16 billion passwords leaked in breach affecting Google, Apple and Facebook

newYou can now listen to Fox News!
Your personal data is collected by almost every site or an application you visit. The world is more hungry than ever because it is now the most important assets, and more valuable than oil. Your shopping record has been registered, your search record is captured, your phone number, the email address and all knowledge.
But this does not mean that all this data is safe. If you have received a random mail call, a cook email, or a fake support call, your personal data exists.
And if you want to prove how bad your data is, the newly detected database provides a flagrant reminder. More than 16 billion entry logging data, collected from years of previous data violations, was collected in one of the largest archives of cybersecurity incidents at all, according to a report.
Subscribe to the free Cyberguy report
Get the best technical advice and urgent safety alerts and exclusive deals that are connected directly to your in inventive box. In addition, you will get immediate access to the ultimate survival guide – free when joining.
10 signs your personal data is sold online
A woman working on her laptop (Cyberguy “Knutsson)
What you need to know about the 16 billion password data breach that affects Google, Apple and Facebook
Cybernews It describes the open database as a “comprehensive exploitation scheme”. Records include login accreditation data from famous platforms such as Google, Facebook and Apple.
Security researchers emphasize that this is not the result of one new breach. Instead, it is a huge collection of previously stolen credentials from various previous leaks, fraud and exposure to third -party data, some of which have been forgotten, reported or recycled.
BleepingComPuter, The cyber security site, which reviewed the archive, confirmed that the data appears to be collected from old violations instead of a new incident. This makes the exposure scope in particular dangerous because the attackers can use this central group of targeted attacks, including accreditation.
The credit stuff becomes much easier when attackers can reach a wide range of user names and passwords. This technology includes using stolen login details via multiple sites, which takes advantage of the fact that many users re -use the credit data itself. Therefore, even if your account is not part of a modern breach, you may remain in danger if your old accreditation data is part of this newly indexed assembly.

A demonstration of pirates at work (Cyberguy “Knutsson)
Doubleclicjacking Hack converts the dual clicks into account the acquisitions
How to respond Google and Meta to leak a huge password
We got to Apple, Google And Meta To comment.
A Google spokesman stated that this problem did not stem from Google data breach and that Google continues to encourage users strongly to adopt safer and bottom authentications, such as The corridor key. They also suggest using tools like Google Password ManagerWhich safely stores your passwords and teaches you when they participate in a breach, allowing you to take immediate action.
A delegate from Mita said: “We do not have a statement to participate in this time because we are still looking into this.” But we have presented some Tips to secure your account, Security examinationand Introduction from the keys On Facebook.
We did not hear from Apple before the deadline.
What is artificial intelligence (AI)?

Google smartphone (Cyberguy “Knutsson)
Mescape programs display 3.9 billion passwords in the threat of huge cybersecurity
5 basic ways you can protect yourself after Apple breach, Google Breach
Although the accreditation data leaks becomes an increasing threat, protecting your data requires a mixture of smart security habits and reliable tools. Here are five effective ways to keep your information safe.
1. Use the password manager: Infostealeer Malware often targets the passwords reserved directly in web browsers, making them easy goals. Instead of relying on your browser to store accreditation data, use the customized password manager that provides zero architecture and military degree encryption to keep your data safe. The best options work on all your devices and browsers, provide a safe sharing, monitor data breach, and even create healthy reports on your passwords. Get more details about my country The best password managers reviewed by experts in 2025 here.
2. Type 2FA (2FA) authentication: Even if you stole your accreditation data, 2FA It adds an additional layer of safety by requesting a second form of verification, such as a symbol of applying authentication or confirming biological measurement. Internet criminals depend on the names of the stolen users And passwords for storming accounts, but with an empowerment of 2FA, they cannot reach without an additional safety step. Make sure to enable 2FA on important accounts such as email, banking services and business registrations.
3. Use a strong antivirus program and be careful of downloads and links: Infostealer is often harmful through malicious downloads, missing email messages and fake web sites. Avoid downloading programs or files from unreliable sources, and always check the links before clicking on them. The attackers hide harmful programs as legitimate programs, fraud in the game or cracked applications, so it is better to adhere to the official sites and applications stores for downloads.
The best way to protect yourself from harmful links is to install the antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.
4. Keep updating the program: CYBERCRIMINALs takes advantage of an old program to provide malware. Maintaining the operating system, browsers and safety programs updated It ensures that the known weaknesses are corrected. Enable automatic updates whenever possible, and install a virus protection program or a reputation ending point that can discover and give Infostealer threats before settling your system.
5. Consider the personal data removal service: The massive dropout of 16 billion accreditation shows to what extent your personal information can spread and the ease of appearance after years in the rules of infiltrated infiltrators. Even if your passwords are part of an old breach, data like your name, email, phone number or address may remain available through data broker sites. Personal data removal services can help reduce your exposure by cleaning this information from hundreds of these sites. Although there is no service, it can guarantee complete removal, it greatly reduces the digital fingerprint, which makes it difficult for fraudsters to leak the accreditation data that is related to general data to impersonate or target you. You monitor these services and remove your personal information automatically over time, giving me peace of mind in the threat scene today. Check the best data removal choices here.
Get on Free examination To find out if your personal information has already gone out on the web
Ransomware chaos hit OPTIMA tax dilution, 69 GB leakage of data
Court Kisa Curt
Passwords are no longer enough. That is why I always thought that technology companies should completely overcome them and require dual -factor authentication in all fields. Passwords, as soon as they are the basis of online identity, are now one of its weakest links. Companies like Google and Meta are already building systems that go beyond. The tools are available. The message is clear. You do not need to wait for a breach to start taking security seriously.
Click here to get the Fox News app
Do you think technology companies invest enough in cybersecurity security? Let’s know through writing to us in Cyberguy.com/contact.
For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter
Ask Kurt a question or tell us about the stories you want to cover
Follow Court on his social channels
Answers to the most asked Cyberguy questions:
New from Court:
Copyright 2025 Cyberguy.com. All rights reserved.