{"id":85339,"date":"2019-01-18T22:35:58","date_gmt":"2019-01-19T06:35:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=85339"},"modified":"2019-05-03T20:32:25","modified_gmt":"2019-05-04T03:32:25","slug":"collection-1-and-2-5-are-the-latest-massive-password-dumps","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/","title":{"rendered":"Collection #1 (and #2\u20135) are the latest massive password dumps"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-85348\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>&#8220;Collection #1&#8221; is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and alleged data breaches. Reportedly, multiple other &#8220;collections&#8221; have also been discovered.<\/p>\n<h3>What&#8217;s included in this data dump?<\/h3>\n<p>Collection #1 is reportedly one of the largest user credential data dumps to date, collecting e-mail addresses and passwords from thousands of sources, including previously known data breaches and some new alleged breaches. By the numbers, the dump includes roughly:<\/p>\n<ul>\n<li>2.7 billion total records<\/li>\n<li>1.2 billion unique e-mail address and password combinations<\/li>\n<li>773 million unique e-mail addresses<\/li>\n<li>21 million unique, plaintext passwords<\/li>\n<\/ul>\n<p>As mentioned, there are other &#8220;collections&#8221; of data that were found as well, named Collection #2 through #5, &#8220;AP MYR&amp;ZABUGOR #2,&#8221; and &#8220;ANTIPUBLIC #1.&#8221; The latter is presumably the so-called <a href=\"https:\/\/www.troyhunt.com\/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned\/\" target=\"_blank\" rel=\"noopener\">Anti Public Combo List<\/a>, an old dump from December 2016.<\/p>\n<p>Troy Hunt, the world&#8217;s foremost expert on data breaches, has\u00a0<a href=\"https:\/\/www.troyhunt.com\/the-773-million-record-collection-1-data-reach\/\" target=\"_blank\" rel=\"noopener\">assessed<\/a>\u00a0Collection #1, but has not yet analyzed the additional collections to determine their scope and significance.<\/p>\n<h3>Was my e-mail address or password included?<\/h3>\n<p>Check out our related article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\" target=\"_blank\" rel=\"noopener\">How to Avoid Getting Hacked After Data Breaches<\/a>, to find out whether your e-mail address or password has ended up in Collection #1 or any other major dumps or breaches.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more about Collection #1, check out Troy Hunt&#8217;s article, <a href=\"https:\/\/www.troyhunt.com\/the-773-million-record-collection-1-data-reach\/\" target=\"_blank\" rel=\"noopener\">The 773 Million Record &#8220;Collection #1&#8221; Data Breach<\/a>.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>Each week we talk about the latest Apple security news on the <strong>Intego Mac Podcast<\/strong>, so be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to make sure you don&#8217;t miss any episodes. You&#8217;ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Collection #1&#8221; is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and alleged data breaches. Reportedly, multiple other &#8220;collections&#8221; have also been discovered. What&#8217;s included in this data dump? Collection #1 is reportedly one of the largest user credential data dumps to date, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":85345,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[43,96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"&quot;Collection #1&quot; is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Collection #1 (and #2\u20135) are the latest massive password dumps - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"&quot;Collection #1&quot; is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-19T06:35:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-04T03:32:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"Collection #1, #2, #3, #4, #5, Zabugor, and Anti Public Combo List password data breaches\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/\",\"name\":\"Collection #1 (and #2\\u20135) are the latest massive password dumps - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage\"},\"datePublished\":\"2019-01-19T06:35:58+00:00\",\"dateModified\":\"2019-05-04T03:32:25+00:00\",\"description\":\"\\\"Collection #1\\\" is the nickname of the latest dump of e-mail addresses and passwords\\u2014a stockpile of login credentials from a variety of confirmed and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Collection #1 (and #2\\u20135) are the latest massive password dumps\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Collection #1 (and #2\\u20135) are the latest massive password dumps\",\"datePublished\":\"2019-01-19T06:35:58+00:00\",\"dateModified\":\"2019-05-04T03:32:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage\"},\"wordCount\":279,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png\",\"keywords\":[\"Data Breach\",\"Passwords\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"\"Collection #1\" is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/","og_locale":"en_US","og_type":"article","og_title":"Collection #1 (and #2\u20135) are the latest massive password dumps - The Mac Security Blog","og_description":"\"Collection #1\" is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-01-19T06:35:58+00:00","article_modified_time":"2019-05-04T03:32:25+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png","width":400,"height":260,"caption":"Collection #1, #2, #3, #4, #5, Zabugor, and Anti Public Combo List password data breaches"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/","name":"Collection #1 (and #2\u20135) are the latest massive password dumps - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage"},"datePublished":"2019-01-19T06:35:58+00:00","dateModified":"2019-05-04T03:32:25+00:00","description":"\"Collection #1\" is the nickname of the latest dump of e-mail addresses and passwords\u2014a stockpile of login credentials from a variety of confirmed and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Collection #1 (and #2\u20135) are the latest massive password dumps"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Collection #1 (and #2\u20135) are the latest massive password dumps","datePublished":"2019-01-19T06:35:58+00:00","dateModified":"2019-05-04T03:32:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#webpage"},"wordCount":279,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png","keywords":["Data Breach","Passwords"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mcr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85339"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=85339"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85339\/revisions"}],"predecessor-version":[{"id":87061,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85339\/revisions\/87061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/85345"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=85339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=85339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=85339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}