PCWorld (USA)

3 billion Yahoo accounts hacked: 5 things you should do to stay safe

The massive data breach can be an opportunit­y to do some cleanup and implement security recommenda­tions. BY LUCIAN CONSTANTIN and BRAD CHACOS

-

If you had a Yahoo account in 2013, your name and password were stolen. Yahoo expanded the scope of its massive data breach ( go.pcworld. com/ymdb) on Monday. In December, the Internet giant announced a hack that affected over a billion accounts, making it by far the largest data breach in history. Now, the company says that every Yahoo account in existence in 2013—more than 3 billion—was breached. The hackers walked away with password hashes that can be easily cracked.

If you’re a Yahoo user you should consider your password compromise­d and should take all the necessary steps to secure your account. You should follow all of Yahoo’s recommenda­tions ( go.pcworld.com/fayr), such as changing your password and

watching for suspicious account activity, but here are a few more advanced tips that you should have in mind.

1. NEVER REUSE PASSWORDS

There are many secure password management solutions ( go.pcworld.com/ spms) available today that work across different platforms. There’s really no excuse for not having unique, complex passwords for every single account that you own. If you do want memorable passwords for a few critical accounts use passphrase­s instead: sentences made up of words, numbers and even punctuatio­n marks.

According to Yahoo, this breach happened in August 2013, at a time when the company hadn’t yet switched to the more secure bcrypt password hashing algorithm. As a result, most passwords that were stolen are in the form of MD5 hashes, which are highly vulnerable to cracking.

If you made the mistake of using your Yahoo password elsewhere and haven’t changed it yet, you should do so immediatel­y and review the security settings of those accounts too. It’s very likely that hackers have already cracked your password and had three years to abuse it.

2. TWO-FACTOR AUTHENTICA­TION EVERYWHERE

Turn on two-factor authentica­tion ( go. pcworld.com/otfa)— this is sometimes called two-step verificati­on—for any account that supports it, including Yahoo ( go.pcworld. com/siiy). This will prompt the online service to ask for a one-time-use code sent via text

message, phone call, email or generated by a smartphone app when you try to access the account from a new device. This code is required in addition to your regular password, but Yahoo also has a feature called Account Key ( go.pcworld.com/fcak) that does away with regular passwords completely and instead requires sign-in approval via phone notificati­ons.

Two-factor authentica­tion is an important security feature that could keep your account secure even if hackers steal your password.

3. DON’T SAVE EMAILS YOU DON’T NEED

Because space is no longer a problem with most email services, users tend to never delete emails. While that’s extremely convenient, it’s not a very good idea, because it allows hackers to easily discover what other online accounts are tied to that address by searching for sign-up or notificati­on emails from various online service providers.

Aside from exposing the link between your email address and accounts on other websites, sign-up and notificati­on emails can also expose specific account names that you’ve chosen and are different from the email address.

You might want to consider cleaning your mailbox of welcome emails, password reset notificati­ons and other such communicat­ions. Sure, there might be other ways for hackers to find out if you have an account on a certain website, or even a number of websites, but why make it easier for them to compile a full list?

4. CHECK YOUR EMAIL FORWARDING AND REPLY-TO SETTINGS

Email forwarding is one of those “set it and forget it” features. The option is buried somewhere in the email account settings and if it’s turned on there’s little to no indication that it’s active.

Hackers know this. They only need to gain access to your email account once, set up a rule to receive copies of all your emails and never log back in again. This also prevents the service from sending you notificati­ons about repeated suspicious log-ins from unrecogniz­ed devices or IP addresses.

Another technique that attackers might use to get a copy of your emails is to change the reply-to address in your email settings, although this is noisier and can be spotted more easily than a forwarding rule.

The reply-to field is included in every email message that you send and allows the recipient’s email client to automatica­lly populate the To field with an address you chose when they hit reply. If a hacker changes the reply-to value with an address that he controls, he will receive all email replies intended for you and these typically include the original emails that you sent.

In order to ensure that you also get

those replies, the attacker can set up a forwarding rule in their own email account and automatica­lly forward those replies to your address.

5. PHISHING FOLLOWS BREACHES

Large data breaches are typically followed by email phishing attempts, as cybercrimi­nals try to take advantage of the public interest in such incidents. These emails can masquerade as security notificati­ons, can contain instructio­ns to download malicious programs that are passed as security tools or can direct users to websites that ask for additional informatio­n under the guise of “verifying” accounts.

Be on the lookout for such emails and make sure that any instructio­ns you decide to follow in response to a security incident came from the affected service provider or a trusted source. Official Yahoo emails are easily recognizab­le in the Yahoo Mail interface because they are marked with a purple Y icon.

In the future, be selective in what personal informatio­n you choose to share and which websites you choose to share it with, even when those websites are legitimate. There’s no guarantee that they won’t be hacked in the future and you simply don’t know how securely they store your details.

In Yahoo’s case, the compromise­d account informatio­n includes names, email addresses, telephone numbers, dates of birth and, in some cases, unencrypte­d security questions and answers. These details can be used to impersonat­e you or to authentica­te you on other websites.

Don’t provide real answers to security questions, if you can avoid it. Make something up that you can remember and use that as answer. In fact, Yahoo doesn’t even recommend using security questions anymore, so you can go into your account’s security settings and delete them.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Australia