Remove Blog Remove Data breaches Remove Hacking Remove Personal Security
article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

That's the analogy I often use to describe the data breach "personal stash" ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates.

article thumbnail

National Cybersecurity Awareness Month – What it Really Means for WordPress Users

SiteLock

Whether that’s banking, social channels, or downloading that cool-looking app, there are simple ways you can protect yourself and your community, and actions you can take if you’re a victim of a cyber crime or hack. Creating a culture of security within your large, medium, and small business is critical to avoiding data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1". It's made up of many different individual data breaches from literally thousands of different sources. The collection totalled over 12,000 separate files and more than 87GB of data.

article thumbnail

GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene

The Last Watchdog

With so much critical data now stored in the cloud, how can people protect their accounts? Until biometrics or a quantum solution change our everyday approach to encryption, passwords remain our first line of defense against data breaches, hackers, and thieves. But simpler passwords are much easier to hack.

Passwords 244