560 Million Email Logins Discovered in Anonymous Database
Researchers from Kromtech Security discovered an anonymous online database containing more than 560 million email addresses and passwords. In total, over 243 million unique email addresses were compromised—and the worst part is, no one knows who did it.
The information within the database isn’t necessarily “new” data. It is a collection of login credentials that have been leaked in previous hacks such as LinkedIn, MySpace, Adobe, Tumblr and DropBox. Some of these breaches occurred several years ago, making the information in the database outdated and fairly useless.
But some people go years without changing their passwords. If you have been using the same password for your email accounts, file sharing accounts, social media accounts, payment card accounts or online bank accounts, now may be a good time to change it. This giant database was fairly easy to access, which means countless hackers could already have your information.
One contributor to the database discovery was Troy Hunt, a cybersecurity expert who wrote a guide on combo lists earlier this month. Combo lists contain email addresses and passwords from a variety of locations.
Hunt created a site called Have I Been Pwned? that allows people to enter their email addresses and determine if their information has been leaked. If your information has been compromised, the site will let you know how many times it was shared. Change your password and check back in a few months to make sure the number of “breached sites” has not increased.
This entry was posted in Credit Card News and tagged data breach , identity theft , identity fraud , cybersecurity , compromised data , stolen information , Troy Hunt , stolen passwords , compromised information , stolen emails , Have I Been Pwned , leaked information , compromised emails , Kromtech Security
The information contained within this article was accurate as of May 17, 2017. For up-to-date
information on any of the terms, cards or offers mentioned above, visit the issuer's website.