Daswani et al., 2021 - Google Patents
The Yahoo breaches of 2013 and 2014Daswani et al., 2021
- Document ID
- 14546724966575052521
- Author
- Daswani N
- Elbayadi M
- Daswani N
- Elbayadi M
- Publication year
- Publication venue
- Big Breaches: Cybersecurity Lessons for Everyone
External Links
Snippet
In 2016, Yahoo disclosed to the public that it had been breached in 2014. Yahoo's 2014 breach exposed the names, email addresses, telephone numbers, birthdates,“hashed” passwords, and, in some cases, security questions of over 500 million users. While …
- 238000000034 method 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bonner | Cyber risk: How the 2011 Sony data breach and the need for cyber risk insurance policies should direct the federal response to rising data breaches | |
Shukla et al. | Data security | |
Daswani et al. | The Yahoo breaches of 2013 and 2014 | |
Chen et al. | Data breaches in corporate setting | |
Mukherjee | Overview of the Importance of Corporate Security in business | |
Butt et al. | Cyber threat ransomware and marketing to networked consumers | |
Zargari et al. | Policing as a Service in the Cloud | |
Sonowal et al. | Introduction to phishing | |
Taherdoost | E-Business Security and Control | |
Kumar et al. | An analysis of cyber security threats in digital marketing | |
Saad et al. | Achieving trust in cloud computing using secure data provenance | |
Chopra et al. | The need for information security | |
O’Regan | Computer Crime | |
Sukesh et al. | AN ANALYSIS OF THE INCREASING CASES OF DATA BREACHES IN INDIA. | |
Okoru et al. | Cybercrime, Crime Security and National Development in Nigeria | |
Teymourlouei et al. | Blockchain: enhance the authentication and verification of the identity of a user to prevent data breaches and security intrusions | |
Maurushat et al. | Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware | |
Santoso | Consumer protection for online banking scams via e-mail in Malaysia | |
Haunts et al. | What Are Data Breaches? | |
Prabhu et al. | A study of the challenges faced by the hotel sector with regards to cyber security | |
McKnight | The evolution of ransomware and breadth of its economic impact | |
Vikram et al. | Cyber-Crime and Their Impacts | |
Gunawan et al. | E-commerce Security Issues for SMEs: A Systematic Literature Review | |
Marta et al. | Risks and Vulnerabilities in Online Commerce | |
Samanta | Design of data leakage prevention model using anonymization technique and time restriction |