Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    POCO F7 Launches in Malaysia with Snapdragon 8s Gen 4, Flagship Power, Bold Design, and Early Bird Deals

    Next Galaxy Z foldables to be announced on 9 July

    Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      How Plume Drove a 100% Jump in RWA Holders to Overtake Ethereum

      June 24, 2025

      $400 Million SHIB Supply Zone Might Prevent Shiba Inu From Ending Downtrend

      June 24, 2025

      Turkey Overhauls Crypto Regulations to Stop Money Laundering

      June 24, 2025

      What Crypto Whales Are Buying After Israel-Iran Ceasefire Announcement

      June 24, 2025

      Midnight Network Tokenomics Introduces Radically Accessible and Fair Token Distribution Model 

      June 24, 2025
    • Technology

      Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

      June 25, 2025

      Windows 10 gets an extra year of free security updates (with a catch)

      June 25, 2025

      Philps Hue smart lights are already pricey. They’re about to get pricier

      June 25, 2025

      Amazon’s Fire TV Stick 4K drops to its best price of the year

      June 25, 2025

      The state of DTC marketing in 2025: How brands and agencies are leveraging data and automation to fuel ROI

      June 25, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»184 million major passwords leaked! Avoid these 2 dangers
    Technology

    184 million major passwords leaked! Avoid these 2 dangers

    TechAiVerseBy TechAiVerseJune 9, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    184 million major passwords leaked! Avoid these 2 dangers
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    184 million major passwords leaked! Avoid these 2 dangers

    Image: Black_Kira / Shutterstock.com

    Back in mid-May, a security researcher announced the discovery of an unencrypted database containing 184 million passwords. Found hosted on a website, the entries included major services like Google, Microsoft, Facebook, and Apple. They also extended to bank and government services. 

    The massive 47GB database is now offline, after being reported to the website host. But its existence still signals two dangers that you shouldn’t ignore. They’re the reason this report has lingered in the news, across tech sites and mainstream outlets alike.

    First, this data was most likely stolen directly from users through infostealers, a kind of malware. This sketchy software can show up on a PC or phone in a few different ways—and currently, it’s a less discussed method of attack, despite its potential for deep damage to your daily life.

    Second, affected accounts remain vulnerable to takeover or exploitation. The result could be an account lockout, sensitive data leaked (e.g., tax details or confidential business plans), or stolen cash.

    Here’s how to protect yourself.

    Infostealers are malware you can easily avoid

    Shutterstock.com / solarseven

    An infostealer is software that copies data stored on or typed into your PC, then sends it all back to the attacker. That includes passwords—hackers often target saved data from your browser, like login credentials, cookies, crypto wallet details, and autofill data.

    If your device is compromised, you can end up losing banking details, home and work addresses, tax info, and yep, the password to your email account. The strength of your password won’t matter if it’s outright stolen.

    How infostealers appear on a PC or phone

    Malware doesn’t randomly appear on your devices—you have to download and install such apps. And attackers are tricky with how they get you to do so. For example:

    • You download a browser extension or app that performs a normal task—and it actually works as advertised. But in the background, it’s also stealing data from you.
    • You click on a fake link for official software. (This recent example had an extra gnarly twist, where the malware infected the graphics card itself to evade detection.)
    • You decide to ride the high seas and download pirated software. It installs malware alongside the app you wanted.

    How to avoid infostealers

    A few regular practices will help you evade an infostealer infection. Part of it starts with your habits around downloaded software, and the other part is keeping your security software up to date.

    1. Choose well-known software vetted by trustworthy sources like security experts and major tech sites. Free open-source alternatives often exist for popular paid apps, if you’re on a budget. (And sometimes there are even unique free tools.)
    2. Click carefully. When looking at search results, verify the URL matches an official or known site. If it’s off or otherwise seems sketchy, stop and start over.
    3. Run antivirus scans regularly. These days, this should be an automatic process. It doesn’t hurt to check every so often that your software is set to auto-download updates, though.

    Boost your account security, ASAP

    If your password ever becomes compromised, two-factor authentication will stand between you and an attacker. (Just be careful not to accidentally give away your 2FA codes, too.)

