: Suggests that the credentials provide direct access to the email accounts (IMAP/POP3/Webmail), rather than just login info for a specific website.
: Refers to the file format (often a ZIP archive) and suggests a "mix" of different email providers (Gmail, Yahoo, Hotmail, etc.). The Anatomy of a Data Leak
Possessing or distributing "combolists" containing stolen data is illegal in many jurisdictions under cybercrime laws (such as the CFAA in the US). These lists are the product of criminal activity and are used to facilitate identity theft and financial fraud.
: If you receive a notification that a service you use has been breached, change your password immediately—and ensure that password isn't used anywhere else.
: A similar service provided by Mozilla that tracks leaks associated with your email address. Essential Security Measures
Update your browser to view this website correctly. Update my browser now