After “Mother of All Breaches,” Update Passwords on Compromised Sites

January’s big security news was the Mother of All Breaches, the release of a massive database containing 26 billion records built from previous breaches across numerous websites, including Adobe, Dropbox, LinkedIn, and Twitter. It’s unclear how much of the leaked data is new, but it’s a good reminder to update your passwords for accounts on compromised sites, especially those you reused on another site. Cybernews has a leak checker that reports which breached sites include your data. More generally, password managers often have a feature that checks your passwords against the Have I Been Pwned database of breaches and helps you change compromised passwords—1Password’s is called Watchtower, shown below. You can also search Have I Been Pwned directly. Don’t panic if your email address appears in numerous breaches because some of the theoretically compromised accounts may be defunct sites, trivial sites you used once 10 years ago, or duplicate password manager entries for a site whose password you already updated.

(Featured image by iStock.com/Prae_Studio)


Social Media: Worried about the “Mother of All Breaches” that has been making the rounds in security news? We share a leak checker that can tell you if your email address was involved and recommend that you update any compromised passwords.

More Insights

Tech Tip

Control Song Transitions in Apple Music

A new feature for Apple Music subscribers in the Music app in iOS 26, iPadOS 26, and macOS 26 is AutoMix, which Apple says causes songs to “transition at the perfect moment, based on analysis of the key and tempo of the music.” It fades between songs as a DJ would, but it’s not always […]

Read More »
Tech Article

Five Invisible Characters That Still Matter in Word Processing and Layout

In earlier eras of word processing, users were much more likely to encounter explanations of document structure—not because everyone had to become an expert, but because knowledge was shared differently. Software shipped with detailed manuals, user groups and training classes focused on how documents worked under the hood, and power users routinely shared mental models […]

Read More »
Tech Tip

Try macOS 26.2’s Edge Light for Low-Light Video Calls

We can’t always guarantee optimal lighting for video calls, especially when using laptops on the go. A new feature in macOS 26.2 Tahoe called Edge Light might help. It’s a video effect that uses the outermost pixels of your Mac’s display to create a bright white rectangle that illuminates your face during video calls. It […]

Read More »
Tech Article

How to Ensure You Don’t Miss Reminders

Recording a task in Apple’s Reminders app on your Mac, iPhone, or iPad is just the first step—the app captures what you need to do—but what matters more is being reminded to take action at the right moment. (The most important step, of course, is following through, but that’s on you.) Here’s how to configure […]

Read More »
Tech Tip

When Google Points to a Chatbot Conversation, Be Skeptical

Here’s something new to watch out for: poisoned chatbot conversations surfaced in Google searches. The sharing features in ChatGPT, Claude, Gemini, Grok, and other chatbots allow users to publish their conversations as public Web pages, which can be indexed by search engines and appear alongside traditional websites in search results. Attackers can seed those conversations […]

Read More »
Tech Article

How to Encourage Successful AI Use in Your Organization

The AI hype train continues to gain momentum, with breathless reports of rapid user growth, billion-dollar deals, and sky-high company valuations. At the same time, it’s easy to highlight AI pilot failures, problematic uses, and worries about job losses. As always, reality lies between the extremes. AI is just another technological tool, like spreadsheets, email, […]

Read More »

If you are here and not sure how to proceed, please call us at 626-286-2350, and we would be happy to help you find a solution to your needs.