Nobody wants to be PWNED. But what does this mean and why should you pay attention to it if you hear it concerns you.
In computer science there are strange terminologies. In fact, some of them in their Greek performance surpass all imagination. But there are also some English terms that cannot be translated into Greek, because they are simply slang. One such is the word PWNED. Although it first appeared in the Warcraft game, this term in dianetwork it has a very specific meaning now. And, it's not for good.
What is PWNED?
According to the Urban Dictionary, PWNED is a "corruption" of the English word "OWNED" (meaning owned) and existed in the first online game Warcraft. It was the result of a game map designer misspelling the word "owned". When the computer was beating a player who was supposed to say “so-and-so, has been owned”. Instead it said "so-and-so, has been pwned".
Besides, the letters o and p are next to the keyboard. Do not be surprised by the language of the Warcraft game. Almost all video games have their own terminology and slang, which if you listen to it you will think that they speak passwords so that you do not understand what they are saying.
So the origin of the word “PWNED” is from video game culture, which soon made this mistake widely known (viral in English). In gamer slang it's a misspelling of “owned” and where signalthat a person is completely dominated by an opponent.
In recent years, PWNED has meant that some of your personal information on the Internet has been compromised. This sub-definition comes from the hackers and the programming community, who used the misspelled word to describe the unauthorized acquisition of someone else's computer or, if you will, its complete conquest.
In recent years, you may have heard of the site Have I Been Pwned or “HIBP”. It serves as an amazing resource for internet users to check if there are data breaches in personal data. In addition, visitors can sign up with their email to receive notifications whenever a new breach occurs.
Created in 2013 by security researcher Internet Troy Hunt, and reviews data breaches, at no cost or registration. Visitors to the site can check if their email or phone number is part of a current or historical breach. If they have indeed been breached you will see a list of the type of data breached.
In addition to email and phone numbers, this may include dates of birth, gender, geographical locations, IP addresses, names, passwords, social media profiles, user site URLs, usernames, and more. HIBP also lists the date of the breach, when it was added to its website, and the number of accounts breached for each data breach.