What happened, and how to know and act if it has affected you or you receive password reset emails

Let’s explain to you what happened and how to act in the face of the alleged leak of Instagram data. There is a lot of confusion with the two versions why phishing emails are arriving to make you change your password and steal your account, and we are going to explain everything to you in a simple and understandable way. Let’s start with the explanation of these two versions so you can see what seems to have happened. And then we are going to give you solutions for both, first telling you how to act if you receive an email asking you to reset your password, and then how to know if the alleged leak has affected you. What happened on Instagram The alarms have gone off when a large number of users have begun to report on social networks that they are receiving suspicious emails that encourage them to reset their Instagram password. These emails provide a link with which to try to steal your account. On the one hand, the cybersecurity company Malwarebytes assures that a group of cybercriminals has Information stolen from 17.5 million accounts from Instagram. From each leaked account they claim to have obtained usernames, physical addresses, email names or phone numbers. Instagram says no, that no one has hacked them, but admits that it has solved a problem that allowed third parties to request password reset emails for some users. They say that user data was not stolen, these emails were simply sent using this vulnerability. There are two important questions here. First of all, if you receive these emails they may be trying to steal your account, and you must pay attention to avoid falling into the trap. Phishing campaigns are recurring, but if the problem was only what Instagram says, the number of these emails should start to reduce now. The danger is if Instagram tries to hide that Malwarebytes is right. In this case, the first danger is that you may continue to receive attempts to steal your account, something that is always dangerous. But the most serious thing is that they say that physical addresses have been included in the leak, and that the data is being sold on the black market, something that can be dangerous for known people. What to do if you receive one of the emails In the event that you have received one of these emails in which you are told that Instagram has received a request to reset your password and that you click on the link to proceed, you should always ignore the message. Never click on any link that reaches you in this type of email. If you want to change your Instagram password just in casethen you have to enter your account settings in the application or website of this social network. Once inside, Click on the section Account Center to enter the page where you manage all the service accounts belonging to Meta. Inside here, choose your Instagram account, although it is normal that you arrive having it already selected. So, click on the section Password and security of the section Account Setup. Once you are inside Password and securitythen you just have to click on the option Change password that will appear first, and follow the steps requested. You should try to change the password only from here. How to know if the leak has affected you If you want to clear your doubts and know if you are involved in the alleged leak, then the best thing is to go to the website. haveibeenpwned.comwhere all leaks are always collected. Using it is easy, you just have to write the email you use in your account from Instagram. When you do, the page will tell you if your email has appeared in a leak, and You can see if Instagram is among them. It is possible that your email has been included in one or more leaks, although it does not have to have been the one from Instagram. In the event that you appear in the leakthen what I always recommend is to change your password with the steps that we have told you before. The same with any other leak that appears, it is best to always change the password on the official website or app of that service. In Xataka Basics | My data has been leaked, now what: the steps you should take whenever there is a massive leak on the Internet that could affect you

Memes have become so self-referential and I don’t understand that anyone has had an idea: a Great Reset

Have you ever felt like you don’t understand memes like you used to? What the hell is that thing Italian Brainrot? No, wait, that’s already out of fashion and has been replaced by another even more cryptic and incomprehensible trend. If you have been on the internet for a few years, you undoubtedly miss the times of some sillier and simpler memes. Those who defend a Great Reset of Memes by 2026 also believe that. And return to the times of epistemological simplicity in memetics. The GMR is coming. In January 2026, an internet cultural phenomenon known as ‘The Great Meme Reset of 2026’ is planned. This viral phenomenon, originating mainly on TikTok, proposes that the online community reboot humor and memes, returning to the memorable classics of the 2010s, in particular the iconic memes of the second half. This is a reaction to the saturation and wear and tear of recent memes, which are perceived by many users as forced, uncreative and unfunny. What we know lately as “brainrot”, and which has a lot to do with automatic and somewhat artificial creativity of AIs. What is intended? The idea of ​​this restart is to leave behind the current landscape of “niche” memes that dominate platforms like TikTok and that, according to their critics, accelerate the lifespan of memes too quickly, which last only a few days. The reset advocates a return to memes considered “dank” or “pure”, such as shrek things, Big Chungushe Trospid Knuckles either the legendary Sanicthe Rage Comics (unequivocal symbol that you are of an age) or the so-called Montage Parodiespure angst generational in terms of image and sound, and that marked meme culture in its first digital years. How it started. The origin of the “Great Meme Reset of 2026” is in March 2025, within an increasingly frustrated digital community. The first and involuntary starting signal was given on TikTok, when @joebro909 posted a video which addressed a sort of meme “drought”, proposing a “great reset” to save meme culture. Although it did not specify the date of 2026 or a complete renewal towards classic memes, it introduced the idea to the community of meme creators as a Trojan Horse. This concept took shape and gained popularity on social networks throughout 2025. In April, on Reddit They began to allude to the need to make this reset a reality in meme culture, specifically citing the idea of ​​returning to old memes. In September the campaign took off in a more clear and organized waywith several videos on TikTok proposing December 31, 2025 as the deadline for modern memes, and hoping that classic memes from the early years of the internet would return in 2026. This launch was reaffirmed by a viral video by @golden._vr, which accumulated almost 370,000 likesin which it was announced that upon December 31, 2025, memes would “return from the grave” and meme culture would be restarted from scratch in 2026. It’s all a huge joke, of course, but it reveals a point of view and a generational conflict. Memetics as culture shock. There is a clear generational gap in the way humor is conceived and consumed on the internet: on the one hand, classic memes played with conciseness and standardized formats, templates; On the other hand, the current phenomenon of brainrot It is an uncontrolled torrent of self-referential content that devours itself, and that has a total disconnection from the previous humor. They are two ways of understanding not the digital, but directly the observation of reality. The millennials come the brainrot like the degeneration of humor: noise, worthless content, a sign of the damage that perverse overexposure to the Internet has done, and they demand meaning and coherence. Generation Z and Alpha find 2010s memes dated, slow, and too literal. He brainrot It is his way of reflecting the chaotic, fragmented and accelerated reality of the Internet, where logic is an obsolete concept. The joke is that there is no joke. And we are not going to agree on that, not even with a reset. In Xataka | Neither left nor right: Charlie Kirk’s murderer did so motivated by a labyrinthine subculture of memes

