What data was compromised:
- Email addresses
- Dates of birth
- Geographic locations, Names, Usernames
Breach data provided by Have I Been Pwned
Find out if you were involved in this breachWe’ll help you quickly see if your email address was exposed in this breach, and understand what to do next.
What to do for this breach
We recommend you take these steps to keep your personal info safe and protect your digital identity.
- Change your password
Make this password unique and different from any others you use. A good strategy to follow is to combine two or more unrelated words to create an entire passphrase, and include numbers and symbols.
- Update other logins using the same password
Reusing passwords turns a single data breach into many. Now that this password is out there, hackers could use it to get in to other accounts.
- Use an email mask
Giving out your real email address makes it easier for hackers or trackers to find your passwords or target you online. A service like Firefox Relay hides your real email address while forwarding emails to your real inbox.Try Firefox Relay
- Avoid using personal info in PINs
Because your date of birth is easy to find in public records, it’s best to avoid using it in passwords and PINs. People who know your birthday could also very easily guess your PIN.
- Use unique, strong passwords for every account
Password reuse puts all your accounts at risk. This means that if one password gets exposed, hackers have the keys to many accounts.
- Store passwords in a safe place
Put your login details in a secure place only you can access, such as a password manager. This also makes it easy to keep track of all your different passwords.
- Be cautious about giving out personal information
Don’t hand out personal data if you don’t have to. If you are asked to enter or give out your email address, ZIP code, or phone number, you can say no.
- Update software and apps regularly
Updating your smartphone apps, browsers, and operating systems makes your devices more secure. These updates fix bugs, software vulnerabilities, and security problems.