3.27 Billion Reasons to Change Your Password

Mar 18, 2021

The largest-ever compilation of stolen passwords and emails was recently posted online on a hacking forum that anyone could access. The lists contain a staggering 3.27 billion entries! The enormous database appears to be a compilation of leaked login credentials and other information from previous data leaks. The passwords and emails are from leaks not only in the UK but from all over the world. The hackers have managed to compile information stolen from different data breaches over the years and put it in a single accessible place.


Over the years, there have been billions of leaked login credentials that hackers are utilising to this day. This is why reusing your password, or using a very similar one that could easily be guessed, is never a good idea. It takes months for companies to announce that they have been hacked, giving hackers plenty of time to utilise any stolen information. You may be wondering why are companies sometimes slow to reporting data breaches? To answer this question, we have to get back to how such breaches are usually being discovered.


The breaches are usually intercepted by in-house cyber security experts or cyber security researchers, like us at JC Cyber Security, who love to poke around the internet looking for possible vulnerabilities. When such vulnerabilities are found, cyber experts, inform the affected business. Then the company takes its time to patch it. Once the exposure is fixed, and their marketing and legal teams have allowed them to announce the breach, the hacked company informs its users about the already resolved vulnerability that might have exposed personal information. The whole process can take months and ever years. You may start wondering why cyber security researchers don’t tell the world immediately?


They indeed could immediately sound the alarm, but they rarely do it because this would be unethical. Instead of helping the company, they may attract even more criminals who want to exploit the vulnerability. So long story short,
consumers might need months and sometimes even years to be informed about a data breach by the hacked business. And with this in mind, regular users never really know if their information has not already been stolen. However, there are websites where you can chek if your data has been compromised.


The solution is proper password hygiene. Keep changing your passwords at least once every three months, and remember never to reuse passwords. Avoid using patterns between old and new passwords too. If you are struggling to remember all the passwords, use a password manager. By relying on a password manager, you will not have to remember tens and sometimes hundreds of passwords, but just one master password that would give you access to all of the others when you need them. Reliable software protection packages can recognise and remember all the data required to log you into your favorite services.


The fact that hackers are creating such compilations of different data breaches means that internet users continue to ignore basic password hygiene practices and continue not to change passwords often enough. It also means that users systematically reuse old passwords. With easily accessible compilations such as this one, cyber criminals are only a search away from getting access to your potentially active login credentials. Be smart and change your passwords often; you have 3.27 billion reasons why you should not ignore this advice.

Follow Us

Be the first to know

You might also like

08 Apr, 2024
‘Hacking’ refers to activities performed by a threat actor (a ‘hacker’) that seeks to compromise digital services, such as computers, smartphones, and networks. Hackers are usually characterised as only being unlawful, motivated by financial gain, information gathering, or even just for the thrill of having a challenge.
Different Penetration Testing Types
01 Apr, 2024
Penetration testing is a form of an ethical hacking simulation conducted in accordance with industry guidelines, which aims to closely mimic real-world targeted attacks that organisations face daily. By actively testing your organisation’s defences, you can understand your security posture while also improving your defences, reducing the likelihood of experiencing a cyber-attack, ensuring confidentiality, integrity, and availability
What is Penetration Testing?
25 Mar, 2024
A penetration test ultimately seeks to answer the question “How effective is my organisation’s security controls against a skilled human hacker?” while determining the security posture of your organisation.
More Posts
Share by: