Skip to main content
banner image
venafi logo

Yahoo! Breach Expands: 3 Billion Reasons Why Encryption Security Matters

Yahoo! Breach Expands: 3 Billion Reasons Why Encryption Security Matters

Yahoo Breach Impacts 3 Billion
October 4, 2017 | Emil Hanscom

Yesterday, Yahoo! revealed that all 3 billion of it’s users were affected by the data breach from August 2016; the company originally said had only impacted 1 billion users. To move such a massive amount of data, Venafi experts believe the attackers behind the Yahoo! Breach almost certainly exploited a blind spot in the organization’s encrypted tunnels.

Unless they have strong cryptography practices, it’s nearly impossible for organizations to detect unauthorized, encrypted traffic coming in or out of their network. It’s also entirely possible that the attackers that perpetrated the 2013 breach retained access to the Yahoo! network and attacked again in 2014.

Kevin Bocek, chief security strategist for Venafi, discussed the expanded Yahoo! data breach with Sky News. Watch the video below to hear his thoughts on the attack and how organizations should handle encryption in the future.

 

How well have you secured your encryption assets?

Like this blog? We think you will love this.
graphic of a robber repelling down from the ceiling to steal a password off a cell phone
Featured Blog

Imperva: Timeline of an API Key Compromise

While there are obviously a few gaps in the narrative (and a LOT of spin, plus

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat