Tech

Massive Data Breach: 16 BILLION logins exposed – why we’re all at risk, always

There are troubling reports today of a data breach exposing over 16 Billion login credentials including Apple, Google, Meta and more. So is your data part of this and should you be worried?

Yes. Of course yes.

Reported by CyberNews this isn’t one big hack, in fact it should be made clear that Apple, Google, Facebook – none of these companies have been hacked. It’s more that a security researcher has discovered the treasure trove of data that cyber criminals have obtained through their own efforts. This includes from malware infections, credential stuffing and other leaks all repackaged into one big database.

Researchers say “This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,”

While the data is not accessible now, in fact it was only briefly visible, it’s a window into the type and scale of data that cyber criminals have access to.

With this amount of data criminals can build a profile of just one individual by linking multiple sets of data to a single person or email address.

From this they can send more targeted scam emails, calls, even physical letters.

Most problematic for all average Australians is the use of your login details from one site, to access another one. This is called Credential Stuffing.

In this situation, if the data set contains the email address myrealname@myinternet.com and the password “You’llNeverGuessIn2025” – then they can firstly access whatever site that credential was for, but also attempt to access any other site or service on the internet using that same email and password. They do this because we’re all guilty of re-using passwords.

What can I do?

Three important steps you can take.

  • Firstly, change your passwords. And change them regularly. A password should be multiple unrelated words strung together with the addition of characters and numbers.
  • Secondly, Setup and use Two Factor Authentication wherever it is available. Either through SMS verification or Authentication codes using an App like Authy. Do this now.
  • Finally, Install strong and credible Internet Security software on your computer, tablets and smartphones. Trend Micro offers this protection across your devices, we recommend it for everyone.

Recent Posts

  • Tech

New year, new phone, moto g57 lands down under with durable design under $300

As the flurry of CES starts to wane, Motorola are looking ahead and launching the…

2 days ago
  • CES

Dare to Dreame – Building a whole-smarthome ecosystem

It’s not every day a company decides to undertake such an ambitious project, to develop…

2 days ago
  • CES

The Lenovo Pro Rollable Concept will offer serious and pro gamers all types of gaming capabilities anywhere in the world

Lenovo has introduced an innovative concept at CES 2026: a horizontal rollable display on a…

2 days ago
  • Tech

Hisense to expand ConnectLife platform with AI and Matter support alongside new smart appliances for the home

Electronics maker Hisense has unveiled a new series of intelligent appliances at CES2026, broadening their…

2 days ago
  • Tech

Roblox takes it’s age verification globally after successful Australian launch

After implementing age verification for all users in Australia and a few select other areas,…

3 days ago
  • CES

WYBOT unveils their next generation pool cleaners at CES 2026 – More than a minor update

WYBOT have released details of their newest generation of robotic pool cleaners and claim this…

3 days ago