Tech

Massive Data Breach: 16 BILLION logins exposed – why we’re all at risk, always

There are troubling reports today of a data breach exposing over 16 Billion login credentials including Apple, Google, Meta and more. So is your data part of this and should you be worried?

Yes. Of course yes.

Reported by CyberNews this isn’t one big hack, in fact it should be made clear that Apple, Google, Facebook – none of these companies have been hacked. It’s more that a security researcher has discovered the treasure trove of data that cyber criminals have obtained through their own efforts. This includes from malware infections, credential stuffing and other leaks all repackaged into one big database.

Researchers say “This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,”

While the data is not accessible now, in fact it was only briefly visible, it’s a window into the type and scale of data that cyber criminals have access to.

With this amount of data criminals can build a profile of just one individual by linking multiple sets of data to a single person or email address.

From this they can send more targeted scam emails, calls, even physical letters.

Most problematic for all average Australians is the use of your login details from one site, to access another one. This is called Credential Stuffing.

In this situation, if the data set contains the email address myrealname@myinternet.com and the password “You’llNeverGuessIn2025” – then they can firstly access whatever site that credential was for, but also attempt to access any other site or service on the internet using that same email and password. They do this because we’re all guilty of re-using passwords.

What can I do?

Three important steps you can take.

  • Firstly, change your passwords. And change them regularly. A password should be multiple unrelated words strung together with the addition of characters and numbers.
  • Secondly, Setup and use Two Factor Authentication wherever it is available. Either through SMS verification or Authentication codes using an App like Authy. Do this now.
  • Finally, Install strong and credible Internet Security software on your computer, tablets and smartphones. Trend Micro offers this protection across your devices, we recommend it for everyone.

Recent Posts

  • Tech

Razer Drops New Pro-Grade Esports Duo: Viper V4 Pro & Gigantus V2 Pro

Gaming lifestyle brand Razer has launched their new esports-focused Viper V4 Pro gaming mouse and…

2 days ago
  • Podcasts

The Best Movies You’ve Never Seen podcast: Coming to America

Eddie Murphy plays an African Prince - and more, in this romantic comedy. A story…

3 days ago
  • Lifestyle

LEGO creates art for Soccer fans with Ronaldo, Messi and more Football icon sets

If you thought LEGO had found all the iconic places, things and brands to partner…

3 days ago
  • Tech

Microsoft will bring FanFest to Sydney as part of 25th Anniversary tour

Microsoft has had a rough couple of years with Xbox, but with a change of…

3 days ago
  • Tech

ASUS brings Ceraluminum to their 2026 Zenbook range alongside a new dual-display Zenbook Duo

Alongside their gaming announcements, ASUS has also announced their new lifestyle range with a new…

3 days ago
  • Reviews

Nothing Phone (4a) Review: Transparent Style Meets Serious Specs on a Budget

The Nothing Phone (4a) series was announced last month, Trevor has just checked out the…

3 days ago