Passwords on the dark web after the T-mobile breach? Protect your data now
Have you been a victim of No financial information, account numbers or passwords were stolen, the company said.? T-Mobile said the cyber attack exposed the personal data of more than 13.1 million current customers and 40 million former or potential customers, including names, dates of birth, social security numbers and other personal information. In total, more than 50 million customers of T-Mobile and its prepaid Metro network may have been compromised in one way or another.
Any personal information stolen that leads data thieves to your identity can allow hackers to do everything, make purchases and open credit accounts in your name, claim your tax refunds, and make claims. medical devices, all pretending to be “you”. Worse yet, billions of these hacked login credentials are available on the dark web,to download easily and free of charge.
You can’t stop, but there are a few steps you can take to check if your information may be compromised and to . If you use a password manager that creates unique passwords, you can make sure that if a site is hacked, your will not give hackers access to your accounts on other sites. can also help you manage all of your login information, making it easy to create and use unique passwords.
After a cyberattack, a few monitoring tools can alert you to stolen credentials that are found out in the wild on the dark web, giving you a good start in limiting the damage thieves can cause. Here’s how to use two free monitoring tools: Google’s Password verification and Mozilla Firefox Monitor – to see which email addresses and passwords are compromised, so you can take action.
How to use Google password verification
As part of his password management service, Google offers the free Password Checker Tool, which monitors the usernames and passwords you use to sign in to sites outside of Google’s domain and warns you if those credentials have been exposed. (You may remember Password verification when it was a Chrome extension, you had to add it separately to Google’s browser. This is the same tool built into Google’s password manager.)
1. If you use Google’s password service to keep track of your Chrome or Android login credentials, go to Google password manager site and press Go to Check Passwords.
2. Faucet Check passwords and make sure it’s you.
3. Enter your Google account password.
4. After giving it a little thought, Google will display all the issues it finds, including compromised, reused, and weak passwords.
5. Next to each reused or weak password is a Change Password button you can press to choose a safer one.
How to use Mozilla Firefox Monitor
Mozilla’s free Firefox Monitor service helps you find out which of your email addresses have been in known data breaches.
1. To get started, head to the Firefox Monitor page.
2. Enter an email address and press Check violations. If the email was part of a known violation since 2007, Monitor will show you which hack it was a part of and what else may have been exposed.
3. Under a breach, press Learn more about this violation to see what was stolen and what steps Mozilla recommends, such as updating your password.
You can also sign up to have Monitor notify you if your email is involved in a future data breach. Monitor analyzes your email address for data breaches found and alerts you if you have been involved.
1. Near the bottom of the Firefox Monitor page, press the Subscribe to alerts button.
2. If you need to, create a Firefox account.
3. Faucet Log in to see a summary of the violation for your email.
4. At the bottom of the page, you can add additional email addresses to watch out for. Mozilla will then send you an email to each address you add with the subject line “Firefox Monitor found your information in these violations” when it finds that email address involved in a violation, along with instructions on how to do so. follow after the violation.
How else to monitor fraud
In addition to tools from Mozilla and Google, there are a few additional steps you can take to monitor fraud.
Monitor your credit reports. To help you quickly detect identity theft, you request one free credit report per year from each of the three major credit bureaus – Equifax, and – to check for unknown activities, such as a new account that you have not opened. (Note that .) You should also check your credit card and bank statements for unexpected charges and payments. Unexpected charges can be a sign that someone has access to your account.
Sign up for a. To more actively monitor fraud, sign up for a credit monitoring service that constantly monitors your credit report on major credit bureaus and . With a monitoring service, you can set fraud alerts that notify you if someone tries to use your identity to create credit. A – or you can use a free service like that of who will monitor credit fraud but not identity fraud, such as someone trying to use your social security number.
Find out more about how to, see our guides on , the , and .