Celebrate secure passwords, with no confetti needed for hacking threats!
Revamped "Have I Been Pwned" Enhances Data Security for Users
Berlin - Cybersecurity expert Troy Hunt has updated his popular website "Have I Been Pwned" (HIBP), adding features to make it easier for users to monitor their data security.
In the revamped version 2.0, users are met with confetti when their entered email addresses return no compromised login or identity data from hacker attacks or data leaks. This positive result is also highlighted with a green frame, aiming to encourage users to regularly check their data's integrity.
Conversely, hits in the database are highlighted with a red frame, and a timeline now provides the month and year of the respective leak. This is especially useful when there are multiple hits for an email address, allowing the user to scroll through the leak events in reverse chronological order.
The update no longer supports searches for usernames and phone numbers, with the database now only capable of searching for email addresses.
The new HIBP 2.0 also includes a detailed description of each leak event that can be accessed by clicking on the "View Details" button. This window provides additional information, such as the scope, risk classification, and categories of data compromised.
As breaches can recur despite a user's best efforts, Hunt suggests that users regularly check their own email addresses on the site. Additional data sets from leaks and hacks on the internet are continuously added to the database.
For a more comprehensive check, users are also advised to use the Identity Leak Checker from the Hasso Plattner Institute (HPI). Both services rely on databases containing numerous leaked identity data.
In the event of hits on either site, users are urged to replace their passwords with new, secure passwords for the respective service as soon as possible. The Federal Office for Information Security (BSI) recommends the use of password managers to manage these complex passwords.
Moreover, activating two-factor authentication (2FA) wherever possible is also advisable, improving account security even if an attacker has obtained a password. An alternative to passwords, Passkeys enable passwordless login using a cryptographic key pair.
These key pairs can be stored on a security USB stick (FIDO2), in a compatible password manager, or in a mobile or desktop operating system. By offering a universal and independent solution, password managers simplify the process of securely logging into various services.
In other news:
- Police in Hamm seek witnesses following a knife attack
- The Bahnhofsmission in Hamm remains under scrutiny amid concerns about financial management
- Threatening letters have been sent to schools in Hamm
In the context of cybersecurity and technology, Troy Hunt's updated "Have I Been Pwned" 2.0 now focuses on monitoring email addresses for compromised data from cyber attacks and data leaks, utilizing technology to help users secure their personal information. For a more thorough check, users are also advised to utilize the Identity Leak Checker from the Hasso Plattner Institute (HPI), another service that relies on databases containing numerous leaked identity data.