If you have your resume posted on Monster.com you should have a read through this article, it's a bit long, but it explains what happened there, and somethings that you should be watching out for.
The looting of Monster goes back weeks, and maybe months, so IF you had your resume out there, you need to use a double dose of suspicion when you get emails to the address you provided. Some unwary users of Monster have had their identity stolen and their back accounts were suddenly emptied. Monster's database was looted, and personal data was taken to craft extremely convincing emails that then installed trojans and ransomware on PCs. It looks like 1.6 million records were stolen, so yours might be one of them. Our Malware Researchers have been going back and looking at everything again because of all the press lately and they have found some evidence that they were probably attacking the CareerBuilder site as well. So keep an eye out for that too.
Monster itself was not hacked. But smart attackers blended some noxious elements together: stolen information, personalized phishing email, combined with trojan malware and so called 'money mules' (middlemen who transfer money from a phished bank account to a foreign, difficult to trace account.) What happened is that "by gaining unauthorized access to employer accounts, the software was obtaining job seeker contact information," Monster said in a recent alert. The data-stealing Trojan was hard coded to look at U.S. residents only.
One of the key points in this article is that the trojan is hard coded to look for US addresses, and only about 5000 of the users affected live outside the USA. Still, some caution and common sense applies, never give out sensitive information on the Internet, be suspicious of unsolicited emails and files.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9032518&pageNumber=1