16 billion passwords leaked in breach affecting Google, Apple and Facebook

NEWYou can now listen to Fox News articles!
Your personal data is collected by almost all the sites or applications you visit. The world is more hungry for data than ever, because it is now the most important asset, even more precious than oil. Your shopping history is recorded, your search history is captured and your telephone number, your email address and your identifiers are all stored.
But that does not mean that all this data is safe. If you have already received a spam call, a phishing email or a false assistance call, your personal data is available.
And if you want evidence of the maliciousness of your processed data, a newly discovered database offers a brutal reminder. More than 16 billion connection titles, collected from years of past data violations, were compiled in one of the largest aggregated archives of cybersecurity incidents never seen, according to a report.
Register for my free cyberguy report
Get my best technological advice, my urgent safety alerts and my exclusive offers delivered directly in your reception box. In addition, you will get instant access to my survival guide at the ultimate – free scam when you register.
10 signs your personal data is sold online

A woman working on her laptop (Kurt “Cyberguy” KTUSSON)
What you need to know about the violation of data of 16 billion passwords affecting Google, Apple and Facebook
Cyberness Describe the database exposed as a “mass exploitation plan”. Records include connection identification information from popular platforms like Google, Facebook and Apple.
Security researchers point out that this is not the result of a new single violation. Instead, it is a massive collection of references previously stolen from various past leaks, phishing scams and third-party data exhibitions, some of which have been forgotten, underestimated or linked.
Bleeping Complete, A cybersecurity site that examined the archives has confirmed that the data seems to be aggregated from older violations rather than a new incident. This makes the extent of the exposure particularly dangerous because the attackers can use this central trow for targeted attacks, including the farce of diplomas.
The stuffing of identification information becomes much easier when the attackers have access to a group of user names and passwords as large. This technique is to use connection details stolen on several sites, exploiting the fact that many users reuse the same identification information. Thus, even if your account was not part of a recent violation, you could always be in danger if your old identification information is part of this newly indexed compilation.

An illustration of a pirate at work (Kurt “Cyberguy” KTUSSON)
Doubleclickjacking Hack transforms double clicks into account
How Google and Meta respond to the massive password leakage
We contacted Apple, Google and Meta to comment.
A Google spokesperson said that this problem does not come from a violation of Google data and that Google continues to strongly encourage users to adopt more secure and password authentication methods, such as passing key. They also suggest using tools like Google Password Manager, which safely stores your passwords and informs you when they have been involved in a violation, allowing you to take immediate measures.
A Meta representative said: “We have no declaration to share for the moment because we are still examining this”, but we have offered some Advice to secure your accountA Safety control tooland the Introduction of Passkeys on Facebook.
We have not heard of Apple before our deadline.
What is artificial intelligence (AI)?

A Google smartphone (Kurt “Cyberguy” KTUSSON)
Malventy software exposes 3.9 billion passwords in a huge threat of cybersecurity
5 essential ways to protect you after the violation of Apple data, Google
With identification leaks becoming a growing threat, protecting your data requires a mixture of smart safety habits and reliable tools. Here are five effective ways to protect your information.
1. Use a password manager: Malventy software Infosteller often targets passwords saved directly in web browsers, making it easy targets. Instead of counting on your browser to store identification information, use a dedicated password manager that offers a knowledge architecture and military quality encryption to ensure the security of your data. The best options work on all your devices and browsers, offer secure sharing, monitor data violations and even generate health reports on your passwords. Get more details on my Best password managers evaluated by experts from 2025 here.
2. Activate two -factors authentication (2FA): Even if your identification information is stolen, 2fa Add an additional layer of security by requiring a second form of verification, such as an authentication application code or biometric confirmation. Cybercriminals are based on user names and stolen passwords to break into accounts, but with 2FA activated, they cannot access the additional security stage. Be sure to activate 2FA on important accounts such as emails, banks and work-related connections.
3. Use strong antivirus software and be careful with downloads and links: The infosaler’s malicious software often spread through malicious downloads, phishing emails and false websites. Avoid downloading software or files from unreliable sources and always reveals links before clicking them. The attackers disguise malware such as legitimate software, game cheaters or cracked applications, so it is preferable to stick to official websites and application stores for downloads.
The best way to protect yourself from malware is to install antivirus software on all your devices. This protection can also alert you to phishing emails and ransomware scams, protecting your personal information and digital assets. Get my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Keep the software up to date: Cybercriminals use obsolete software to provide malware. Keep your operating system, your browsers and your up -to -date security software ensures that known vulnerabilities are corrected. Activate automatic updates to the extent possible, and install antivirus protection software or deemed termination point which can detect and block threats to infostal before compromising your system.
5. Consider a personal data deletion service: The massive leak of 16 billion identification shows how your personal information can spread and to what facility it can resurface years later in the aggregated databases of pirates. Even if your passwords were part of an old violation, data such as your name, email, telephone number or address may always be available via data broker sites. Personal data deletion services can help reduce your exposure by rubbing this information from these hundreds of these sites. Although no service can guarantee total deletion, they considerably reduce your digital footprint, which makes it more difficult for crooks to cross identification information disclosed with public data to usurp or target you. These services automatically monitor and delete your personal information over time, which gives me peace of mind in the landscape of threats today. Consult my best choices for data deletion services here.
Get free scan To find out if your personal information is already on the web
Chaos ransomware reaches Optima tax relief, fled 69 GB of data
Kurt de Kurt to remember
Passwords are no longer enough. This is why I have always believed that technological companies should consider them entirely and require two -factor authentication at all levels. Passwords, once the foundation of online identity, are now one of its weakest links. Companies like Google and Meta are already building systems that go beyond them. The tools are available. The message is clear. You don’t need to wait a breach to start taking safety seriously.
Click here to obtain the Fox News app
Do you think that technological companies invest sufficiently in their cybersecurity infrastructure? Let us know by writing to Cyberguy.com/contact.
For more of my technical advice and my security alerts, subscribe to my free Cyberguy Report newsletter by going to Cyberguy.com/newsletter
Ask Kurt or let us know what stories you would like us to cover
Follow Kurt on his social channels
Answers to the most posed Cyberguy questions:
Kurt new:
Copyright 2025 cyberguy.com. All rights reserved.