Tech

Massive Data Breach: 16 BILLION logins exposed – why we’re all at risk, always

There are troubling reports today of a data breach exposing over 16 Billion login credentials including Apple, Google, Meta and more. So is your data part of this and should you be worried?

Yes. Of course yes.

Reported by CyberNews this isn’t one big hack, in fact it should be made clear that Apple, Google, Facebook – none of these companies have been hacked. It’s more that a security researcher has discovered the treasure trove of data that cyber criminals have obtained through their own efforts. This includes from malware infections, credential stuffing and other leaks all repackaged into one big database.

Researchers say “This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,”

While the data is not accessible now, in fact it was only briefly visible, it’s a window into the type and scale of data that cyber criminals have access to.

With this amount of data criminals can build a profile of just one individual by linking multiple sets of data to a single person or email address.

From this they can send more targeted scam emails, calls, even physical letters.

Most problematic for all average Australians is the use of your login details from one site, to access another one. This is called Credential Stuffing.

In this situation, if the data set contains the email address myrealname@myinternet.com and the password “You’llNeverGuessIn2025” – then they can firstly access whatever site that credential was for, but also attempt to access any other site or service on the internet using that same email and password. They do this because we’re all guilty of re-using passwords.

What can I do?

Three important steps you can take.

  • Firstly, change your passwords. And change them regularly. A password should be multiple unrelated words strung together with the addition of characters and numbers.
  • Secondly, Setup and use Two Factor Authentication wherever it is available. Either through SMS verification or Authentication codes using an App like Authy. Do this now.
  • Finally, Install strong and credible Internet Security software on your computer, tablets and smartphones. Trend Micro offers this protection across your devices, we recommend it for everyone.

Recent Posts

  • Tech

Microsoft announces new Xbox logo to go with new Game Pass pricing

Microsoft’s Xbox division has seen a slump in the last few years, as their Xbox…

1 day ago
  • Tech

Insta360 previews new Luna camera range and Mic Pro wireless microphone

Tech company Insta360 unveiled a new range of devices at the NAB Show (National Association…

1 day ago
  • Tech

Turtle Beach announce its latest gaming mice and keyboards, available for pre-order now

Turtle Beach has announced an expansion of its PC peripherals with the new Turtle Beach…

2 days ago
  • Tech

DJI announce a new line of entry-level drones, affordable creativity for everyone

DJI has announced a new lineup of entry-level drones designed for aspiring creators seeking high-altitude…

2 days ago
  • Motoring

AAA questions claimed fuel consumption rates – Are consumers being misled?

The Australian Automobile Association (AAA) finds that consumers need to be wary of claimed fuel…

2 days ago
  • Podcasts

The Best Movies You’ve Never Seen podcast – Catch me if you can

Based on a true story, fraud and forgeries, Leonardo DiCaprio stars here with Tom Hanks…

2 days ago