Categories: Security News

PassProtect – Google Chrome Plugin Tell You If your Password has Been Breached

A new free Chrome extension “PassProtect” to check in real-time whether you have been using already a breached password in the past.

It quickly checks your password with Have I Been Pwned that contains hundreds of millions of leaked accounts. If your password found in the list, then it shows “unsafe password detected” and the password is found in the 68,340 data breaches.

Okta introduced the new Chrome plugin powered by the HaveIBeenPwned database ” PassProtect quickly alerts users of possible “riskier” passwords so they can take action immediately and without compromising privacy.”

To check the password with Have I Been Pwned API PassProtect using k-anonymity communication protocol that ensures that your passwords are never seen, stored, or sent over the network during this checking process.

PassProtect is published under the MIT license so developers can integrate directly to the website or the app, it is available only for Chrome now and will be soon to Firefox.

Here is the list of worst passwords used in 2017 that extracted by SplashData from Five million passwords leaked.

Last year many of critical data breaches have been reported and many of organization lost million of sensitive data’s and millions of customer passwords that have been stored even in plain text.

Targeted attacks are becoming more frequent, and more successful, and this poses a serious challenge for security administrators everywhere.

With haveibeenpwned you can check that your account has been compromised in the largest breaches.

It was launched by Hunt to help organizations avoid using passwords that have previously appeared in a data breach or have been otherwise compromised in the past.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

19 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

19 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

19 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

19 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

19 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

1 day ago