dev) and information technology operations (Ops) to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives. Different disciplines collaborate, making quality everyone's job.

Source: https://en.wikipedia.org/wiki/DevOps


Hybrid Cloud is a computing environment that combines a public cloud and a private cloud by allowing data and applications to be shared between them.

Source: https://azure.microsoft.com/en-us/overview/what-is-hybrid-cloud-computing/


Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications.

Source: https://kubernetes.io/blog/



WWW2 and WWW3 (k8s) are hostnames or subdomains, typically used to identify a series of closely related websites within a domain, such as www.example.com, www2.example.com, and www3.example.com; the series may be continued with additional numbers: WWW4, WWW5, WWW6 etc. 

Source: https://en.wikipedia.org/wiki/WWW2


Did You Know?

Duck Duck Go Search Engine has six different themes to choose from for its search interface.


Tech Gallery

LG SIGNATURE OLED TV R9 - 4K HDR Smart TV
Image Credit: LG