Pwned

Pwned, or Have I Been Pwned (HIBP), is a website that allows internet users to check whether their personal data has been compromised by data breaches. It collects and analyzes hundreds of database dumps and pastes that contain information about billions of leaked accounts. Users can search for their own information by entering their username or email address and sign up to be notified if their email address appears in future dumps.

The term pwned originates from a script kiddie term and is a derivation of the word owned, accounted for by the proximity of the p and o keys on a computer keyboard. Pwned is used to imply that someone has been compromised or controlled in some way.

Have I Been Pwned was created by Troy Hunt, a web security expert who spent his time analyzing data breaches for trends and patterns. He created HIBP after an Adobe Systems security breach in October 2013 when 153 million accounts were affected. In December 2013, HIBP was launched with five data breaches indexed: Adobe Systems, Stratfor, Gawker, Yahoo! Voices, and Sony Pictures. Since then, some of the biggest breaches in the internet’s history have been added, including Myspace, Zynga, Adult Friend Finder and Ashley Madison.

In August 2017, Hunt made 306 million passwords public and accessible via web search. Now, over 500 million passwords that have been previously exposed in data breaches are available to be downloaded in bulk. This exposure allows users to check if their passwords have been compromised in the past and makes them unsuitable for ongoing use because they’re at a much greater risk. Making passwords public discourages users to reuse passwords, an act that may seem convenient, but is risky and could lead to cyberattacks such as credential stuffing.






Abby Braden
Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Related Articles

Special Character

A special character is one that is not considered a number or letter. Symbols, accent marks, and punctuation marks are considered special characters. Similarly,...

Software

Table of contents What is Software? History of Software Software vs. Hardware Software vs. Hardware Comparison Chart What Types of Software Exist? Saas vs....

Email Address

What is an Email Address? An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a...

Information Technology (IT) Architect

The information technology architect applies IT resources to meet specific business requirements. The role requires a high degree of technical expertise as well as...

Geotargeting

Geotargeting is a method of delivering data or content to users based on...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...