NEWYou tin present perceive to Fox News articles!
Your idiosyncratic information is collected by astir each tract oregon app you visit. The satellite is much information bare than ever due to the fact that it's present the astir important asset, adjacent much invaluable than oil. Your buying past is logged, your hunt past is captured, and your telephone number, email address, and IDs are each stored. But that doesn't mean each this information is safe. If you've ever received a spam call, phishing email, oregon a fake enactment call, your idiosyncratic information is retired there.
And if you privation impervious of however poorly your information is treated, a recently uncovered database offers a stark reminder. More than 16 cardinal login credentials, collected from years of past information breaches, person been compiled into 1 of the largest aggregated archives of cybersecurity incidents ever seen, according to a report.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide — escaped erstwhile you join.
10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

A pistillate moving connected her laptop (Kurt "CyberGuy" Knutsson)
What you request to cognize astir the 16 cardinal passwords information breach affecting Google, Apple, and Facebook
Cybernews describes the exposed database arsenic a "blueprint for wide exploitation." The records see login credentials from fashionable platforms similar Google, Facebook, and Apple.
Security researchers stress that this isn't the effect of a new, azygous breach. Instead, it's a monolithic postulation of antecedently stolen credentials from assorted past leaks, phishing scams, and third-party information exposures, immoderate of which were forgotten, underreported, oregon re-shared.
BleepingComputer, a cybersecurity tract that reviewed the archive, confirmed the information appears to beryllium aggregated from older breaches alternatively than a caller incident. This makes the scope of the vulnerability peculiarly unsafe due to the fact that attackers tin usage this cardinal trove for targeted attacks, including credential stuffing.
Credential stuffing becomes overmuch easier erstwhile attackers person entree to specified a immense excavation of usernames and passwords. This method involves utilizing stolen login details crossed aggregate sites, exploiting the information that galore users reuse the aforesaid credentials. So adjacent if your relationship wasn't portion of a caller breach, you could inactive beryllium astatine hazard if your aged credentials are portion of this recently indexed compilation.

An illustration of a hacker astatine work (Kurt "CyberGuy" Knutsson)
DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS
How Google and Meta are responding to the monolithic password leak
We reached retired to Apple, Google and Meta for comment.
A Google spokesperson stated that this contented did not stem from a Google information breach and that Google continues to powerfully promote users to follow much secure, passwordless authentication methods, specified as passkey. They besides suggest utilizing tools like Google Password Manager, which securely stores your passwords and notifies you erstwhile they’ve been progressive successful a breach, allowing you to instrumentality contiguous action.
A rep from Meta said, "We don’t person a connection to stock astatine this clip arsenic we’re inactive looking into this," but did connection some tips to unafraid your account, a security check-up tool, and the introduction of passkeys connected Facebook.
We did not perceive backmost from Apple earlier our deadline.
In statements fixed to the media, a Google spokesperson clarified that the institution was not the root of the leak. Instead of raising alarms, Google is encouraging users to follow much unafraid practices. These see utilizing passkeys, a newer signifier of authentication that relies connected biometric information oregon a instrumentality PIN alternatively of a accepted password.
Google is besides promoting its Password Manager, which alerts users if immoderate of their stored credentials person been exposed. This instrumentality tin automatically make beardown passwords and support them encrypted crossed your devices.
Meta has taken akin steps by rolling retired enactment for passkeys connected Facebook mobile apps. While adoption remains low, the institution is signaling that passwordless logins are the aboriginal of unafraid access. These changes bespeak a increasing manufacture displacement toward authentication methods that cannot beryllium phished oregon reused.
We reached retired to Apple, Google, and Meta for remark but did not person a effect earlier our deadline.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google smartphone (Kurt "CyberGuy" Knutsson)
MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT
5 indispensable ways you tin support yourself aft the Apple, Google Data breach
With credential leaks becoming a increasing threat, protecting your information requires a premix of astute information habits and reliable tools. Here are 5 effectual ways to support your accusation safe.
