Checking for password leaks in Google Chrome
A password leak check has been added to the Google Chrome browser since version 79. When using and saving passwords on sites and services, the presence of these passwords in the open databases of disclosed logins and passwords is checked. Most often, passwords are stolen by phishing or hacking website databases. It is important to understand that such a notification sends not a website or service, but directly the browser itself. It should also be understood that the notification indicates a data leak in general, and not a leak on a specific site, while working with which the notification was displayed.
After logging in to a site and / or saving the password, a window with information about the security problem will appear in the browser, informing about the stolen password, which looks something like this:
To check which passwords have been stolen, do the following:
- Go to the password management section in any of the following ways:
- Or, when the password leak notification appears, click "Check passwords".
- Or through the browser settings:
- Go to section "Autocomplete":
- In the section that opens, click "Passwords", where the number of disclosed passwords will also be indicated:
- Go to the section for checking revealed passwords:
- On the page that opens, all access data to various services and sites that have been disclosed will be displayed. We strongly recommend that you change all disclosed passwords and always set different passwords for different services:
- For some sites and services, the button will be available. "Change password", which will simply open a site where you will need to find the password change functionality yourself.
- For some services, text will be displayed instead of a button "To change your password, open the app"... Most often, this text is displayed for Android applications in which authorization took place and the password was saved by the system itself.
- After changing passwords, click "Check again"to check new passwords for leaks.