[ad_1]
<div _ngcontent-c14 = "" innerhtml = "
Just a few days ago, the news of a data leak had just arrived. It was a big deal. The archives of Collection 1 contain more than 772 million records. This makes it one of the biggest leaks of all time.
Photo credit: GettyGetty
The headlines were alarming and with good reason. 772 million nothing, that's a lot. 772 million user names and pbadwords disclosed is a security catastrophe and the aftershocks could be felt for a very, very Long time.
Collection 1 is not necessarily as scary as it seemed at first sight. To begin with, its 772 million records came from about 12,000 different files. Many of them were linked to older leaks or hackers and the data has been circulating for some time. Two to three years in some cases.
Speak with KrebsOnSecurityAlex Holden, CTO, revealed that Hold Security researchers had previously collected 99% of the data from this leak from other sources. Collection 1 had actually surfaced on underground hacking forums in October 2018. At that point, it is possible that the responsible person is trying to minimize profits.
The largest image
What is much more frightening than the collection 1 itself is that there are dozens more. They are bought, sold and traded daily on hacking forums.
Screenshots obtained by Brian Krebs during a conversation with the Collection 1 seller – who uses the pseudonym Sanixer – revealed at least 4 other collections. Krebs was informed that all were apparently much more recent than the collection 1.
If freshness was not a problem, Collection 1 was still available for only $ 45. It's only $ 0.00000 per pbadword and a boon for criminals looking for bulk pbadwords to use during phishing attacks or campaigns.
Have you already received? report that a pbadword has been seen in leaksLee Mathews / Forbes
In addition to that, Sanixer is only a seller. Others like him offer similar offers. Whenever a site is hacked or an unsecured database is discovered, its inventories are updated and your accounts are again jeopardized.
How to protect yourself
It's not as easy as changing a pbadword on a single site that has been hacked. You can start by using a service like Have you already received? or HackNotice to determine which of your accounts or pbadwords has been compromised.
Once you're done, it's time to commit to using a pbadword manager. Create a unique and powerful pbadword or pbadphrase and let your app take care of all your other pbadwords. Do not just import them, though. Take the time to visit sites and update your existing pbadwords with those generated by apps.
Yes, it will take time and effort. Yes, it will be worth it. Do not forget that criminals buy pbadwords in bulk for around $ 20 per million. If they have not received yours yet, it is only a matter of time.
That's why you should do one last thing when you are on your pbadword reset circuit.
When you update your pbadwords, enable two-factor or two-step authentication wherever you can. Tons of sites support 2FA these days and activation, it is much harder for the bad guys to break into your accounts.
">
Just a few days ago, the news of a data leak had just arrived. It was a big deal. The archives of Collection 1 contained more than 772 million records. This makes it one of the biggest leaks of all time.
The headlines were alarming and with good reason. 772 million nothing, that's a lot. 772 million usernames and pbadwords disclosed are a disaster for security and replicas could be felt during a very, very Long time.
Collection 1 is not necessarily as scary as it seemed at first sight. To begin with, its 772 million records came from about 12,000 different files. Many of them were linked to older leaks or hackers and the data has been circulating for some time. Two to three years in some cases.
Sending to KrebsOnSecurity, CTO Alex Holden revealed that Hold Security researchers had previously collected 99% of the data from this leak from other sources. Collection 1 had actually surfaced on underground hacking forums in October 2018. At that point, it is possible that the responsible person is trying to minimize profits.
The largest image
What is much more frightening than the collection 1 itself is that there are dozens more. They are bought, sold and traded daily on hacking forums.
Screenshots obtained by Brian Krebs during a conversation with the Collection 1 seller – who uses the pseudonym Sanixer – revealed at least 4 other collections. Krebs was informed that all were apparently much more recent than the collection 1.
If freshness was not a problem, Collection 1 was still available for only $ 45. It's only $ 0.00000 per pbadword and a boon for criminals looking for bulk pbadwords to use during phishing attacks or campaigns.
Have you already received? report that a pbadword has been seen in leaksLee Mathews / Forbes
In addition to that, Sanixer is only a seller. Others like him offer similar offers. Whenever a site is hacked or an unsecured database is discovered, its inventories are updated and your accounts are again jeopardized.
How to protect yourself
It's not as easy as changing a pbadword on a single site that has been hacked. You can start by using a service like HaveIBeenPwned? or HackNotice to find out which of your accounts or pbadwords has been compromised.
Once you're done, it's time to commit to using a pbadword manager. Create a unique and powerful pbadword or pbadphrase and let your app take care of all your other pbadwords. Do not just import them, though. Take the time to visit sites and update your existing pbadwords with those generated by apps.
Yes, it will take time and effort. Yes, it will be worth it. Do not forget that criminals buy pbadwords in bulk for around $ 20 per million. If they have not received yours yet, it is only a matter of time.
That's why you should do one last thing when you are on your pbadword reset circuit.
When you update your pbadwords, enable two-factor or two-step authentication wherever you can. Tons of sites support 2FA these days and activating it makes it much more difficult for criminals to enter your accounts.