Pwned

Pwned, or Have I Been Pwned (HIBP), is a website that allows internet users to check whether their personal data has been compromised by data breaches. It collects and analyzes hundreds of database dumps and pastes that contain information about billions of leaked accounts. Users can search for their own information by entering their username or email address and sign up to be notified if their email address appears in future dumps.

The term pwned originates from a script kiddie term and is a derivation of the word owned, accounted for by the proximity of the p and o keys on a computer keyboard. Pwned is used to imply that someone has been compromised or controlled in some way.

Have I Been Pwned was created by Troy Hunt, a web security expert who spent his time analyzing data breaches for trends and patterns. He created HIBP after an Adobe Systems security breach in October 2013 when 153 million accounts were affected. In December 2013, HIBP was launched with five data breaches indexed: Adobe Systems, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures. Since then, some of the biggest breaches in the internet’s history have been added, including Myspace, Zynga, Adult Friend Finder and Ashley Madison.

In August 2017, Hunt made 306 million passwords public and accessible via web search. Now, over 500 million passwords that have been previously exposed in data breaches are available to be downloaded in bulk. This exposure allows users to check if their passwords have been compromised in the past and makes them unsuitable for ongoing use because they’re at a much greater risk. Making passwords public discourages users to reuse passwords, an act that may seem convenient, but is risky and could lead to cyberattacks such as credential stuffing.






Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Telecommunication

Telecommunication refers to telephony and cellular network technology. However, the broader definition includes...

Spoofing

What is spoofing? As it pertains to cybersecurity, spoofing is when a person disguises...

How to Indent in...

Microsoft Word is a graphical word...