pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Leaked passwords and phone numbers: how to act depending on the information that has been exposed

Data breaches have become more common than ever. The Identity Theft Resource Center found that there were only 238 fewer data breaches in the first nine months of 2021 than all of 2017.

Many cyberattacks are orchestrated against SMEs. However, individual consumers are becoming targets as well. This has created major concerns for citizens all over the world.

If you have found that some of your data has been compromised, then you need to take proper measures right away. The right steps are going to depend on the type of data that was exposed.

What to Do When Your Data is Exposed

The Internet has become a sort of disaster drawer where you can store your entire life. From your bank details and the messages you exchange with friends and family to your photographs. Cybercriminals can use all this information to make money or develop more targeted attacks. That is why it is important to keep all this information as secure as possible or, at least, to try to do so; because, in the end, no matter how many means the Internet user puts in place, leaks still occur.
The first thing the user has to do, if he is aware that he has suffered a leak, “is to remain calm”, as the institution explains. Only old data may have been exposed, such as the address of an old home or a password that has already been replaced.

“When a leak is made public, it is common that the type of data that has been leaked is also public, either because the attackers have made it known or because the attacked company itself has made an official statement,” Incibe points out. Despite this, we must be aware that when a company that provides us with a service, whether it is a social network or a bank, suffers a leak, any data that has been shared with it can be exposed. Once we are aware of what exactly is available to third parties, we will have to act in one way or another depending on the data that has been exposed.

For passwords
Passwords are the keys that give access to any online platform we use. If they have been leaked, whoever has access to the data will obviously be able to enter the victim’s site and impersonate them. Thanks to this, they can also carry out targeted attacks against the victim’s contacts to steal more information.

If a password has been leaked, of course, the first thing the Internet user should do is to change it quickly and set a strong password. It is also advisable to activate two-step verification if the platform in question allows it. Thanks to this, the user will have an extra password that will be necessary to log in to the account; if the cybercriminal does not have it in his possession, he will not be able to get it.

“That’s the most important thing. Two-factor authentication is something you have on your mobile. When it is active the cybercriminal needs two things to access your account, and that makes it much more complicated,” explains in conversation with ABC Josep Albors, head of research and awareness at cybersecurity company ESET.

Password vaults often offer within their capabilities a password generator that creates unique and hard-to-hack passwords.

Phones and emails
If the email or phone number has been leaked, the attacker can use that data to launch targeted attacks against the victim of the leak. If we talk about the phone, these can arrive via SMS, call or WhatsApp. Precisely, Incibe warned just a week ago about a new campaign aimed at stealing passwords to the messaging ‘app’ owned by Facebook.

If the email is leaked, the cybercriminal can start ‘bombarding’ the victim with ‘phishing’ attacks so that, without realizing it, they end up taking the bait and revealing their data.

To try to reduce the impact of a leak of this type, Incibe recommends using alternative e-mail addresses and temporary telephone numbers to register on the online platforms we use; at least whenever possible: “This way, we will avoid unwanted advertising and the risks of this type of leaks”.

Names, addresses or DNI
As with the previous cases, this information can be used to supplant the victim’s identity and carry out all kinds of illicit activities. “For example, they could register services in our name, such as rentals, insurance or services such as water or electricity, especially if account numbers or images of our DNI have been leaked,” they point out from Incibe.

If this information has been leaked, we can try to minimize the impact by carrying out practices such as egosurfing from time to time. That is to say, searching our name on the Net from time to time in search of fake profiles or suspicious activity: “Similarly, it is advisable not to use this information unless it is essential”.
Banking data
Bank details are among the information of most interest to cybercriminal groups. That is why cyber-scam campaigns aimed specifically at stealing it are not uncommon. Sometimes even impersonating banking institutions via email or SMS.

In the event that this information is leaked, the best thing the Internet user can do to minimize the risks, as pointed out by the National Institute of Cybersecurity, is to “notify our bank so that they can evaluate the risk and take the appropriate measures, such as cancelling the bank card and identifying possible suspicious activities”.

Leaked passwords can result in multi-million losses. This is why many large organizations use privileged password management solutions.

Filed Under: Articles

Latest Articles

Celeron Coppermine

In the spring of 2000 the packaging picture became even more complicated with the announcement of the first Celeron processors derived from Intel's 0.18-micron Pentium III Coppermine core. These were produced using yet another form factor - … [Read More...]

Best Productivity Boosting Apps for 2016

Best Productivity Boosting Apps for 2017

One thing is for certain — software is developing at such rate that it has become increasingly hard for us to keep track of everything that’s hitting the market. That is why we decided to do the job for you. We have searched the Web high and low for productivity tools that can help you finish … [Read More...]

5 Must Have Products to Survive an Apocalypse (or Zombie Take Over)

Ok.  Maybe zombies won't take over the world and perhaps End Times will never come but these 5 must have products will surely help to save your life in case of emergency.   Product Number 5: WATERPROOF FIRESTARTER With out fire most people won't survive in the wild.  It's not starvation … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Case Study on a Spear Phishing Campaign from the Energy Secto

Earlier this week, we wrote an article on the threats of spear phishing. We thought we could drive the lesson home with a story about a spear phishing … [Read More...]

VBR

VBR Definition: Variable Bit Rate: maximum throughput set in advance, but data not always sent evenly. … [Read More...]

Learning to Develop Exceptional Data Science Applications with Python

In this article we will see the learning path in Python that I suggest to go from 0 to solve Data Science and Machine Learning problems. So ready, … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors