In this world of technology and IoT we connect everything to the internet, connected peripherals mean that we share data and its on the cloud even more then you can imagine.

How to know if you are Hacked ?

Being hacked in literal sense always meant that someone targeted you and gained access to your account but now a days people get hacked with a different approach. Once online services get hacked, Hackers release or sell the user information and that is the time when your data and account is PWND even without your knowledge.

Have I been pwnd? is the service which lists 2,603,383,708+ Accounts and a dozen services, every hacked data is updated into the database and you can simply check if your account has been hacked or not.

Check if you have been PWND

Step 1 : Open Have I been Pwnd?
Step 2 : Enter your email address or Username and hit “pwnd?
Step 3 :  If you are a heavy internet user you will see a list of services whose data has been breached and your entered Email Address / Username is part of the breach. In this example I checked if [email protected] has been breached and guess what it has hacked data on around 23 Websites 

Step 4 : If you have no PWND account data, feel happy !!!  But what if some service you use gets PWND in future ? use the Notify Me Service to get notified if your Email Address surfaces on the Dark Web with your password some time later. Verification Email from Have I been PWND? will land in your Junk so do check out the Junk Folder and Confirm your email

What to do if you have been PWND ?

Simply “Change your Password” , first change the password of the email you searched and later change the password of the services listed and Follow these Password Techniques, Also note stop using your old password as it has already been added to the password list used by Hackers




About the author

Dr-Hack

Owner and founder of Hackology Internet Security Portal and BlackAngel. These days teach hacking so others can stay safe. Apart from hacking, a Movie Fanatic.Also run a tech Blog, small projects like encrypted paste etc and various PoC and research articles

Pin It on Pinterest

Shares