Close Menu
Fin Street NewsFin Street News
  • Home
  • Business
  • Finance
    • Banking
    • Stocks
    • Commodities & Futures
    • ETFs & Mutual Funds
    • Funds
    • Currencies
    • Crypto
  • Markets
  • Investing
  • Personal Finance
    • Loans
    • Credit Cards
    • Dept Management
    • Retirement
    • Mortgages
    • Saving
    • Taxes
  • Fintech

Subscribe to Updates

Get the latest finance and business news and updates directly to your inbox.

Trending
13 Early Prime Day Deals to Shop Right Now

13 Early Prime Day Deals to Shop Right Now

June 20, 2025
Should I File an Insurance Claim for Bumper Damage?

Should I File an Insurance Claim for Bumper Damage?

June 20, 2025
Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

June 20, 2025
Top Marketer Esi Eggleston Bracey Talks Unilever’s Retail Partnerships

Top Marketer Esi Eggleston Bracey Talks Unilever’s Retail Partnerships

June 20, 2025
A 16-Billion Password Leak Just Hit. Are You at Risk?

A 16-Billion Password Leak Just Hit. Are You at Risk?

June 20, 2025
Facebook X (Twitter) Instagram
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact
June 20, 2025 7:26 pm EDT
|
Facebook X (Twitter) Instagram
  Market Data
Fin Street NewsFin Street News
Newsletter Login
  • Home
  • Business
  • Finance
    • Banking
    • Stocks
    • Commodities & Futures
    • ETFs & Mutual Funds
    • Funds
    • Currencies
    • Crypto
  • Markets
  • Investing
  • Personal Finance
    • Loans
    • Credit Cards
    • Dept Management
    • Retirement
    • Mortgages
    • Saving
    • Taxes
  • Fintech
Fin Street NewsFin Street News
Home » 16 Billion Passwords Were Leaked — Here’s How to Protect Your Data
16 Billion Passwords Were Leaked — Here’s How to Protect Your Data
Finance

16 Billion Passwords Were Leaked — Here’s How to Protect Your Data

News RoomBy News RoomJune 20, 20250 ViewsNo Comments

Researchers say they’ve uncovered one of the largest data leaks in history that involves many popular platforms.

The leak includes nearly 16 billion login credentials that could give cybercriminals access to social media and business platforms such as Apple, Gmail, Telegram, Facebook, GitHub, and more, researchers at Cybernews said this week.

Bad actors now have “unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing,” the researchers said.

The number of exposed people or accounts is unknown. The researchers said the data likely comes from malicious software known as infostealers.

“What’s especially concerning is the structure and recency of these datasets — these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,” the researchers said.

Cybernews said researchers uncovered the leak when the datasets were exposed for a short period of time.

It follows the May discovery of a database containing more than 184 million credentials, including Apple, Facebook, and Google logins, Wired earlier reported.

If you’re nervous that your logins are at risk, there are steps you can take to make your account safer.

How to protect yourself

You can’t unring the bell of an information leak. However, you can take steps to identify if your credentials have been involved in any data breaches and protect yourself in the future.

You can check sites like Have I Been Pwned to see if your email has appeared in a data breach.

Turning on two-step authentication for your accounts can also help protect them from unauthorized access.

Platforms also offer resources to help users secure their accounts.

Google encourages users to use protections that don’t require a password, like a passkey. It’s one of the tech giants, along with Apple, Amazon, and Microsoft, that have been working to move users away from passwords to help secure their accounts.

For those who prefer to stick with passwords, Google’s password manager can store login credentials and notify users if they appear in a breach, a spokesperson told Business Insider.

There’s also Google’s dark web report, a free tool that tracks whether personal information is floating around in online databases.

GitHub, an online coding platform, offers developers a guide on how to implement safety measures in their organizations. The site recommends creating a security policy, having strict password guidelines, and requiring two-factor authorization.

The data leak included logs — “often with tokens, cookies, and metadata,” which makes it “particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,” the Cybernews team said.

Meta offers a Privacy Checkup tool for users to review their privacy and security account settings. There, you can turn on two-factor authentication and ensure Meta alerts you of unusual logins.

Meanwhile, Telegram said its primary login method sends a one-time password to users over SMS.

“As a result, this is far less relevant for Telegram users compared to other platforms where the password is always the same,” a Telegram spokesperson told BI about the data leak.

Apple, GitHub, and Meta did immediately respond to a request for comment on the data leak. Google said it was directing users to some of the security resources above.



Read the full article here

billion data Heres leaked Passwords protect
Share. Facebook Twitter LinkedIn Telegram WhatsApp Email

Keep Reading

Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

Accenture Is Giving Consulting a New Name: ‘Reinvention Services’

Accenture Is Giving Consulting a New Name: ‘Reinvention Services’

Best Zombie Movies to Watch After ’28 Years Later’

Best Zombie Movies to Watch After ’28 Years Later’

Best Barbecue Cheeseburger From 3 Fast Food Chains, Ranked

Best Barbecue Cheeseburger From 3 Fast Food Chains, Ranked

I Ate at Olive Garden for First Time in Over 20 Years; Worth the Money

I Ate at Olive Garden for First Time in Over 20 Years; Worth the Money

Satellite Images Show US Military Aircraft Gone From Vulnerable Base

Satellite Images Show US Military Aircraft Gone From Vulnerable Base

Israel-Iran Conflict Is Bad News for Russia’s Shahed Drones: UK Intel

Israel-Iran Conflict Is Bad News for Russia’s Shahed Drones: UK Intel

Top Takeaways From BI’s Conversations With Real-Estate Investors

Top Takeaways From BI’s Conversations With Real-Estate Investors

The Clock Is Ticking on Tesla’s Mysterious New Cheaper Models

The Clock Is Ticking on Tesla’s Mysterious New Cheaper Models

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Should I File an Insurance Claim for Bumper Damage?

Should I File an Insurance Claim for Bumper Damage?

June 20, 2025
Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

Everything We Know About Lauren Sánchez and Jeff Bezos’ 2025 Wedding

June 20, 2025
Top Marketer Esi Eggleston Bracey Talks Unilever’s Retail Partnerships

Top Marketer Esi Eggleston Bracey Talks Unilever’s Retail Partnerships

June 20, 2025
A 16-Billion Password Leak Just Hit. Are You at Risk?

A 16-Billion Password Leak Just Hit. Are You at Risk?

June 20, 2025
Guide To Dollar-Cost Averaging: How To Build Wealth Over Time

Guide To Dollar-Cost Averaging: How To Build Wealth Over Time

June 20, 2025

Latest News

How Is Home Equity Split During A Divorce?

How Is Home Equity Split During A Divorce?

June 20, 2025
The difference between a good credit score and a great credit score ~ Credit Sesame

The difference between a good credit score and a great credit score ~ Credit Sesame

June 20, 2025
Accenture Is Giving Consulting a New Name: ‘Reinvention Services’

Accenture Is Giving Consulting a New Name: ‘Reinvention Services’

June 20, 2025

Subscribe to News

Get the latest finance and business news and updates directly to your inbox.

Advertisement
Demo
Facebook X (Twitter) Pinterest TikTok Instagram
2025 © Prices.com LLC. All Rights Reserved.
  • Privacy Policy
  • Terms
  • For Advertisers
  • Contact

Type above and press Enter to search. Press Esc to cancel.