Technology
26 billion reasons to protect yourself after a massive data leak is exposed
‘CyberGuy’: The spy in the sky
Kurt Knutsson introduces you to the Evolution Eagle, a stealthy and versatile drone that can fly like a real bird of prey and protect the sky from various threats.
A massive data breach leaked more than 26 billion records online, exposing information from some of the most-visited websites on the web. The team at CyberNews.com, along with cyber researcher Bob Dyachenko, discovered those records. Later, data breach search engine Leak Lookup revealed it was the owner of all of that information, which leaked because of a firewall misconfiguration back in December. Here’s what you need to know about the Mother of All Breaches and how to protect yourself.
UNLOCK EXCLUSIVE INSIGHTS: JOIN KURT’S CYBERGUY NEWSLETTER FOR FREE TO GET SECURITY ALERTS AND LIFE-CHANGING HACKS TO YOUR INBOX
Computers used in hack attacks (Kurt “CyberGuy” Knutsson)
The mother of all breaches
Thousands of websites had their records exposed in this supermassive breach. That includes websites like X, LinkedIn, Evite and more. Here’s a breakdown of the ten websites with the most exposed data in the breach:
- Tencent – 1.5 billion records leaked
- Weibo – 504 million records leaked
- MySpace – 360 million records leaked
- X– 281 million records leaked
- Wattpad – 271 million records leaked
- NetEase – 261 million records leaked
- Deezer – 258 million records leaked
- LinkedIn – 251 million records leaked
- AdultFriendFinder – 220 million records leaked
- Zynga – 217 million records leaked
According to CyberNews.com, government information was also exposed in the breach. While the breach mostly contains information from previous data breaches, CyberNews.com believes it also contains new information as well.
Hackers typing on keyboards (Kurt “CyberGuy” Knutsson)
MORE: HOW HACKERS ARE TARGETING X VERIFICATION ACCOUNTS TO TRICK YOU
How can I check if my information was sold on the dark web?
You can go to haveibeenpwned.com to check if someone has sold your data on the dark web. Just enter your email address into the search bar. The website searches the web to see if hackers or breaches leaked your information. It will also let you know if there were data breaches associated with your email address on various sites.
Illustration of data on a computer screen (Kurt “CyberGuy” Knutsson)
MORE: HOW TO PROTECT YOURSELF FROM STREAMING HACKS
What do I do if my data has been stolen?
If you see that your information was part of any sort of breach, you should do the following.
1) Log out of accounts
First, log out of all your accounts on every web browser on your computer. Once you’ve done that, you should clear your browser history.
2) Scan your device
Think of it as a digital health check-up. Use a trusted antivirus, to run a comprehensive scan to detect and remove any lingering traces of malware. The best way to protect yourself from having your data breached is to have antivirus protection installed on all your devices.
Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.
3) Change your passwords
If hackers or data breaches expose your passwords, be sure to change them immediately. Be sure to create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.
It also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. Our tips and best expert-reviewed password managers can be found here:
4) Use two-factor authentication
Implementing two-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts. This way, even if someone steals your password, they will not be able to access your account without the second factor, such as a code sent to your phone or email.
5) Invest in removal services
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. I have found these to be very effective for continual removal.
The first time I tried one, everything I did not want to see about myself was gone. Then months later, it bubbled back into the crevices of Google. That’s when I learned that subscribing to removal services that constantly scour and remove private data is the way to go. Check out my top picks for removal services here.
6) Contact your financial institutions
Contact your bank, credit card company, or other financial institutions if you suspect any fraudulent activity on your accounts.
7) Monitor credit reports
Monitor your credit reports and scores for any signs of identity theft or unauthorized inquiries.
8) Use a VPN
Consider using a VPN to protect your online activity and data. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.
9) Report the data breach
Report the data breach to the relevant authorities and organizations, such as the Federal Trade Commission, the Internet Crime Complaint Center, or the local police.
MORE: HOW HACKERS CAN SEND TEXT MESSAGES FROM YOUR PHONE WITHOUT YOU KNOWING
Kurt’s key takeaways
A super leak like this is almost unprecedented. While we’ve seen huge breaches before, we’ve never seen anything that contains more than 26 billion records. This leak should stress how important it is to protect your data. Use password managers, and at the very least, different passwords for each of your logins. While it’s easy to use the same couple of passwords, if those passwords are exposed, you’ve just given hackers free access to your other accounts.
