Shawn E. Tuma

Video: What to do if you have a Yahoo account (Tuma on WFMJ News)

In Data Breach, Media on September 24, 2016 at 6:55 am

Video interview: Shawn Tuma discusses what to do if you believe your Yahoo account has been compromised – WFMJ NBC News, Youngstown-Warren, Ohio

Full news article: What to do if you believe your Yahoo account has been compromise – WFMJ.com News weather sports for Youngstown-Warren Ohio

______________________

Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Privacy Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.

Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)

In Cyber Issues, Cybersecurity Law, Media, Privacy on September 23, 2016 at 6:00 am

hacked-1The Basic Facts

Yahoo announced that it had a data breach in late 2014 and 500 million users’ account information was stolen. The account information may include names, email addresses, telephone numbers, date of birth, passwords (most encrypted with bcrypt, but apparently not all), security questions, and security question answers.

People who have Yahoo-based services should immediately change their passwords, change their security questions and answers, not use the same password on multiple accounts, and implement dual factor authentication where available.

The Message in the Message

In its notification message, Yahoo subtly invokes the “it’s not our fault, we were the victim of a state-sponsored actor attacking us” defense. I do not blame Yahoo, it works. It uses the words “state-sponsored actor” twice in the first paragraph and twice in the fourth paragraph:

Cybersecurity and #IoT – Hackers Steal Over 100 Cars With a Laptop

In #IoT Internet of Things, Cyber Issues on September 18, 2016 at 4:05 pm

We have been talking about hacking cars on this blog since 2011 (see posts) so the idea of thieves stealing a car by hacking their way into its computer system is no big surprise. This is the reality of cybersecurity in the era of the Internet of Things (IoT), and cars are just one more IoT device. But 100 cars? How did they pull that off?

%d bloggers like this: