Breach of personal data
Breach of personal data by online hackers has jeopardized the online user’s life in a great way. It’s usually the weakest link that hackers go for at first to gain access to your online accounts.
Over 1.4 Billion plain texts leaked passwords dispersed online
Reusing the same password across multiple channels gives hackers opportunity to break into the online user’s other online accounts by using the credentials gathered via breach of personal data.
Researchers from security firm 4iQ have now discovered a fresh group of the database on the dark web (released on Torrent as well) that comprises of a massive 1.4 billion usernames and passwords in clear text.
We downloaded a copy to verify its authenticity a few days ago, from a post on Reddit that gained more publicity. Even though the links to download the collection were already circulating online over dark-web sites from last few weeks.
The 41GB gigantic collection, as shown below, comprehends 1.4 billion usernames, email, and password arrangements—well fragmented and organized into two and three level handbooks said by researchers.
The combined databank covers plain text credentials leaked from Pastebin, Bitcoin, MySpace, LinkedIn, YouPorn, Netflix, Zoosk, Last.FM, RedBox, Badoo, games like Runescape and Minecraft, as wells as credential lists like Exploit.in, Anti Public.
Password selecting policies are important to follow while selecting passwords for your various online websites. The only rule to follow password selecting policies is to mix and match and create a unique & precise password that you can remember.
The databank has been tidily structured and indexed alphabetically so that hackers with basic knowledge can quickly search for passwords.
While some of the breach cases are somewhat old with stolen credentials circulating online for some time, the accomplishment ratio is still high for lawbreakers, due to user’s mean habit of re-using their passwords through diverse platforms and selecting easy-to-use passwords.
It is still uncertain who is accountable for uploading the databank on the dark web, but whoever it is has incorporated Dogecoin and Bitcoin wallets for any user who wishes to contribute.
In order to safeguard yourself, it is highly advised to stop using the same passwords across multiple websites and also to retain complex and strong passwords. We also follow the password selecting policies to create hack-proof passwords.
For example, you can easily use the “LEET” language to select your unique password like, convert “Sneha likes swimming” into “$N3#@|!K3$$WMM!N&” this is shown just for example. You can create various short passwords using the same method or can also find resources online to help you encode the password you have chosen.
Most Popular Training Courses at Indian Cyber Security Solutions
Summer Training for CSE, IT, BCA & MCA Students
Network Penetration Tester Training
Diploma in Web Application Security
Certified Web Application Penetration Tester