With the information obtained, hackers can point to accounts of other mail services
As you may have already heard, Yahoo confirmed on Thursday that at least 500 million user accounts have been affected by a massive hack. Here are some answers to basic questions you may have about filtering.
What information has been hacked?
Yahoo’s information security chief Bob Lord said in a blog that the stolen information “may” include names, email addresses , phone numbers and birth dates. Lord also said that the information in the passwords – though not passwords in plain text – may have been stolen, as well as some answers to security questions.
What about the financial information?
Yahoo is still investigating, but so far Lord said that financial information, such as credit card numbers and payment card data, was not reached; that the information is stored in a separate system.
Still, users should review their credit ratings to see if new accounts have been prepared in their name since this type of personal information can be used as a key to obtain enough information to open an account.
How do I know if I have been attacked by hackers?
You can contact yahoo if you feel you have been attacked by hacker else usually Yahoo will contact users who may be affected by email. Also, beware of fraudulent emails that may refer to the attack on Yahoo to try to extract more personal information, asking you to “verify” the information.
What should I do in my Yahoo account?
Users will be asked to change their passwords. All unencrypted security questions and answers will be invalidated, which means that users will have to submit new ones. Yahoo is also asking that those who have not changed their password since 2014 do so just in case.
Is there anything else I should do? Yes. Paul Stephens of the Privacy Rights Center advises Yahoo users to think about the repercussions this may have on their accounts other than Yahoo. Any password, username or security methods that you have used in your Yahoo account may now be in the hands of hackers , who are likely to try to use this information on other sites.