Hackers released 8.4 billion stolen passwords. What to do?


Security experts have discovered a new database of stolen passwords on hacker websites, which is considered to be the most extensive so far. The database called RockYou2021 contains as many as 8.4 billion stolen passwords from different parts of the world wide web. The file available for download, however, covers as much as 100 gigabytes, which means that in all probability it is also about user accounts and passwords that have been stolen in the last few years.

Unfortunately, no data is currently available on how many user accounts from individual countries have been affected, but it is known that the attack was carried out worldwide. When reviewing the stolen passwords, security experts came to the conclusion that users still use weak passwords, as the password “123456” was used in as many as 15,000 cases. If you also do not want to fall victim to cybercriminals and instantly lose access to all your cyber services, we recommend that you seriously consider the quality of your password.

Secure passwords are made up of more common words and are longer than 10 characters (for example, “this is fun”). If we want to further improve the security of passwords, we can use special characters and a combination of uppercase and lowercase letters (for example, “This, Is, Fun!”). Creating secure passwords is definitely worth the effort, as they are the only barrier that separates your data from cybercriminals. Of course, we should not forget to update the operating system and install effective anti-virus protection.

In addition, don’t forget to include two-level verification as much as possible. In the event of theft of your user account and password, your data will still be secure. In addition, you can check at any time to see if yours was among the misused data. One of the most famous websites that monitors hacker intrusions is Have I Been Pwned. Just click on the link https://haveibeenpwned.com/ and enter your email address.


Source: Računalništvo, telefonija – Računalniške novice by racunalniske-novice.com.

*The article has been translated based on the content of Računalništvo, telefonija – Računalniške novice by racunalniske-novice.com. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!