• Overview

    On ⁨May 17, 2017⁩, ⁨Zomato⁩ was breached. Once the breach was discovered and verified, it was added to our database on ⁨September 4, 2017⁩.
    Why did it take so long to report this breach?

    What data was compromised:

    • Passwords
    • Email addresses

    Breach data provided by Have I Been Pwned

    What to do for this breach

    We recommend you take these steps to keep your personal info safe and protect your digital identity.

    Change your password

    Make this password unique and different from any others you use. A good strategy to follow is to combine two or more unrelated words to create an entire passphrase, and include numbers and symbols.

    Update other logins using the same password

    Reusing passwords turns a single data breach into many. Now that this password is out there, hackers could use it to get in to other accounts.

    Use unique, strong passwords for every account

    Password reuse puts all your accounts at risk. This means that if one password gets exposed, hackers have the keys to many accounts.

    Store passwords in a safe place

    Put your login details in a secure place only you can access, such as a password manager. This also makes it easy to keep track of all your different passwords.

    Be cautious about giving out personal information

    Don’t hand out personal data if you don’t have to. If you are asked to enter or give out your email address, ZIP code, or phone number, you can say no.

    Update software and apps regularly

    Updating your smartphone apps, browsers, and operating systems makes your devices more secure. These updates fix bugs, software vulnerabilities, and security problems.

    What is a website breach?

    A website data breach happens when cyber criminals steal, copy, or expose personal information from online accounts. It’s usually a result of hackers finding a weak spot in the website’s security. Breaches can also happen when account information gets leaked by accident.

    Why did it take so long to report this breach?

    It can sometimes take months or years for credentials exposed in a data breach to appear on the dark web. Breaches get added to our database as soon as they have been discovered and verified.