I'm so glad I switched from yahoo to a private domain.
Yahoo was getting worse and worse over time (commercials all over the place, various important emails not going through or getting received only in my sent box, etc), plus the risk of losing your email address if they compromise your account is very real.
With a domain your own, should they ever compromise your email account, you may lose your mailbox content, but at least you can get your email address back by simply changing your MX records.
haydenaurion: Yep, still doesn't make it any less annoying to have to change my passwords, ugh....
Azhdar: Yeah, it's not safe to use a password for a long time, even if that password is strong+.
I'd say it's the reverse, using a strong password is more important than changing it often.
Even a relatively short 8 characters password with even only lowercase letters that are mostly random has 208827064576 permutations.
Even if they steal the database, if the server uses a strong hashing algorithm that takes, say 0.1s, it would still take 20882706457.6 seconds (241697.991407407 days) to tryout all the permutations.
Even if you find it on average using only half the permutations, that's still 120848.995703704 days (331.093138914 years).
CharlesGrey: So you're saying they just brute-force hacked their way into millions of accounts, not just on Google, but also MS and other major services/sites, without the owners of those services stopping them in the process? Just doesn't seem practical. At best you could do that for an individual account, but not when you're trying to gain access to such massive amounts of user accounts.
Nope, if there's any truth to this whole story, they must have actually accessed Google's/MS's data servers directly. How would you even know that your account was never part of such data leaks? When millions of accounts are stolen, obviously not all of them will actually be used for any shady purposes. I suspect most addresses are simply sold to advertising companies.
Even if they steal the database, if the passwords are hashed and salted, they got their work cut out for them if they want to break the stronger passwords.
Really, for the attackers, it's not about hacking every single password in the database, it's about trying various weak passwords across all the accounts and getting hits with each attempt. By accumulating a list of known emails, they can do that even without hacking the server (it's just way less efficient, especially if there are mechanisms in place to foil brute-force attempts on the login).
Really, the weak link is a weak password. If you use a lame-ass password like Apple9 (something that will pass most password strength checks), no security mechanism can protect you. In my humble opinion, unless you're a senile senior, if you're so complacent about your security that you don't use a strong password for key accounts, you deserve what you get. Every service terms-of-use should have a closure: "We do not cover weak passwords, you're on your own buddy".