Cyber security news for all


    Yahoo pays compensation for hacker attack affected users

    Yahoo has to pay compensation of about 120 million dollars to users who are affected by the previous hacker attacks. The company and the representatives of the approximately 200 million users from the USA agreed on this payment in a comparison. Approval from the responsible district court in California is still pending. The parties had already agreed on a compensation payment of 50 million dollars in October 2019. However, US judge rejected the comparison in January because not all possible costs incurred by the injured party had been taken into account.

    Yahoo Pays Legal Fees For Hacker Victims

    In the new comparison, these should now be taken into account. According to this, Yahoo pays legal fees of up to 30 million and costs and expenses of no more than 2.5 million. In addition, the victims are paid credit monitoring for at least two years. Those who already have such credit monitoring will receive a flat fee of 100 dollars in compensation. Added to this are the assumption of costs incurred in connection with identity theft, as well as costs for downtimes and the usage fees paid for the service.

    Yahoo hacker attack

    Apply For Compensation Online

    Users of the Yahoo email service who live in the USA and whose data was compromised in the wake of the extensive leaks between can now apply for compensation online. Due to the fact that credit card details have also been leaked, as an alternative to financial compensation, those affected can also apply for credit monitoring. This would allow unauthorized access or debits to be discovered.

    Those affected can choose two options from Yahoo’s online form: You can either apply for a credit monitoring service paid by Yahoo for at least two years, or you can request financial compensation. According to Yahoo, this should amount to at least 100 dollars per person, but could also be higher: up to 400 should be possible. The latter, however, only on condition that the applicant documents exactly what costs the  incurred as a result of the leaks-based attacks or due to precautionary measures taken after the leak, for example in the form of credit monitoring that has already taken place.

    Recent Articles

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox