NewNow you can hear Fox News article!
Your personal data is collected by almost every site or app you see. The world is more data than ever before it is now the most important property, which is more valuable than oil. Your shopping history is logged in, your search history is captured and your phone number, email address and ID are all stored.
But this does not mean that all this data is safe. If you have ever received spam calls, fishing emails or fake support calls, your personal data is out of there.
And if you want evidence of how poor your data is treated, a new open database provides a Stark Reminder. More than 16 billion login credentials collected from years of previous data violations have been compiled in one of the largest collected archives of cybercity events, according to a report.
Sign up for my free cyber report
Take my best technical tips, immediate safety alerts and exclusive deals directly to your inbox. In addition, you will get immediate access to the survival guide of my final scam – free of charge when you join.
10 hints are your personal data being sold online
A woman working on her laptop (Kurt “Cybergui” Notson)
What you should know about 16 billion password data breech affecting Google, Apple and Facebook
Cybernews The exposed database describes as “a blueprint for mass exploitation”. The records include login credentials from popular platforms such as Google, Facebook and Apple.
Security researchers emphasize that this is not the result of a new, single violation. Instead, it is a large collection of already stolen credentials from various previous leaks, phishing scams and third-party data exposure, some of which were forgotten, less or re-designed.
Bleepingcomputer, A cyber security site that reviewed the collection confirmed that the data appears to be collected from older violations rather than a new event. This makes the scope of the exposure particularly dangerous as the attackers can use this central trove for target attacks, including credential stuffing.
When the attackers have access to such a huge pool of user names and passwords, credentials become very easy. This technique involves using stolen login details on many sites, exploiting the fact that many users reuse similar credentials. Therefore, even though your account was not part of a recent violation, you may be at risk if your old credentials are part of this new indexed compilation.
Depiction of a hacker at work (Kurt “Cybergui” Notson)
DoubleclickJacking Hack takes double-clix
How Google and Meta are responding to large -scale password leakage
We reached Apple, Google And meta For comment.
A Google spokesperson said that the problem was not stems from Google data breeches and Google firmly encourages users to adopt more secure, password -free authentication methods, such as such as OmnipotentThey also suggest using a tool such as Google Password Manager, which securely stores your password and informs you when they are involved in a violation, allowing you to take immediate action.
A Meta representative said, “We have no statement to share at this time as we are still looking at it,” but offered some Tips to secure your accountA Safety check-up equipmentAnd this Introduction to passkeys On Facebook.
We did not hear back from Apple before our time limit.
What is Artificial Intelligence (AI)?
A Google smartphone (Kurt “Cybergui” Notson)
Malware exposes 3.9 billion passwords in huge cyber security threat
5 Essential methods you can protect yourself after apple, google data breech
With the increasing credential leaks becoming an increasing threat, the protection of your data requires a mixture of smart safety habits and reliable equipment. Here are five effective methods to protect your information.
1. Use password manager: Infostealer Malware often targets the passwords directly saved in web browsers, making them easy goals. Instead of relying on your browser to store credentials, use a dedicated password manager who provides zero-knowledge architecture and military-grade encryption to protect your data. The best option works in all your devices and browsers, offers safe share, monitoring data violations, and even generates health reports on your password. Find out more about me Best expert-reviewed password manager of 2025 here.
2. Enable two-factor authentication (2fa): Even if your credibility is stolen, 2fa The need for the second form of verification adds an additional layer of protection, such as a certification app or a code from biometric confirmation. Cyber ​​criminals rely on theft user names And to break the password accounts, but with 2fa being capable, they cannot get access without additional safety steps. Be sure to enable 2FA on important accounts such as email, banking and work related logins.
3. Use strong antivirus software and be cautious with downloads and links: Infostealer Malware often spreads through malicious downloads, fishing emails and fake websites. Avoid downloading software or files from uncontrolled sources, and always a double-check link before clicking them. The attackers disguised malware as legitimate software, game cheating, or cracked applications, so it is best to stick to the official websites and app stores for download.
The best way to protect yourself from malicious links is to install antivirus software on all your devices. This security can also make you alert for email and ransomware scams, keeping your personal information and digital assets safe. Get my pics for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices,
4. Keep the software updated: Cyber ​​criminals exploit old software to give malware. Keep your operating system, browsers and safety software up to date This ensures that the known weaknesses are patches. Enable automatic updates whenever possible, and install iconic antivirus or endpoint protection software that can detect and block the infostealer hazards before compromising with your system.
5. Consider a personal data removal service: The massive leakage of 16 billion credentials suggests how far your personal information can spread and how easily it can revive in the hacker database after years. Even if your passwords were part of an old violation, data such as your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from these sites. Although no service can guarantee the total removal, they significantly reduce your digital footprint, making it difficult to transate or target cross-reference leaked credentials for scammers. These services monitors your personal information over time and remove it automatically, which gives me peace of mind in today’s danger scenario. See my top pics for data removal services here.
get Free scan To find out if your personal information is already on the web
Caos Rainmware hit Optima Tax Relief, leaked 69GB data
Kurt’s key to Techway
Passwords are no longer enough. This is why I have always admitted that technical companies should fully phase them and need two-factor authentication throughout the board. Password, once the foundation of online identification, is now one of its weakest link. Companies like Google and Meta are already forming systems that move forward from them. Equipment is available. The message is clear. You do not need to wait for a violation to take safety seriously.
Click here to get Fox News app
Do you think tech companies are investing enough in their cyber security infrastructure? Write us and tell us Cyberguy.com/Contact,
For my tech tips and security alert, subscribe to my free cybergui report newsletter Cyberguy.com/newsletter
Ask Kurt a question or tell us which stories you want to cover us
Follow the kurt on your social channels
Answers to the most asked cybergui questions:
New from Kurt:
Copyright 2025 cyberguy.com. All rights reserved.