YahooXtra Victim of Twin Different though Inter-related Malevolent Assaults
According to Telecom New Zealand, twin different though potentially associated sinister assaults have victimized YahooXtra, a widely-used e-mail service, published The New Zealand Herald dated February 11, 2013.
It maybe noted that YahooXtra was one website in New Zealand which happened to be collaboration between Telecom New Zealand and Yahoo! 7.
The security violation that started early on 9th February 2013, witnessed electronic mails dispatched to all addresses listed inside Internauts' address books, telling that recipients should follow a given web-link taking them onto certain Internet ad.
In response Telecom stated that the assaults understandably likewise impacted other consumers having accounts with Yahoo! mail through the e-mail client's servers.
It also stated that the first assault, which happened to be a phishing attack, had a few consumers get e-mails posing as messages from known individuals and having a web-link leading onto one shady site.
If this web-link was clicked, the result was similar e-mails which got dispatched to a specific id on the victims' contact lists.
The other assault involved hijacking a few consumers' security thus enabling electronic mails getting dispatched from their A/Cs devoid of them knowing anything.
Telecom believed the attacks affected certain percentage of its nearly 500,000-numbered clients.
Retail CEO (Chief Executive Officer) at Telecom, Chris Quin stated that the company regretted any inconvenience else agony its customers faced, while was assuring them it was conducting everything possible via teaming with Yahoo! towards solving the problem. YAHOO NEWS published this dated February 11, 2013.
Co-Founder and CTO (Chief Technology Officer) Thom Hooker at an area e-mail security firm, SMX said that the phishing assault was one reminder about the extent of importance in following best practices while handling electronic mail security. The best practices included: not following arbitrary web-links within e-mails; incase of doubt, calling the actual e-mail sender for substantiating the message; running anti-virus programs that were up-to-date; making sure every required software update was loaded; selecting protected passwords for the websites visited, while resetting them after each 3-month period; and lastly, not utilizing the same password for all the websites visited, Hooker listed and scoop.co.nz published it dated February 11, 2013.
» SPAMfighter News - 15-02-2013