Cyber Security -Experts They recommend that internet users change their references And that their digital security improves after more than 16,000 million data was exposed.
The filtration of this data specifically corresponds to Login records and information about passwords. A “large number of data sets” that had not been reported so far, according to the media CybernewsResponsible for resounding the filtration.
However, that must be noted The 16,000 million records are not equal to 16,000 million people hacked or influenced, because it can be a Potpourri password, data theft information, etc.
Like Facebookor services such as Apple and GoogleAlthough there was “no centralized data violation” in those companies.
As reported The guardian“The data sets were temporarily available after they were poorly stored on external servers before they were eliminated.”
In this way, the CyberSecurity specialist who is responsible for this study can download the archives to try to contact the exposed people and companies.
“Of course it will take some time because It is a huge amount of data“, argument.
Most stolen information followed the same schedule: URL, login details (for example usernames) and A corresponding password.
“Most modern information -thieves collect data in this way,” said the research team.
Therefore, and after the investigation of the research, experts underline the Must update passwords periodic and take security measures.
Under these measures, the Multifactor -authentication or the combination of a password With a different form of verification, such as a code sent by SMS from a telephone.
Also: “It is important to emphasize that there is no new threat: this data is probably already in circulation,” he says The guardian From the director of the cyber security company Sofos, Peter Mackenzie.
“What we understand is the large amount of information available for cyber criminals,” he added.
Given these facts, which are increasingly preventing, experts find only a positive aspect: The data was only exposed for a short time.
“Enough time for researchers to discover them, but not enough to find who checked large amounts of data,” said researchers of Cybernews.