How do you protect yourself from data breaches? Are you worried about bigger data breaches to come? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Department of Justice appeals Google search monopoly ruling
On Tuesday, the Department of Justice and the plaintiffs in the antitrust case against Google filed a cross-appeal, as the DOJ Antitrust Division announced in a post on X: “Today, the DOJ Antitrust Division filed notice that it will cross-appeal from the remedies decisions in its case against Google’s unlawful monopolization of internet search and search advertising.”
Just a few weeks ago, Google itself filed a notice to appeal and requested a pause on the remedies ordered by DC District Court Judge Amit Mehta last year. Those remedies included requiring Google to share search data with its rivals and barring Google from making exclusive distribution deals for its search or AI products that could hinder distribution for competitors. However, Google was ultimately not required to sell its Chrome browser and wasn’t barred from paying distribution partners for preloading or premium placement of its search or AI products.
The DOJ’s cross-appeal suggests that neither party is fully satisfied with Judge Mehta’s ruling in the case, or at least the remedies ordered in September.
Technology
149 million passwords exposed in massive credential leak
NEWYou can now listen to Fox News articles!
It has been a rough start to the year for password security. A massive database containing 149 million stolen logins and passwords was found publicly exposed online.
The data included credentials tied to an estimated 48 million Gmail accounts, along with millions more from popular services. Cybersecurity researcher Jeremiah Fowler, who discovered the database, confirmed it was not password-protected or encrypted. Anyone who found it could have accessed the data.
Here is what we know so far and what you should do next.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN
A publicly exposed database left millions of usernames and passwords accessible to anyone who found it online. (Wei Leng Tay/Bloomberg via Getty Images)
What was found in the exposed database
The database contained 149,404,754 unique usernames and passwords. It totaled roughly 96 GB of raw credential data. Fowler said the exposed files included email addresses, usernames, passwords and direct login URLs for accounts across many platforms. Some records also showed signs of info-stealing malware, which silently captures credentials from infected devices.
Importantly, this was not a new breach of Google, Meta or other companies. Instead, the database appears to be a compilation of credentials stolen over time from past breaches and malware infections. That distinction matters, but the risk to users remains real.
Which accounts appeared most often
Based on estimates shared by Fowler, the following services had the highest number of credentials in the exposed database.
- 48 million – Gmail
- 17 million – Facebook
- 6.5 million – Instagram
- 4 million – Yahoo Mail
- 3.4 million – Netflix
- 1.5 million – Outlook
- 1.4 million – .edu email accounts
- 900,000 – iCloud Mail
- 780,000 – TikTok
- 420,000 – Binance
- 100,000 – OnlyFans
Email accounts dominated the dataset, which matters because access to email often unlocks other accounts. A compromised inbox can be used to reset passwords, access private documents, read years of messages and impersonate the account holder. That is why Gmail appearing so frequently in this database raises concerns beyond any single service.
SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA
Email accounts appeared most often in the leaked data, which is especially concerning because inbox access can unlock many other accounts. (Felix Zahn/Photothek via Getty Images)
Why the exposed database creates serious security risks
This exposed database was not abandoned or forgotten. The number of records increased while Fowler was investigating it, which suggests the malware feeding it was still active. There was also no ownership information attached to the database. After multiple attempts, Fowler reported it directly to the hosting provider. It took nearly a month before the database was finally taken offline. During that time, anyone with a browser could have searched it. That reality raises the stakes for everyday users.
This was not a traditional hack or company breach
Hackers did not break into Google or Meta systems. Instead, malware infected individual devices and harvested login details as people typed them or stored them in browsers. This type of malware is often spread through fake software updates, malicious email attachments, compromised browser extensions or deceptive ads. Once a device is infected, simply changing passwords does not solve the problem unless the malware is removed.
TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY
Researchers believe infostealing malware collected the credentials, silently harvesting logins from infected devices over time. (Jaap Arriens/NurPhoto via Getty Images)
How to protect your accounts after a massive password leak
This is the most important part. Take these steps even if everything seems fine right now. Credential leaks like this often surface weeks or months later.
