Your Email Is Under Attack — Fight Back! | Infographic by WhoIsHostingThis

December 28, 2016

In late September of 2016, Yahoo! announced a massive security breach whereby hackers stole information from around half of their one billion users. The catch? The security breach occurred in 2014.

Data from the Ponemon Institute shows that the average time it typically takes for companies to identify a breach is 191 days. It then takes, on average, 58 days to contain and resolve a breach. So how did a major email provider like Yahoo! let a security breach of this magnitude occur and consequently go unnoticed for two years? So far, there are no insights into how this happened.

The worst part about this particular breach is the far-reaching effects it may potentially have on Yahoo! users’ privacy. When The New York Times interviewed Alex Holden of Hold Security about this, he explained, “The stolen Yahoo! data is critical because it not only leads to a single system but to users’ connections to their banks, social media profiles, other financial services and users’ friends and family.” That’s true of all email hacks.

Here’s the deal: over 180 billion email messages are sent out every day. They come from Yahoo!, Gmail, Outlook, and other email providers — each of whom has its own method for encrypting email. It’s clear enough from this recent attack that it’s not enough to rely on providers’ encryption....

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.