: Attackers use the personal data found in these breaches to craft highly convincing, targeted phishing emails. 4. Defensive Strategies

: For information on how torrents are used for legitimate research (as a counterpoint), see Academic Torrents .

: Collection #1 was a set of email addresses and passwords totaling roughly 2.7 billion records (773 million unique emails).

: Mention services like Have I Been Pwned which allow users to check if their data was included in this specific torrent.

Our weekly newsletter

Sign up to get updates on articles, interviews and events.