قالب وردپرس درنا توس
Home / Tips and Tricks / Are my passwords on the dark web? How to monitor your information after a crime

Are my passwords on the dark web? How to monitor your information after a crime



  cybersecurity-hacking-15

Graphics by Pixabay / Illustration by CNET

You usually learn long after a crime that your information has been stolen when Equifax, Yahoo or another company you trust with your information tells you that your birthday, social security or credit card number, health records or other personal information have been exposed as part of a hack.

With your stolen information, hackers can do anything from making purchases and opening credit accounts in your name to applying for your tax refunds and making medical claims, all posing as "you." And what's worse, billions of these hacked login details are available on the dark web, nicely packaged for hackers to easily download for free.

You cannot stop hacked sites, but you can take some steps to limit the damage done from the violation. If you use a password manager that creates unique passwords, you can ensure that if a site is broken, your stolen password will not allow hackers to access your accounts on other sites. (A good password manager can help you manage all your login information, making it easy to create and then use unique passwords.)





<img src = "https://cnet3.cbsistatic.com/img/KXbE073FNhECPpYO8kl3aGsRk84=/196×1 /2019/12/04/aa7a6a31-00a2-46bc-b7fe-fa07c7ea69cb/dark-web-image.jpg "class =" photo "alt =" http://www.cnet.com/ "height =" 110 "width = "196 [19659007] Now playing:
Watch this:

Is your login information on the dark web? Find out …





02:08

But after a hack, a couple of monitoring tools can alert you to which of your stolen references are out in the wild on the dark web, giving you a start in limiting the damage that thieves can do. Here's how to use two free monitoring tools – Mozilla's Firefox Monitor and Google's password control – to see which of your emails and passwords are compromised so you can take action.

How to use Mozilla's Firefox Monitor

Mozilla's free Firefox Monitor service helps you track which of your emails have been part of known data breaches.

1. To start, go to the Firefox Monitor page.

  monitoremailbreach.png "height =" 0 "width =" 370 "data-original =" https://cnet1.cbsistatic.com/img/n3eCr1ltwrS-nuuFzSXk5EAow1M=/370x0/2019/12/03/555473c39-8fd4 -4ec6-9c19-8630a52e07ee / monitoremailbreach.png

Mozilla's Firefox Monitor identified 4 violations for this email. [19659018] Screenshot Clifford Colby / CNET

2nd Enter an email address and press Check Crime . If the email was part of a known violation since 2007, Monitor will show you which hack it was part of and what else may have been exposed.

3. Below a crime, press More about this crime to see what steps Mozilla recommends, like updating your password.

You can also register to have Monitor notify you if your email is involved in a future data breach. Monitor scans your email address against the found data breaches and alerts you if you were involved.

1. On the Firefox Monitor page, touch Sign up for the Alerts button.

2. If you need to, create a Firefox account.

3. Press Log in to see a summary of violations for your email.

4. At the bottom of the page, you can add additional email addresses to monitor. Mozilla then sends an email to each address you add with a subject line "Firefox Monitor found your information in these violations" when it finds the email address involved in a violation, along with instructions on what to do to follow the violation. [19659012] How to Use Google Password Verification

As part of its password manager, Google offers the Password Verifier, which monitors the usernames and passwords you use to log in to sites outside of Google's domain and notifies you of these login credentials. (You may remember password checking when it was a Chrome extension that you had to add separately to Google's browser. This is the same tool that was inserted into Google's password manager.)

  googleissues.png "height =" 0 " width = "370" data-original = "https://cnet3.cbsistatic.com/img/PHZ643ZMSltJD78vEjCot0facXo=/370x0/2019/12/03/572d64ec-8d57-4860-a077-6920c1198448/googleissues.pngstrong19659029stronggoogleissues 0 "width =" 370

Google password checks find some password issues.


Screenshot Clifford Colby / CNET

first If you use Google's password service to keep track of your Chrome or Android login information, go to the Google Password Manager website and press Check password .

2. Press Check password again to verify that you are.

3. Enter your Google Account password.

4. After thinking a little, Google will display all the problems it found, including compromised, reused and weak passwords.

5. Next to each recused or weak password, there is a Change Password button that you can press to select a more secure one.

How else can you look at fraud

In addition to the tools from Mozilla and Google, you can take some additional steps to look for fraud.

Monitor your credit reports. To help you detect identity theft early, you can request a free credit report per year from each of the three major credit bureaus – Equifax, Experian and TransUnion – to check if you know of unfamiliar activity, such as a new account that you don't made open. (Note that Equifax itself was part of a massive data breach.) You should also check your credit cards and bank statements for unexpected charges and payments. Unexpected fees can be a sign that someone has access to your account.

Sign up for a credit monitoring service. If you want to take a more active hand when looking for fraud, you can sign up with a credit monitoring service that constantly monitors your credit report at major credit bureaus and alerts you when it detects unusual activity. With a monitoring service, you can set up fraud alerts that notify you if someone is trying to use your identity to create credit. A credit reporting service like LifeLock can cost $ 8 to $ 25 a month – or you can use a free service like the one from Credit Karma that lacks other services, such as monitoring for suspicious use of your social security number.

For more on how to keep your data secure, see our guides on how to protect your phone's privacy and what a VPN can and cannot do.


Source link