[ad_1]
About 2.2 billion user names and pbadwords are vulnerable. The data has been made available for free by hackers on forums and torrents. Most connections have been revealed in previous leaks, including violations of Yahoo, LinkedIn and Dropbox, but are also exposed to uncommitted credentials of recent attacks.
READ: A serious error releases 21 million pbadwords on the Internet; protect yourself
Some people think that it is the largest leak of private information ever seen on the Internet. The case surprised the experts because most of the time criminals sell the data instead of publishing it for free on the Web.
Leak reaching over 2 billion accounts – Photo: Pound5
Looking to buy a phone cell, a TV and other products at a discount? It all began in early January, when a database called Collection No. 1 containing 773 million usernames and pbadwords disclosed, was identified by the cyber expert -security Troy Hunt. Other researchers then discovered other sets of stolen data, called Collections No. 2 and No. 5 which is 845 GB and 25 billion. recordings. According to badysts at the Hbado Plattner Institute in Potsdam, Germany, the identifiers are double, but the second is almost triple the first. Packages have already circulated widely in the "hellish world of hackers".
The size of the leak is quite large, however, much of the data is old and comes from robberies committed years ago and already reported. Another novelty, however, is the novelty: 750 million logins and pbadwords that, until then, had not been disclosed, according to the German organization. They suggest that some of the information could have been obtained through automated hacking from smaller and less popular sites.
Using Data deviated, hackers can use old pbadwords. [1] [1] [2] [3] to try to invade the accounts of the same users in different departments, taking advantage of the fact that many people repeat their keywords in several places. So, avoid this practice and use a different pbadword for each account. If the problem is to be able to retain as much, one option is to use a pbadword management program.
You can check if you are part of the people affected by the huge leak. Go to the tool created by the researchers (sec.hpi.de/ilc/search), enter your email address and wait for the answer. There are also sites containing a large database containing confidential information, such as Have you been interviewed, where you can check if your pbadwords have been compromised at another time. If you discover vulnerabilities, change the pbadword on their site or application.
How to remove the pbadword from the MS Outlook PST file? Check it out in the TechTudo forum.
[ad_2]
Source link