• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Gmail credentials exposed online: why you should and should not worry?

Updated on Sep 15, 2014 by Guest Authors

Google’s cloud-based Gmail service has yet again become a favorite target of hackers, who according to reports originated from Russia. The search giant, however, was quick to dispel fears of compromised accounts, saying the hacking of nearly five million credentials, which include usernames and passwords published with no hesitation on the site Bitcoin Security, does not affect a major portion  of its user base.

The Mountain View company called on users to change their passwords, nonetheless. Google went on to alleviate worries by saying that not more than 2 percent of the compromised passwords and usernames have actually gone through. But of course the less than 2 percent affected are still Google users who deserve more than a cold remark from the search giant. Google’s statement on the issue is a display of selective security service that it provides to its avid fans.

gmail-hack

Good thing the company’s anti-hijacking system works to ward off illegitimate attempts on those affected accounts. It should be made clear that Google’s system was not compromised as it claims, but that many passwords and usernames were leaked. The question is: how did these pieces of information leak? That only Google can answer, and it has yet to give its users an explanation.

So far the Mountain View giant only blames other sources as culprit for the leaking of those credentials. Those sources now claim 60 percent of the leaked credentials actually work, but Google differs. Now there is so much confusion as to whom to believe: the ones who have the actual key to affected accounts or Google which is known to hide things under public and regulatory radar.

Even though Google recommended that its Gmail users change their password, it is never a guarantee that such an unfortunate case will not take place again in the future or much sooner than we expect.

Fortunately for the users of other Google services, the hacking did not have serious impact on other Google offerings including Google Drive and the Wallet payment system. But even users of compromised accounts find the risk too insignificant to ignore. That is a dangerous reaction. However small the piece of data that leaks to hackers, that will amount to huge piles of information when summed up, and that means more compromises at large.

One way to combat this online tragedy is to activate your two-factor authentication feature. Security experts also advise Internet users to use an app for managing passwords if you find bearing all of them in your mind a hard task, which is the case most of the time.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

DREO ChefMaker Combi Fryer Review – Experience Restaurant-Quality Meals

XGODY Sail1 Projector: A Comprehensive Review

Hoover SmartWash Pet Complete Automatic Carpet Cleaner: A Comprehensive Review

TORRAS COOLIFY 2S Neck Air Conditioner Review – A Revolution in Personal Comfort

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • DREO ChefMaker Combi Fryer Review – Experience Restaurant-Quality Meals
  • XGODY Sail1 Projector: A Comprehensive Review
  • Ryobi RY401180 40V HP Brushless 20″ Self-Propelled Mower Review: The Best-Selling Lawn Mower
  • Morus Zero Portable Clothes Dryer Review – A Compact Powerhouse in Laundry Technology

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}