Tech

Massive Data Breach: 16 BILLION logins exposed – why we’re all at risk, always

There are troubling reports today of a data breach exposing over 16 Billion login credentials including Apple, Google, Meta and more. So is your data part of this and should you be worried?

Yes. Of course yes.

Reported by CyberNews this isn’t one big hack, in fact it should be made clear that Apple, Google, Facebook – none of these companies have been hacked. It’s more that a security researcher has discovered the treasure trove of data that cyber criminals have obtained through their own efforts. This includes from malware infections, credential stuffing and other leaks all repackaged into one big database.

Researchers say “This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,”

While the data is not accessible now, in fact it was only briefly visible, it’s a window into the type and scale of data that cyber criminals have access to.

With this amount of data criminals can build a profile of just one individual by linking multiple sets of data to a single person or email address.

From this they can send more targeted scam emails, calls, even physical letters.

Most problematic for all average Australians is the use of your login details from one site, to access another one. This is called Credential Stuffing.

In this situation, if the data set contains the email address myrealname@myinternet.com and the password “You’llNeverGuessIn2025” – then they can firstly access whatever site that credential was for, but also attempt to access any other site or service on the internet using that same email and password. They do this because we’re all guilty of re-using passwords.

What can I do?

Three important steps you can take.

  • Firstly, change your passwords. And change them regularly. A password should be multiple unrelated words strung together with the addition of characters and numbers.
  • Secondly, Setup and use Two Factor Authentication wherever it is available. Either through SMS verification or Authentication codes using an App like Authy. Do this now.
  • Finally, Install strong and credible Internet Security software on your computer, tablets and smartphones. Trend Micro offers this protection across your devices, we recommend it for everyone.

Recent Posts

  • Lifestyle

Russell Crowe sent an exclusive limited edition watch to this TikToker! Amazing story!

I've been watching along as I doomscroll for a few weeks now the story of…

24 minutes ago
  • Lifestyle

Gozney Dome 2 Review. The Centrepiece of Outdoor Entertaining

First, I need to give a shoutout to my sister. She told Trevor no to…

1 day ago
  • Tech

AAWireless Two+ Review — wireless Android Auto and Apple CarPlay in a single, compact device

Last year, we reviewed the AAWireless Two and were impressed with how compact it was…

2 days ago
  • Product News

Destination Moon! LEGO Unveils 1,283-Piece Tintin Rocket Model

Fans of Belgian cartoonist Hergé’s creation, the intrepid reporter Tinitin, will be pleased to see…

2 days ago
  • Lifestyle

Tineco are hosting a pop-up store at Chadstone this weekend to try before you buy — also on sale now!

The world's leader in wet and dry floor cleaners, Tineco has announced its own March…

2 days ago
  • Lifestyle

TAG Connected E5 x F1 Smartwatch Review – stunning, simple, but made for F1 fans

After taking over as the Official Watch brand of F1 last year, the return of…

3 days ago