1) Stop reusing passwords immediately
Password reuse is one of the biggest risks exposed by this database. If attackers get one working login, they often test it across dozens of sites automatically. Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
2) Switch to passkeys where available
Passkeys replace passwords with device-based authentication tied to biometrics or hardware. That means there is nothing for malware to steal. Gmail and many major platforms already support passkeys, and adoption is growing fast. Turning them on now removes a major attack surface.
3) Enable two-factor authentication on every account
Two-factor authentication (2FA) adds a second checkpoint, even if a password is exposed. Use authenticator apps or hardware keys instead of SMS when possible. This step alone can stop most account takeover attempts tied to stolen credentials.
4) Scan devices for malware with strong antivirus software
Changing passwords will not help if malware is still on your device. Install strong antivirus software and run a full system scan. Remove anything flagged as suspicious before updating passwords or security settings. Keep your operating system and browsers fully updated as well.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Review account activity and login history
Most major services show recent login locations, devices and sessions. Look for unfamiliar activity, especially logins from new countries or devices. Sign out of all sessions if the option is available and reset credentials right away if anything looks off.
6) Use a data removal service to reduce exposure
Stolen credentials often get combined with data scraped from data broker sites. These profiles can include addresses, phone numbers, relatives and work history. Using a data removal service helps reduce the amount of personal information criminals can pair with leaked logins. Less exposed data makes phishing and impersonation attacks harder to pull off.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Close accounts you no longer use
Old accounts are easy targets because people forget to secure them. Close unused services and delete accounts tied to outdated app subscriptions or trials. Fewer accounts mean fewer chances for attackers to get in.
Kurt’s key takeaways
This exposed database is another reminder that credential theft has become an industrial-scale operation. Criminals move fast and often prioritize speed over security. The good news is that simple steps still work. Unique passwords, strong authentication, malware protection and basic cyber hygiene go a long way. Do not panic, but do not ignore this either.
If your email account was compromised today, how many other accounts would fall with it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Switch is now Nintendo’s best-selling console of all time
The original Switch is officially Nintendo’s best-selling console of all time after surpassing the DS handheld in lifetime sales. In its latest earnings release, Nintendo reports that the Nintendo Switch has, as of December 31, 2025, sold 155.37 million units since its launch in 2017, compared to 154.02 million units for the 2004 Nintendo DS.
In November, Nintendo reported that the Switch and DS were neck and neck. We expected the holiday sales period would see the Switch surpass the DS, even with Nintendo announcing that primary development would focus on the Switch 2. Nintendo previously said that it would continue to sell the original Switch “while taking consumer demand and the business environment into consideration.”
Nintendo has to keep selling the Switch if it wants to dethrone Sony’s PlayStation 2 as the best-selling video game console of all time. The PlayStation 2, discontinued in January 2013, sold more than 160 million units over its 13-year lifespan.
Demand for the Switch 2 accelerated over the holidays, with Nintendo reporting 7.01 million units sold during the quarter covering October through December, compared to 4.54 million units in the previous quarter. In total, the Switch 2 has now sold 17.37 million units since it launched in June 2025, taking less than a year to surpass the Wii U’s 13.7 million lifetime sales.
The Switch 2 launch has helped Nintendo to drive a 51 percent increase in net profit over the first nine months of FY26, reaching ¥358.86 billion (about $2.31 billion). Net sales almost doubled during the same period, jumping to ¥1.906 trillion (about $12.2 billion) compared to ¥956.2 billion ($6.1 billion) last year. Looking ahead, Nintendo maintains its forecast to sell 19 million Switch 2 units by the end of this financial year.
-
Indiana2 days ago13-year-old rider dies following incident at northwest Indiana BMX park
-
Massachusetts3 days agoTV star fisherman, crew all presumed dead after boat sinks off Massachusetts coast
-
Tennessee3 days agoUPDATE: Ohio woman charged in shooting death of West TN deputy
-
Pennsylvania1 week agoRare ‘avalanche’ blocks Pennsylvania road during major snowstorm
-
Movie Reviews1 week agoVikram Prabhu’s Sirai Telugu Dubbed OTT Movie Review and Rating
-
Indiana1 day ago13-year-old boy dies in BMX accident, officials, Steel Wheels BMX says
-
Austin, TX4 days ago
TEA is on board with almost all of Austin ISD’s turnaround plans
-
Politics1 week agoTrump’s playbook falters in crisis response to Minneapolis shooting