Huge leaks affect 800 million emails and passwords. see if she was touched – 17/01/2019



[ad_1]

A staggering number of nearly 800 million emails and pbadwords have recently been disclosed on the Internet. According to Wired, security researcher Troy Hunt found that the breach contained more than 12,000 files, containing 87 gigabytes of data, published on a hacker forum.

The Giant Failure 772 904 .997 unique electronic addresses plus more than 21 million unique pbadwords . This is considered one of the biggest security breaches involving email leaks in history.

The figures above, by the way, do not reflect the actual amount of data disclosed. Indeed, the researcher made an effort to clean the duplicate data and unusable. In raw form, the number of e-mail addresses and pbadwords increased from 2.7 billion including more than a billion unique combinations of e-mail addresses and words pbadword.

Troy Hunt, who made the breakthrough, maintains the site Have I been pwned . On the platform you can find out if your e-mail address or pbadword has already been compromised during a breakthrough in history . It even indicates the number of leaks identified in your email.

The hack

The call of the No. 1 collection, this break is the largest that Hunt has ever seen. And that does not only involve the escape of a service. The information is considered a "breach": it includes more than 2,000 databases disclosed.

]

Are you sure? Here's how to protect yourself more online

Read More

"It seems to be from a random collection of websites only to maximize the number of identification information made available to hackers. "There are no obvious patterns for maximizing exposure," said Hunt to Wired.

It s & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; This is one of the largest violations of history – other incidents of this type have already occurred, such as a spill from Yahoo that allegedly affected 3 billion people Users Although the data involved do not contain any sensitive information such as CPF and maps, the fault revealed by the researcher is serious and historical.

For example, more than 140 million emails and more than 10 million pbadwords disclosed are new to the Hunt database.

How will I be affected?

The filtered list appears to be designed to be used in so-called infill filler attacks, in which hackers introduce combinations of e-mail address and word-of-mouth. pbades on a site or a service . These are usually automated processes, which rely primarily on people who reuse the same pbadwords on various websites.

] The gift is not stolen: the year that we forced to take better care of our data

By the escape again appeared in one of the most cloud storage sites Today's popular – MEGA – and not just the deep Web, Mr. Hunt considers that the problem is serious. The data was not even for sale, but available for anyone who wanted it. The way they were organized is also worrying.

"These are all pbadwords in the clear.If we take into account a leak like Dropbox, there were 68 million email addresses, but the pbadwords were encrypted, which makes them very difficult

"This collection can generate a list of e-mails and pbadwords: you just have to create."

That is, for the data to use It is enough for the perpetrator to magnify the screen and click.The consequences of access to the account can range from a very productive phishing, because criminals can send infected emails to the victim's contacts, attacks designed to steal the entire digital identity or the victim's money, or compromise the data of social networks, "said Sergey Lozhkin, security expert at Kaspersky Lab.

How to Protect Yourself

To Protect Yourself from Violation, You May Follow

– If You Have Been Explained, Change the Pbadword for Your Accounts

– Si your e-mail address and pbadword were exposed by accessing page "did I receive an answer"

– Use strong pbadwords for larger or sensitive accounts (such as banking services via the internet or social networks)
– Consider using a pbadword manager
– Enable authentication of two factors where possible in services [19659024] Adhesive tape on the camera of the laptop? Yes, it can work

[ad_2]
Source link