Browse Definitions :
Definition

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP) is a website that allows users to search and find out if an email address’s password has been compromised by data breaches. The service is a popular and commonly-used tool in IT security.

As a database service compiled from known leak sites, the service allows users to quickly check to see if a particular email account has been compromised by a data breach. The database is compiled from crawls of a number of websites and database dumps. Some of these sites are believed to purchase account information from hackers.

HIBP was created after a large data breach at Adobe in October 2013. Since the site’s creation, HIBP has become legitimized as a security tool by tech-savvy users to keep their information safe.  Corporations trying to assist users after data breaches also sometimes offer HIBP links in notification emails.

Have I Been Pwned was created and independently run by Troy Hunt, a Microsoft Regional Director. In June 2018, it was announced that HIBP had partnered with Mozilla Firefox and 1Password to integrate the service into new products.

Pwn is a hacker/gamer variation on the word own and a leet speak term meaning to defeat overwhelmingly or to dominate.

This was last updated in September 2018

Continue Reading About Have I Been Pwned (HIBP)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close