The database, named “rockyou2024.txt,” reportedly contains nearly 10 billion unique passwords.
July 2024: In a significant security breach, RockYou2024, nearly 10 billion unique passwords have been leaked on a widely recognized cyber forum. This record-setting release of passwords was sourced from decades of data breaches and has the potential to be exploited in future attacks.
The database, named “rockyou2024.txt,” reportedly contains nearly 10 billion unique passwords, collected from thousands of data leaks. This massive compilation surpasses the previous record holder, RockYou2021, by adding 1.5 billion new passwords.
In response, Kaspersky’s experts have issued practical guidance to help users protect themselves in the aftermath of the extensive data compromise:
Check the breach impact.
When a data breach occurs, the first thing a user is advised to do is check whether their data has been affected. Modern security solutions, such as Kaspersky Premium, enable the detection of leaked data and provide alerts to enhance security measures if necessary. As well as internal services, there are some public sources that could help to detect whether personal data has been leaked or not.
Change your passwords as soon as possible.
In the event of a data breach, it is essential to change your passwords immediately and consider all other sites where the same password is being used. New passwords should be unique for each account, be at least 8 characters long, and combine letters with numbers and symbols. In order to check whether a combination is strong enough, a password checker can be employed.
Block and reissue your bank card, if necessary.
If payment data was stored by a service that experienced a data breach, it is best to block and reissue a card for added security. Usually, reissuing a bank card doesn’t take too much time and effort, therefore preventing a greater inconvenience.
Install a reliable password manager.
A tool like this creates strong passwords and stores them securely in an encrypted vault. Besides, it is enabled to monitor data leaks and check if users’s passwords were compromised.
Don’t forget about two-factor authentication.
A recent survey by Kaspersky revealed how easily compromised accounts can be without 2FA and strong passwords. To protect an account from unauthorized access, it is highly recommended to set up 2FA. This can be accomplished by receiving a confirmation via SMS, email, or using an authentication app or password manager that generates one-time codes.
Securely close unused accounts.
If there are no plans to continue using a service after a data leak, it is advisable to delete the account and request the complete removal of all collected data by contacting technical support or the address in the privacy policy. This step, often outlined in the “Your Rights” section of legitimate services, can also reveal the extent of data exposure.
Share only the essential minimum of personal information online.
As massive service leaks are not uncommon, it is recommended to minimize the information provided to a service. When you register, using a main email address is unnecessary; auto-substitution can be used instead. Additionally, if not required, omit the real name and residence address.
Do Follow: CIO News LinkedIn Account | CIO News Facebook | CIO News Youtube | CIO News Twitter
About us:
CIO News is the premier platform dedicated to delivering the latest news, updates, and insights from the CIO industry. As a trusted source in the technology and IT sector, we provide a comprehensive resource for executives and professionals seeking to stay informed and ahead of the curve. With a focus on cutting-edge developments and trends, CIO News serves as your go-to destination for staying abreast of the rapidly evolving landscape of technology and IT. Founded in June 2020, CIO News has rapidly evolved with ambitious growth plans to expand globally, targeting markets in the Middle East & Africa, ASEAN, USA, and the UK.
CIO News is a proprietary of Mercadeo Multiventures Pvt Ltd.