#Online spam bot password
The absolute best strategy to ensure you are not at risk is to use a strong and unique password for every site. The good news is, using LastPass makes this easy. The reason why spammers, like those behind Onliner Spambot, can use a recycled list is they know that most people reuse their passwords. For example, if they take a password exposed on the LinkedIn breach, there is a good chance that a certain percentage will work if they try to access an email account or other online service using the same username and password combination.
![online spam bot online spam bot](http://2.bp.blogspot.com/-saaNaW7usRo/UCr5Jg6PWxI/AAAAAAAAGTg/q2XaGsCZPPA/s640/Cave.jpg)
The biggest threat is password reuse – j ust d on’t do it.
#Online spam bot update
![online spam bot online spam bot](https://windows-cdn.softpedia.com/screenshots/Universal-Automated-Chat-Bot_1.png)
![online spam bot online spam bot](https://images.ctfassets.net/slt3lc6tev37/43O7pzNhBkj8mpWhfu12wn/ffa711243635a741bf2a5aadfdd9c8e7/social-media-spam-bot.png)
The vast majority of the list consisted of just email addresses, without passwords.When we took a deeper dive, here were our conclusions: In the world of security, large email lists and breaches get large headlines. Understandably, this discovery is newsworthy because of the massive size of the spam list. You may have caught the headlines about Onliner Spambot, a recently-discovered spam server with more than 711 million email addresses, along with some compromised passwords and server addresses used for sending spam. We’ve teamed up with our partner PasswordPing to bring you our joint perspective on this event. For updated information please visit our blog post from. Please note that this Security Challenge functionality discussed in this post has been updated.