1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.

Yahoo users can sue over data breaches, judge rules

Discussion in 'General Malware And Security' started by starbuck, Mar 13, 2018.

  1. starbuck

    starbuck Administrator - Malware Removal Specialist Administrator

    Sep 26, 2009
    Midlands, UK
    Operating System:
    Windows 10
    AMD Athlon II x2 250 Processor 3.00GHz
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    Verizon, which now owns the web giant, sought to dismiss the case.


    Yahoo customers affected by three massive data breaches that resulted in the theft of more than three billion users' data are allowed to sue the company, a judge has ruled.

    California judge Lucy Koh rejected a bid by Verizon, which bought the internet giant last year, to dismiss a large portion of the claims, including breach of contract, deceit and concealment, and negligence.

    At the heart of the case, Yahoo was accused of taking too long to notify users of the breaches, which put customers at risk of identity theft and fraud.
    The filing, dated Friday, cited several customers whose data was stolen by criminals and used for filing fraudulent tax returns or credit card charges.
    Other customers had to pay out to credit bureaus to freeze their accounts.

    Koh said that customers may have "taken measures to protect themselves" had they known about the breaches sooner.

    The case began in 2016 after the company admitted it was hacked in 2014, in which 500 million user accounts were stolen.

    Later in the year, the company revealed that it was hacked again -- a year earlier in 2013 -- in which one billion accounts were stolen.
    Yahoo later said that all its three billion users were affected by that breach.

    A separate attack on the company's systems allowed hackers to steal portions of the company's source code.
    Attackers used that code to generate cookies, allowing access to accounts without requiring a user's password.


Share This Page