Posts Tagged ‘Yahoo!’

Yahoo!After months of hearings and negotiations, British Telecom (BT) has decided to refuse the services of Yahoo!.

Translated to other servers will be implemented over the next few weeks. The new service will include a built-in solution for blocking spam and virus.

Since February 2013 the operator BT customers have complained that their accounts on Yahoo! constantly hack hackers, exciting other people’s accounts and using them to send spam e-mails. In March, a joint investigation by the two companies, the purpose of which was to identify weaknesses in the defense. However, attackers continued their work on the forums and have started to appear more and more complaints. (more…)

Yahoo!The vulnerability in WordPress became the reason of a data leakage of users of mail of Yahoo!

Swindlers got access to sessional cookies-files of users of the Yahoo! service.

Experts from BitDefender found that compromised user account email service Yahoo! occurred because the gaps that existed in WordPress.

Note that the hole was fixed in April 2012. On the domain of developers Yahoo! developer.yahoo.com was posted blog WordPress, administrators have not updated it in a timely manner. Thus, after his compromise hackers could gain access to all the session cookies-file for the domain yahoo . com .

Scammers create fake website designed based news portals MSN / NBC, which was placed on two domains: com-im9.net and com-io4.net. Fake Resources containing malicious code Javascript-library which steals user session cookies-files. (more…)

E-mail services vulnerable

E-mail Services

Companies Google, Microsoft, Yahoo!, PayPal and eBay recently eliminated a gap in a cryptographic system to e-mail services, which allowed hackers to forge a digital signature and send them messages purportedly from the employees of these companies.

The vulnerability exists in the system DomainKeys Identified Mail (DKIM), which is used by e-mail providers to make special reports cryptographic signature. This signature confirms the domain name of the sender, which simplifies the process of filtering malicious messages.

DKIM implementation issue was that if the amount of the signature key is less than 1024 bits, if sufficient computing power can be forged. US-CERT has confirmed in the notice that the keys are shorter than 1.024 bits do not provide a sufficient level of security, and that all the keys up to RSA-768 can be forged. (more…)