Browse Definitions :
Definition

Have I Been Pwned (HIBP)

Contributor(s): Matthew Haughn

Have I Been Pwned (HIBP) is a website that allows users to search and find out if an email address’s password has been compromised by data breaches. The service is a popular and commonly-used tool in IT security.

As a database service compiled from known leak sites, the service allows users to quickly check to see if a particular email account has been compromised by a data breach. The database is compiled from crawls of a number of websites and database dumps. Some of these sites are believed to purchase account information from hackers.

HIBP was created after a large data breach at Adobe in October 2013. Since the site’s creation, HIBP has become legitimized as a security tool by tech-savvy users to keep their information safe.  Corporations trying to assist users after data breaches also sometimes offer HIBP links in notification emails.

Have I Been Pwned was created and independently run by Troy Hunt, a Microsoft Regional Director. As of June 2018, it was announced that HIBP had partnered with Mozilla Firefox and 1Password to integrate the service into new products.

Pwn is a hacker/gamer variation on the word own and a leet speak term meaning to defeat overwhelmingly or to dominate.

This was last updated in September 2018

Continue Reading About Have I Been Pwned (HIBP)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close