Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Yahoo! Vows to Encrypt Website Traffic

SAN FRANCISCO – Yahoo chief Marissa Mayer on Monday said the Internet firm will begin encrypting data to protect users from online snooping.

SAN FRANCISCO – Yahoo chief Marissa Mayer on Monday said the Internet firm will begin encrypting data to protect users from online snooping.

By April of next year, Yahoo will have encryption in place to protect information shared by users of its online properties as well as information exchanged between the Internet firm’s data centers, Mayer said in a blog post.

Google has already begun scrambling most of the traffic at its websites as technology firms grapple with moves by US intelligence agencies to spy on what people are doing and sharing online.

“As you know, there have been a number of reports over the last six months about the US government secretly accessing user data without the knowledge of tech companies, including Yahoo,” Mayer said.

“We will continue to evaluate how we can protect our users’ privacy and their data.”

Mayer said that a more sophisticated encryption system will be in place at Yahoo’s free Web mail service by January 8 to protect user privacy.

Meanwhile, a freshly-filed lawsuit in California accuses Yahoo of violating privacy by scanning Yahoo Mail messages for information to better target advertising.

The suit seeks class action status and asks that Yahoo be ordered to pay $5,000 per user, or treble that amount as permitted by civil law. Yahoo Mail reportedly has about 275 million users, according to the legal filing.

Advertisement. Scroll to continue reading.

“Because Yahoo’s revenue model is so fundamentally dependent on advertising, and because it can increase revenues by building more accurate dossiers, it is strongly incentivized to gather as much personal information on users no matter how sensitive – or illegal,” the lawsuit said.

Yahoo scans incoming email messages regardless which service senders use, according to the lawsuit filed on behalf of a California man on November 15 in federal court in the Silicon Valley city of San Jose.

Yahoo, Google, Microsoft and other Internet titans have vehemently denied ever letting US spy agencies tap directly into their data, maintaining that they have only provide information backed by court-sanctioned requests.

America’s ultra-secret National Security Agency reluctantly finds itself in the headlines amid a wave of disclosures from ex-intelligence contractor Edward Snowden, who has exposed the service’s vast electronic spying operation.

The agency uses super computers, linguists and code-breaking mathematicians to oversee what experts say is the world’s most powerful digital espionage organization.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...