After “Mother of All Breaches,” Update Passwords on Compromised Sites

January’s big security news was the Mother of All Breaches, the release of a massive database containing 26 billion records built from previous breaches across numerous websites, including Adobe, Dropbox, LinkedIn, and Twitter. It’s unclear how much of the leaked data is new, but it’s a good reminder to update your passwords for accounts on compromised sites, especially those you reused on another site. Cybernews has a leak checker that reports which breached sites include your data. More generally, password managers often have a feature that checks your passwords against the Have I Been Pwned database of breaches and helps you change compromised passwords—1Password’s is called Watchtower, shown below. You can also search Have I Been Pwned directly. Don’t panic if your email address appears in numerous breaches because some of the theoretically compromised accounts may be defunct sites, trivial sites you used once 10 years ago, or duplicate password manager entries for a site whose password you already updated.

(Featured image by iStock.com/Prae_Studio)


Social Media: Worried about the “Mother of All Breaches” that has been making the rounds in security news? We share a leak checker that can tell you if your email address was involved and recommend that you update any compromised passwords.

More Insights

Tech Tip

Backups: Trust but Verify

It’s easy to assume your backup app—whether it’s Time Machine, Carbon Copy Cloner, Backblaze, Retrospect, or something else—is quietly doing its job. But it’s possible for a bug to corrupt backups or for a destination disk to fail silently, such that you can’t restore backed-up data. We’ve seen this happen! For peace of mind, set […]

Read More »
Tech Article

Don’t Miss Calls and Texts: How to Use New Phone and Messages Filtering

Spam is one of the many banes of modern existence. While we receive more email spam than anything else, interruptions from unwanted phone calls and text messages are even more annoying. Apple has added various features over the years to help control spam calls and messages, but none have completely solved the problem. The problem […]

Read More »
Tech Tip

Be Alert for Deepfake Phishing Scams

Phishing scams have entered a new, AI-powered phase and can now convincingly mimic real people. Attackers can generate fake voice or video deepfakes to impersonate CEOs authorizing urgent payments, IT staff requesting access, or family members needing help. If you receive a voice or video call from someone you know at an unknown number who […]

Read More »
Tech Article

A Few of Our Favorite Things: 2025 Tech Edition

The holidays may be just around the corner, but we field requests for tech gear recommendations year-round. Below you’ll find our suggestions, whether you’re shopping for an Apple tech enthusiast or simply looking to upgrade your own devices and accessories. Plenty of other excellent options exist—we’d love to hear about the peripherals that have worked […]

Read More »
Tech Tip

Charge Your MacBook with the Right Power Adapter

If you lose or break the power adapter that came with your MacBook Air or MacBook Pro, make sure to replace it with a charger that meets or exceeds the machine’s required wattage. A charger with too low a wattage may result in little or no charging (or even battery drain while working), and it […]

Read More »
Tech Article

iPadOS 26 Brings Mac-Like Multitasking to the iPad

When the iPad debuted, it was essentially a large iPhone. But classic productivity tools rapidly made their way to the iPad, and over the years, Apple has introduced multitasking features, such as Slide Over and Split View, to make it easier to work back-and-forth between apps—imagine writing in Pages while referring to a Web page, […]

Read More »

If you are here and not sure how to proceed, please call us at 626-286-2350, and we would be happy to help you find a solution to your needs.