Categories: Security News

PassProtect – Google Chrome Plugin Tell You If your Password has Been Breached

A new free Chrome extension “PassProtect” to check in real-time whether you have been using already a breached password in the past.

It quickly checks your password with Have I Been Pwned that contains hundreds of millions of leaked accounts. If your password found in the list, then it shows “unsafe password detected” and the password is found in the 68,340 data breaches.

Okta introduced the new Chrome plugin powered by the HaveIBeenPwned database ” PassProtect quickly alerts users of possible “riskier” passwords so they can take action immediately and without compromising privacy.”

To check the password with Have I Been Pwned API PassProtect using k-anonymity communication protocol that ensures that your passwords are never seen, stored, or sent over the network during this checking process.

PassProtect is published under the MIT license so developers can integrate directly to the website or the app, it is available only for Chrome now and will be soon to Firefox.

Here is the list of worst passwords used in 2017 that extracted by SplashData from Five million passwords leaked.

Last year many of critical data breaches have been reported and many of organization lost million of sensitive data’s and millions of customer passwords that have been stored even in plain text.

Targeted attacks are becoming more frequent, and more successful, and this poses a serious challenge for security administrators everywhere.

With haveibeenpwned you can check that your account has been compromised in the largest breaches.

It was launched by Hunt to help organizations avoid using passwords that have previously appeared in a data breach or have been otherwise compromised in the past.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…

6 hours ago

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites,…

6 hours ago

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

1 day ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

2 days ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago