Google reported that 1.5% of users still using the leaked credentials visit the website

In February this year, Google released a Chrome extension password checking program that helps you set up your account again affected by the data breach. Whenever you log in, if you enter a user name and password due to appear in Google known data breaches in security rather, you will receive a reminder. Please reset your password. If you use the same username and password to any other account, reset your password at the same time. This week, Google announced the results of a month expansion plan, showing 1.5% of users log on to the site using the leaked credentials.

According to Google's statistics, a total of 650,000 users downloaded the Chrome extension password checking program and participated in the experiment. "More than 650,000 people participated in our earlier experiments only in the first month, we scanned the 21 million user names and passwords, and more than 316,000 marks a unsecured extended scan log on 1.5%."

After receiving the alert password check, the user selects a password reset 26%, 60% using strong passwords difficult to crack.

This week, Google added two new features for password checking. "The first is a direct feedback mechanism, the user can inform us of any problems they face by quick comment box. The second allows users to better control their data. It allows users to select anonymous telemetry exit extensions report, including Find the number of display insecure credentials, password changes is causing alarm, as well as to improve the site domain coverage.

Guess you like

Origin www.linuxidc.com/Linux/2019-08/160132.htm