    PCWorld

    As for your account passwords, you won’t be able to tell if you were caught in this data leak. The safest approach is to assume you could be affected, and take precautions.

    Here, the goal is to defend against other people using your leaked credentials for ill-gain. These steps won’t always protect against certain kinds of infostealer attacks. (More on that in a moment.)

    • Enable two-factor authentication (aka multi-factor authentication) on your accounts, especially your most important ones. It acts as a second checkpoint that an attacker must clear in order to access your account. Having just your password won’t be enough.
    • Start using passkeys. Unlike passwords, this login method can’t be stolen and shared by attackers. They’re also simpler to use, with no memorization involved.
    • Change the passwords for your most sensitive accounts. This process is easiest if you use a password manager, which will both generate a strong, unique password and save it for you.

    Why don’t these protective measures stand up against infostealers? Because of how authentication currently works on the web. After you successfully log in to a website, your browser stores a cookie that maintains your sign-in state. These cookies can be copied by infostealer malware.

    Depending on how a website handles authentication (in this case, how sensitive its process is to this kind of attack), an attacker may then be able to use that stolen authentication cookie on their own PC to log into your account. Neither two-factor authentication nor passkeys can defend against that.

    So again, be careful about what you install on your PC.

    A quick checklist for what to do

    Worried about infostealer malware? Your very first step should be to run an antivirus scan.

    Chris Hoffman / IDG

    Not sure how to tackle all these steps, and in which order? Basically, make sure your PC is clean and free of malware before updating your security info.

    First:

    1. Run the antivirus software on your PC.
    2. Also check the apps and browser extensions installed on your device. (Antivirus isn’t fool proof.)
    3. Remove any software you don’t recognize or that has questionable origins. (You can use a search engine to check an app or extension’s reputation, if you’re unsure.)

    Then:

    1. Enable two-factor authentication on your accounts with passwords.
    2. Update your passwords for sensitive accounts—primary email address and financial institutions at minimum. 
    3. Also consider creating a passkey for your account, to use as your usual method of login*.

    You can go fully passwordless for some accounts—that is, switch over to passkeys and remove your password. This strategy does run some risk of becoming accidentally locked out of your account, though. You will need additional passkeys stored on backup devices to prevent such a situation.

    My advice to most people: Upgrade your password to something random and very strong, then save it to a password manager. Also enable 2FA. Afterward, also create a passkey + a backup. Use the passkeys as your usual method of login, but keep the password + 2FA combo as a failsafe in case you lose access to all your passkeys.

    Yeah, online security is a major pain right now. (The explosion of AI tools and their use by cybercriminals is a big factor.) Hopefully, we’ll find our way to a better solution soon.


    Author: Alaina Yee
    , Senior Editor, PCWorld

    A 14-year veteran of technology and video games journalism, Alaina Yee covers a variety of topics for PCWorld. Since joining the team in 2016, she’s written about CPUs, Windows, PC building, Chrome, Raspberry Pi, and much more—while also serving as PCWorld’s resident bargain hunter (#slickdeals). Currently her focus is on security, helping people understand how best to protect themselves online. Her work has previously appeared in PC Gamer, IGN, Maximum PC, and Official Xbox Magazine.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleI finally replaced my PC hard drive with an SSD and you should, too
    Next Article ASUS and Microsoft made a handheld Xbox console
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

    June 25, 2025

    Windows 10 gets an extra year of free security updates (with a catch)

    June 25, 2025

    Philps Hue smart lights are already pricey. They’re about to get pricier

    June 25, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202525 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202516 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Gadgets June 25, 2025

    POCO F7 Launches in Malaysia with Snapdragon 8s Gen 4, Flagship Power, Bold Design, and Early Bird Deals

    POCO F7 Launches in Malaysia with Snapdragon 8s Gen 4, Flagship Power, Bold Design, and…

    Next Galaxy Z foldables to be announced on 9 July

    Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

    Windows 10 gets an extra year of free security updates (with a catch)

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    POCO F7 Launches in Malaysia with Snapdragon 8s Gen 4, Flagship Power, Bold Design, and Early Bird Deals

    June 25, 20250 Views

    Next Galaxy Z foldables to be announced on 9 July

    June 25, 20250 Views

    Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

    June 25, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.