1. Use a password manager: Infostealer malware often targets passwords saved straight successful web browsers, making them casual targets. Instead of relying connected your browser to store credentials, usage a dedicated password manager that offers zero-knowledge architecture and military-grade encryption to support your information safe. The champion options enactment crossed each your devices and browsers, connection unafraid sharing, show for information breaches, and adjacent make wellness reports connected your passwords. Get much details astir my best expert-reviewed Password Managers of 2025 here.
2. Enable two-factor authentication (2FA): Even if your credentials are stolen, 2FA adds an other furniture of information by requiring a 2nd signifier of verification, specified arsenic a codification from an authentication app oregon biometric confirmation. Cybercriminals trust connected stolen usernames and passwords to interruption into accounts, but with 2FA enabled, they cannot summation entree without the further information step. Make definite to alteration 2FA connected important accounts similar email, banking, and work-related logins.
3. Use beardown antivirus bundle and beryllium cautious with downloads and links: Infostealer malware often spreads done malicious downloads, phishing emails, and fake websites. Avoid downloading bundle oregon files from untrusted sources, and ever double-check links earlier clicking them. Attackers disguise malware arsenic morganatic software, crippled cheats, oregon cracked applications, truthful it is champion to instrumentality to authoritative websites and app stores for downloads.
The champion mode to safeguard yourself from malicious links is to person antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe. Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android and iOS devices.
4. Keep bundle updated: Cybercriminals exploit outdated bundle to present malware. Keeping your operating system, browsers, and information bundle up to date ensures that known vulnerabilities are patched. Enable automatic updates whenever possible, and instal reputable antivirus oregon endpoint extortion bundle that tin observe and artifact infostealer threats earlier they compromise your system.
5. Consider a idiosyncratic information removal service: The monolithic leak of 16 cardinal credentials shows conscionable however acold your idiosyncratic accusation tin dispersed and however easy it tin resurface years aboriginal successful aggregated hacker databases. Even if your passwords were portion of an aged breach, information similar your name, email, telephone number, oregon code whitethorn inactive beryllium disposable done information broker sites. Personal information removal services tin assistance trim your vulnerability by scrubbing this accusation from hundreds of these sites. While nary work tin warrant full removal, they drastically trim your integer footprint, making it harder for scammers to cross-reference leaked credentials with nationalist information to impersonate oregon people you. These services show and automatically region your idiosyncratic info implicit time, which gives maine bid of caput successful today’s menace landscape. Check retired my apical picks for information removal services here.
Get a free scan to find retired if your idiosyncratic accusation is already retired connected the web
CHAOS RANSOMWARE HITS OPTIMA TAX RELIEF, LEAKS 69GB OF DATA
Kurt’s cardinal takeaway
Passwords are nary longer enough. That is wherefore I person ever believed tech companies should signifier them retired wholly and necessitate two-factor authentication crossed the board. Passwords, erstwhile the instauration of online identity, are present 1 of its weakest links. Companies similar Google and Meta are already gathering systems that determination beyond them. The tools are available. The connection is clear. You bash not request to hold for a breach to commencement taking information seriously.
CLICK HERE TO GET THE FOX NEWS APP
Do you deliberation tech companies are investing capable successful their cybersecurity infrastructure? Let america cognize by penning to america at Cyberguy.com/Contact.
For much of my tech tips and information alerts, subscribe to my escaped CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question oregon fto america cognize what stories you'd similar america to cover
Follow Kurt connected his societal channels
Answers to the astir asked CyberGuy questions:
- What is the champion mode to support your Mac, Windows, iPhone and Android devices from getting hacked?
- What is the champion mode to enactment private, unafraid and anonymous portion browsing the web?
- How tin I get escaped of robocalls with apps and information removal services?
- How bash I region my backstage information from the internet?
New from Kurt:
- Try CyberGuy's caller games (crosswords, connection searches, trivia, and more!)
- CyberGuy’s Exclusive Coupons and Deals
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.