There have been plenty of data breach cases where a large amount of personal information including s, names, and email addresses have been compromised. The stolen data is often leaked online, resulting in an enormous stash of stolen credentials. But, a website that goes by Have I Been Pwned (HIBP) is coming to the rescue by making that data publicly available, so that the companies that require any sort of information from s can match the entered s with those in the collection, and thereupon warn s if they have been compromised before. Troy Hunt, the mastermind behind HIBP, has revealed over 320 million s in his blog to help the companies secure their online network. These s have been aggregated from several data breaches that happened overtime, and are now available to everyone on HIBP website. However, Hunt says that the ‘pwned-s’ that are publicly available on his website do not disclose the email addresses and names that they were associated with. The website Have I Been Pwned, or HIBP, generally lets s see if their email addresses have been breached without revealing the s, but Hunt has created the inverse of the concept this time, in an effort to intimate Internet s and companies about s that can be easily hacked. The sole motive behind HIBP’s new service is to supply different companies about the compromised s, so that when any tries to enter anything that matches they will be warned by the company to use a more secure instead. Alternatively, since the HIBP website is open for all, any can voluntarily go to the website and check if the they’ve been thinking to use has not been already breached. Nevertheless, Hunt advises such s to be cautious before checking any s that they currently use. “The point of the web-based service is so that people who have been guilty of using sloppy s have a means of independent verification that it's not one they should no longer be using,” he notes in his blog. While this service can be more securely accessed over an Internet connection, Hunt has also made the entire collection of s that is almost 5.3GB in size available for offline through a ZIP file. Since its inception, the concept of this service has been asserted positively by institutions like National Institute of Standards and Technology (NIST) and the UK's National Cyber Security Centre, which agree with Hunt’s ideology that compromised s should not be brought into use again by any . 2j254h
For the latest reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.