{"id":470,"date":"2021-02-03T13:24:30","date_gmt":"2021-02-03T13:24:30","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=470"},"modified":"2021-02-03T13:24:30","modified_gmt":"2021-02-03T13:24:30","slug":"see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/","title":{"rendered":"See if your credentials have been compromised with this new data leak tool"},"content":{"rendered":"<p>As our day to day lives become increasingly digital, securing our online accounts has become more important than ever but what happens when our credentials are exposed in a <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/what-is-a-data-breach\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">data breach<\/a>?<\/p>\n<p>While organizations are legally required to issue data breach notices after falling victim to a cyberattack, some breaches go unreported and users are not informed that their credentials have been stolen by cybercriminals. This is why tools like <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/nordvpn-and-haveibeenpwned-creator-team-up-for-online-security-push\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">HaveIBeenPwned<\/a> have become so popular as they allow users to see if any of their personal information has been exposed online.<\/p>\n<aside class=\"hawk-placeholder\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" data-widget-id=\"5545165870974731000\" data-result=\"missing\"><\/aside>\n<p>However, HaveIBeenPwned isn&#8217;t the only such tool available. The news outlet <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/adult-streaming-site-myfreecams-has-two-million-user-records-stolen\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">CyberNews<\/a> has created is own data leak checker which now includes more than 15bn accounts as well as over 2.5bn unique email addresses in its breach database.<\/p>\n<ul>\n<li>We&#8217;ve assembled a list of the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best endpoint protection software<\/a><\/li>\n<li>Keep your devices virus free with the\u00a0<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-malware-removal\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best malware removal software<\/a><\/li>\n<li>Also check out our roundup of the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/password-manager\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best password managers<\/a><\/li>\n<\/ul>\n<p>Falling victim to <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-identity-theft-protection\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">identity theft<\/a> as a result of a data breach can be a devastating experience that will likely take years to recover from. For this reason, taking proactive steps such as using <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-antivirus\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">antivirus software<\/a>, a <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/password-manager\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">password manager<\/a> and CyberNews&#8217; <a class=\"hawk-link-parsed\" href=\"https:\/\/cybernews.com\/personal-data-leak-check\/\" target=\"_blank\" rel=\"noopener\" data-url=\"https:\/\/cybernews.com\/personal-data-leak-check\/\" data-component-tracked=\"1\">free tool<\/a> can help users secure their accounts and protect their personal data online.<\/p>\n<h2 id=\"cybernews-data-leak-checker\">CyberNews data leak checker<\/h2>\n<p>CyberNews has built up its database of compromised online accounts by having a dedicated team of security experts monitor hacker communities on the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/over-15-billion-stolen-credentials-are-for-sale-on-the-dark-web-now\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">dark web<\/a> for exposed and stolen data. This database is the basis of the company&#8217;s data leak checker but the information gathered by its security experts is also used to produce blog posts and other research to help internet users stay informed of the myriad of cyber threats out there.<\/p>\n<p>The CyberNews data leak checker database contains hashed email addresses and leak sources from various breaches. To protect this data, all of the information in the database is hashed with one of the safest hashing algorithms currently available, the Blowfish-based crypt also known as <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/popular-pdf-reader-has-database-of-77-miliion-users-hacked-and-leaked-online\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">bcrypt<\/a>.<\/p>\n<p>Furthermore, all emails in the database are anonymised and linked only to the source of their respective leak. CyberNews does not collect any emails entered into its data leak check tool and nothing is logged when users take advantage of the tool to see if their account credentials have been exposed online.<\/p>\n<p>Source: Tech Radar<\/p>\n<p><a href=\"https:\/\/www.techradar.com\/news\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\">Read the Full Story Here<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As our day to day lives become increasingly digital, securing our online accounts has become more important than ever but what happens when our credentials are exposed in a data breach? While organizations are legally required to issue data breach notices after falling victim to a cyberattack, some breaches go unreported and users are not [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>See if your credentials have been compromised with this new data leak tool - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"See if your credentials have been compromised with this new data leak tool - Community\" \/>\n<meta property=\"og:description\" content=\"As our day to day lives become increasingly digital, securing our online accounts has become more important than ever but what happens when our credentials are exposed in a data breach? While organizations are legally required to issue data breach notices after falling victim to a cyberattack, some breaches go unreported and users are not [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-03T13:24:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"959\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/\",\"name\":\"See if your credentials have been compromised with this new data leak tool - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg\",\"datePublished\":\"2021-02-03T13:24:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg\",\"width\":1280,\"height\":959},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"See if your credentials have been compromised with this new data leak tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"See if your credentials have been compromised with this new data leak tool - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/","og_locale":"en_US","og_type":"article","og_title":"See if your credentials have been compromised with this new data leak tool - Community","og_description":"As our day to day lives become increasingly digital, securing our online accounts has become more important than ever but what happens when our credentials are exposed in a data breach? While organizations are legally required to issue data breach notices after falling victim to a cyberattack, some breaches go unreported and users are not [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-02-03T13:24:30+00:00","og_image":[{"width":1280,"height":959,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/","name":"See if your credentials have been compromised with this new data leak tool - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg","datePublished":"2021-02-03T13:24:30+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/coding-computer-data-depth-of-field-577585.jpg","width":1280,"height":959},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/see-if-your-credentials-have-been-compromised-with-this-new-data-leak-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"See if your credentials have been compromised with this new data leak tool"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=470"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/470\/revisions"}],"predecessor-version":[{"id":471,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/470\/revisions\/471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/152"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}