Tuesday, June 24, 2025
HomeBusinessWhat to do to protect yourself?

What to do to protect yourself?


Twice as much as the number of humans on earth. Here is what the 16 billion identifiers and passwords have been stolen and published online since the start of the year.

This information was revealed this Thursday, June 19 by Cybernews researchers, a media specializing in cybersecurity. Far from being only a bug in the matrix, Identifiers can be used for real large -scale attacks.

These would mainly be connection identifiers and passwords allowing access to accounts Apple, Google Telegram, business sites, or even government services. However, the data do not come from direct hacking of Google or Apple, but rather infected devicesspecifies the digital.

According to the government’s site if personal data is recovered by cybercriminals, a leak may have multiple consequences for the victim: targeted phishing or attempted scam, fraud, extortion, damage to image or reputation, Identity usurpation, cyberbullyingor even attempts to hack online accounts belonging to him.

Difficult to estimate the actual number of victims

The largest files groups together 3.5 billion pirated data, Mostly from Portuguese speakers, says Liberation. Cybernews specifies, however, that it is difficult to estimate the actual number of victims: dIn the connection information listed, duplicates has been spotted.

According to Liberation, it is difficult to know exactly who is responsible. All this data come from a accumulation of malware (malicious software) which settles via a trapped attachment or a fraudulent link and then record the victim’s identifiers and transmit them to their sender. The data was only made public for a few moments, but thieves still retain their traces.

But just a domino to bring all the others to fall! Once access to an account has been obtained, the hacker can collect new, more sensitive data such as bank accounts. To find out if your data has been stolen, the “Have I Been Pwned” site allows you to discover rather reliable if your email has been leak.

Caution remains

But that is not enough. Caution remains in order. Be particularly suspicious of any phone call or message of people who claim to know you. Also remember to use a password manager for generate strong and unique passwords, and update them regularly. Companies that do not have a multifactorial authentication system, can add a step in the connection process by asking for example a double authentication via a code received by SMS.

Do not register your bank card contact details For punctual purchases on a website and if you have recorded them, delete them. Try to unsubscribe or delete accounts (services, applications, websites) that you no longer use.

This data leak is also an opportunity to recall that each individual is entitled to the deletion of his personal data, from the organizations that collect them. As provided for in article 1 of law January 6, 1978 relating to data processing, files and freedoms. “Everyone has the right to decide and control the uses made of personal data concerning them, under the conditions set by this law.” An essential right at a time when the economic value of our data is too often underestimated.

addison.bailey
addison.bailey
Addison is an arts and culture writer who explores the intersections of creativity, history, and modern societal trends through a thoughtful lens.
Facebook
Twitter
Instagram
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!

- Advertisment -

Most Popular

Recent Comments