16 billion passwords filtered in a massive data violation

16 billion passwords filtered in a massive data violation

NEWNow you can listen to News articles!

Your personal data is collected by almost all sites or applications you visit. The world is more hungry for data than ever because now it is the most important asset, even more valuable than oil. Your shopping history is recorded, your search history and phone number, email address and ID are stored.

But that does not mean that all these data are safe. If you have ever received a spam call, a Phishing email or a false support call, your personal data is available.

And if you want a evidence of how bad your data is treated, a recently discovered database offers a marked reminder. According to a report, more than 16 billion login credentials have been compiled, compiled from years of previous data infractions in one of the largest aggregate files of cybersecurity incidents ever seen.

Register for my free Cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instant access to my definitive scam survival guide, free when you join.

10 Personal data signs are sold online

Woman on the laptop

A woman who works on her laptop (Kurt “Cyberguy” Knutsson)

What you need to know about the violation of 16 billion password data that affects Google, Apple and Facebook

Cybernews Describe the database exposed as a “plan for mass exploitation.” Records include login credentials of popular platforms such as Google, Facebook and Apple.

Security researchers emphasize that this is not the result of a new violation. On the other hand, it is a massive collection of previously stolen credentials of several past leaks, phishing scams and exhibitions to third -party data, some of which were forgotten, underruded or resolved.

Bleeping computer, A cybersecurity site that reviewed the file, confirmed that the data seems to be aggregate of older infractions instead of a new incident. This means that the exposure scope is particularly dangerous because attackers can use this central treasure for specific attacks, including credentials.

Credential filling becomes much easier when attackers have access to a large group of user names and passwords. This technique implies the use of login details stolen in multiple sites, exploiting the fact that many users reuse the same credentials. So, even if your account were not part of a recent violation, it could still be at risk if your old credentials are part of this newly indexed compilation.

hacker

An illustration of a hacker at work (Kurt “Cyberguy” Knutsson)

Doublecickjacking Hack double click on account acquisitions

How Google and Meta are responding to mass password filtration

We communicate with Apple, Google and Meta to comment.

A Google spokesman declared that this problem did not derive from a rape of Google data and that Google continues to strongly encourage users to adopt safer and safer authentication methods without password, as master key. They also suggest using tools such as Google Passions Managerwhich safely stores your passwords and notifies you when they have been involved in a violation, allowing you to take immediate measures.

A Meta representative said: “We have no statement to share at this time, since we are still investigating this”, but we offered some Tips to ensure your accountto Security Control Tooland the Introduction of Passkeys On Facebook.

We do not receive Apple news before our deadline.

What is artificial intelligence (AI)?

Google phone

A Google smartphone (Kurt “Cyberguy” Knutsson)

Malware exposes 3.9 billion passwords in a great threat of cybersecurity

5 essential forms in which it can be protected after the violation of Apple data, Google

Since credential leaks become a growing threat, protecting your data requires a combination of smart security habits and reliable tools. Here are five effective ways to maintain your safe information.

1. Use a password administrator: Infotealer malware often addresses passwords saved directly on web browsers, making easy objectives. Instead of trusting your browser to store credentials, use a dedicated password administrator that offers zero knowledge architecture and military degree encryption to keep your data safe. The best options work on all their devices and browsers, offer a safe exchange, monitor data violations and even generate health reports on their passwords. Get more details about me The best password administrators reviewed by experts from 2025 here.

2. Enable two factors authentication (2FA): Even if their credentials are stolen, 2fa Add an additional safety layer to require a second form of verification, such as a code of an authentication application or biometric confirmation. Cybercriminals are based on user names and stolen passwords to divide in accounts, but with 2FA enabled, they cannot obtain access without the additional security step. Be sure to enable 2FA in important accounts such as email, banking and session related to work.

3. Use strong antivirus software and be careful with downloads and links: Infotealer malware often extends through malicious downloads, pHishing emails and false websites. Avoid downloading software or files from non -reliable sources and always check the links before clicking on them. The attackers disguise malware such as legitimate software, games of games or cracked applications, so it is better to meet the official websites and application stores for downloads.

The best way to safeguard the malicious links is to have the antivirus software on all its devices installed. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Obtain my elections for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Keep updated software: Cybercriminals exploit obsolete software to deliver malware. Maintaining your operating system, browsers and updated safety software Ensures that known vulnerabilities are paveled. Enable automatic updates whenever possible and install a good reputation antivirus or final point protection software that can detect and block infants infants threats before compromising your system.

5. Consider a personal data disposal service: The mass leak of 16 billion credentials shows to what extent your personal information can extend and how easily resurface years later in the aggregate databases of hackers. Even if their passwords were part of an ancient violation, data such as their name, email, telephone number or address can still be available through Data Broker sites. Personal data elimination services can help reduce their exposure when scrubbing this information from hundreds of these sites. While no service can guarantee total elimination, drastically reduce your fingerprint, which makes it more difficult for scammers to cross -filled reference credentials filtered with public data to impersonate you or go to you. These services automatically supervise and eliminate their personal information over time, which gives me peace of mind in today’s threat panorama. See my best selections to obtain data disposal services here.

Get a free scan To find out if your personal information is now available on the web

Chaos ransomware reaches Optima Tax relegate, 69 GB of data filtration

Kurt key takeway

Passwords are no longer enough. That is why I have always believed that technology companies should eliminate them completely and require two factors authentication in all areas. Passwords, once the basis of online identity, are now one of its weakest links. Companies like Google and Meta are already building systems that go beyond them. The tools are available. The message is clear. You don’t need to wait for a violation to start taking security seriously.

Click here to get the News application

Do you think technological companies are investing enough in their cyber security infrastructure? Get us knowing in Cyberguy.com/contact.

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter

Ask Kurt a question or let us know what stories we would like to cover

Follow Kurt in his social channels

  • Facebook
  • YouTube
  • Instagram

Answers to Cyberguys most facts:

  • What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
  • What is the best way to stay private, safe and anonymous while navigating the web?
  • How can I get rid of robocalls with data elimination applications and services?
  • How do I eliminate my private internet data?

New Kurt:

  • Try the new Cyberguy games (crosswords, words searches, trivia and more!)
  • Cyberguy exclusive coupons and offers

Copyright 2025 Cyberguy.com. All rights reserved.

Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of ​​the story or comment on Cyberguy.com.

Leave a Reply

Your email address will not be published. Required fields are marked *