• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   The Ghost of Yahoo! Accounts Past

The Ghost of Yahoo! Accounts Past

  • Posted on:July 15, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

How to Secure Your Multiple Online Accounts thumbnail

 

Could your Yahoo! account be up for grabs?

Yahoo! recently announced that it will make inactive Yahoo! accounts available for the public. Starting today July 15, anyone can grab Yahoo! IDs that have been unused for the past 12 months.

So what does this all mean?

Now is the time to revisit the past and clean house. You should check if you have any unused Yahoo! accounts. While you might be ready to let go of your high school era Yahoo! ID, it might still have important or sentimental emails that could become inaccessible after the deadline.

It’s also the time to check and update your information for your online accounts. Your inactive Yahoo! email addresses might still be your recovery contact for your online accounts. This can become a problem in instances of password recovery. Strangers might be able to rest and get into your accounts if they receive the recovery email that was meant for you.

You should also inform your contacts of your deactivated Yahoo! ID. They might message or email the new owner and inadvertently share sensitive information. At best, this honest mistake could end up as a funny anecdote you can tell at parties; at worst, your online identity could be stolen. On the flip side, you should be verifying Yahoo! IDs before communicating with them. Your Yahoo! contacts could very well be strangers.

Check out our e-guideĀ How to Secure Your Multiple Online AccountsĀ for tips to better secure your (active) online accounts. You can then use our e-guideĀ Keeping Things Private OnlineĀ to make sure all your data remains private.

Related posts:

  1. With Online Accounts under Constant Attack, Strong Passwords are Your First Line of Defense
  2. Cybercriminals selling PayPal accounts for personal gain
  3. Think changing your Yahoo password is enough? Think again…
  4. Yahoo Breach: It’s Time to Keep Those Passwords Safe

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.