It is not infallible, but we have a trick to protect the mobile against invisible malware: a reset on time

Putting the shoot after the wound is not optimal, but it is something we usually do in the digital world. When our accounts or passwords – or those of someone close – are violated, is when we start worrying about cybersecurity. We change the passwordsWe add Two -step verification systems And we see what we can do so that Our accounts and devices are safer. And, between All types of malwarethere is a tremendously annoying and dangerous one: the spy software that performs Zero-Click attacks. The good thing is that we can protect ourselves by acquiring a simple habit: restart the mobile. Zero click. When we talk about such vulnerability, we refer to a security failure that allows someone to enter malicious software on our device without having to perform any action. Taking advantage of a mobile safety failure or PCs, hackers are capable of ‘strain’ software on the device without having downloaded anything or punctured in strange links. That is why it is called ‘Zero Click’, since, to open the doors of our device to another type of malware -like phishing, for example -we do have to perform an action. This is something that has been used recently in apps such as Outlook or in him iPhoneand the same thing always happens: failures in the safety of the app or the system opens the door torque to the click zero malware. Pegasus. These vulnerabilities usually occur the same day to launch a new version of an app or an operating system. Taking advantage of possible programming failures and safety gaps, malware can go through a back door without us knowing. And these attacks usually go hand in hand with spy software, very difficult to identify by the user, but that has almost ease access for our device. Surely sounds to you Pegasusthat spy software developed by the Israeli company that He infected mobiles of thousands of journalists, politicians and other personalities. Using capacities similar To those who attack taking advantage of the Zero-Click, it allows to see, even, conversations in encrypted apps. Through WhatsApp. But it is not the only one, since recently, spy software known as Graphite infected the mobile of several people using a WhatsApp failure. Rocky Cole is the co -founder of a cybersecurity company and has commented A ZDNET that Graphite sneaked into the mobile through an image or a PDF sent by WhatsApp To the mobile of the victims, and the underlying processes that are activated when files are received in the app are the ones that the attackers explode to infect the device. It is not known, at least publicly, if Graphite can move to the core of iOS or only operate on WhatsApp, but could take advantage of an “escalation of privileges” – a vulnerability of the app – to move outside the messaging application. Cole states that this attack was aimed at concrete people, but comments that it is an emerging threat to all. “And the world is not, at all, prepared to deal with something like that,” he says. Tract it as a computer. In the report, Cole leaves the wedge of the advertising of its application Iverify, but also two tips that are not unknown, but it is worth remembering. The first is that we should acquire the habit of restarting or off the mobile every day. The reason is that many of these vulnerabilities exist only in memory and, not being files, in theory the malware should be eliminated when cleaning the memory after a restart. The bad thing is that it is easy for the spy software to return to the device, so something that it also recommends is to install the updates as soon as they are available. These patches usually cover the vulnerabilities found by both companies and external groups, such as Mozilla Security Groupwho analyzes the software and warns those responsible to patch it. Better turn off. Although several security experts agree that we should not leave the mobile on 24/7, not everyone agrees that a simple restart can solve these problems. The reason is that, when restarting the device, some mobiles try to maintain everything as it was before, storing certain data in memory and these being the ones that would take advantage of the hackers. The NSA – the United States National Security Agency – commented that It is best to turn it off completely and wait a few seconds before turning it on again. In this way, all applications have to start from scratch again. And, according to the NSA, it is something we should do once a week. Beyond security. The NSA itself coincides with school that restarting or turning off the mobile is not a magical solution against this type of malware, but it can stop cybercriminals and make them engineer new ways to maintain access, perhaps being these more visible for device safety systems. But well, apart from security, both on iPhone and, above all, in Android mobiles, make a restart every so often Close processes and release RAM. It happens, as we say, especially in Android, where the system code can ‘fight’ against the manufacturer’s customization layer, making the mobile not do well that we should have been without restarting/off because there will be many waste in the RAM. Bad? That is something that forces us to acquire a new habit. Turning it only takes us for a few seconds, but if we are not used, the easiest thing is for us to forget. The good thing is that many mobiles already include restart and off options programmed in their adjustments. Image | Xataka In Xataka | The rear door that the United Kingdom wants in Icloud is a nightmare for all: Apple has just taken an unprecedented measure

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.