Oops, all breaches!

Martin Shelton

Principal Researcher

It’s the Digital Security Training team at Freedom of the Press Foundation (FPF), with security news that keeps you, your sources, and your devices safe. If someone has shared this newsletter with you, please subscribe here.

Screenshot: Have I Been Pwned landing page

Screenshot: Have I Been Pwned landing page. (Freedom of the Press Foundation)

In the news

Data breach notification service “Have I Been Pwned?” has added the login information associated with 361 million email addresses. Have I Been Pwned owner Troy Hunt says as many as 151 million of these unique email addresses have never been seen in his database before. The website boasts tracking over 13.5 billion breach accounts. Some of these credentials are reportedly harvested from users’ devices infected with information-stealing malware. However, some are also collected from previously unknown breach data. Because password reuse is so common, attackers also reportedly tried these credentials on multiple online services to identify additional vulnerable websites. Read more.

Get Notified. Take Action.

What you can do

  • Check out “Have I Been Pwned?” to see if any of your email addresses are affected by this breach.
  • Because we know people tend to reuse their passwords, internet troublemakers will try out a breached password on multiple websites — and it often works! This issue underscores the importance of using unique passwords to isolate the leak when it happens. The easiest way to do that is with a password manager, which will help you to automatically generate, secure, and fill out your passwords on websites and apps. Read our guide to choosing a password manager and how to set up two-factor authentication for beginners.
  • When it comes to slowing down information-stealing malware, the most important practice — the digital equivalent of washing your hands — is just staying on top of your security updates to patch vulnerabilities in your apps and operating system. Make the bad guy’s job harder. Read this post from my colleague David Huerta about the story behind your software updates.
  • Antivirus is not a panacea. Depending on what antivirus tools you use, you could be giving it an undue level of permission over your system, so we generally encourage using the software natively built into your Mac or PC. On Windows, you can run a manual scan with the Windows Security "virus & threat protection” feature. On Mac, these protections largely operate behind the scenes. Read David’s blog post, which answers the question, “What about antivirus?

Our team is always ready to assist journalists with digital security concerns. Reach out here, and stay safe and secure out there.



Martin Shelton

Principal Researcher

Freedom of the Press Foundation

Donate to support press freedom

Your support is more important than ever.

Read more about Digital Security Digest

Apple's password app

In the hope of simplifying how customers can log into apps and websites, Apple has announced it will offer a new Passwords app in its upcoming versions of iOS 18, iPadOS 18, and macOS 15.

Slack trains AI models on user data

Over this past week, Slack published a blog post defending its privacy practices following widespread criticism over its use of customer data to train its global AI models. At the moment, organizations are required to opt out to prevent their messages, content, and files from being mined to develop Slack’s AI.

Crossfire over messaging security

Johns Hopkins cryptography professor Matthew Green explains that “the cryptography behind Signal (also used in WhatsApp and several other messengers) is open source and has been intensively reviewed by cryptographers. When it comes to cryptography, this is pretty much the gold standard.” By comparison, Telegram does not provide end-to-end encryption protection by default and only offers it as an option in one-on-one “Secret Chat” mode.