Wednesday , May 25 2022

Worst password list. The leaders have not changed for years. These are easier to break down by hackers



[ad_1]

In the age of more and more frequent hacker attacks, securing accounts is not the easiest task. Especially as cybercriminals are finding new ways to steal data. One way to prevent this from happening is to choose the correct password.

Watch the video
President Bosch Polska: Becoming carbon neutral is the first step

Worst password list. “123456” remains the most popular

Operating in the cybersecurity industry, Nordpass has prepared a list of the worst passwords of 2020. The site is not surprising, because the top ten contain as many as six records, the classic “1234 configuration. “which differs only in the number of digits. The phrases “picture1” (3rd position) and “password” (4th position) were also high. However, the slogan was taken 10th place: “senha”, which in Portuguese means “password”.

Prime Minister Mateusz Morawiecki during a press conferenceUnofficial: Morawiecki will announce de-icing on the economy on Friday

Compared to last year, the top ten has not changed much. Novelty is the high ranking “photo1” and “senha”. In 2019, “qwerty” (3rd place) and “iloveyou” (8th position) were also high on the list of worst slogans. Both phrases were in the top ten this year.

The site of the worst passwords. Here are the top twenty on the list:

  1. 123456
  2. 123456789
  3. picture1
  4. password
  5. 12345678
  6. 111111
  7. 123123
  8. 12345
  9. 1234567890
  10. password
  11. 1234567
  12. qwerty
  13. abc123
  14. Million2
  15. 000000
  16. 1234
  17. I love you
  18. aaron431
  19. password1
  20. qqww1122

For a complete list of the 200 worst passwords, see Nordpass, along with how many times the password has been used and how long it takes hackers to crack. It’s worth noting that the above passwords are often used to protect non-essential accounts, so their high popularity may rise.

PS5PlayStation 5 sold out in a matter of seconds. Traders joined in the act

[ad_2]
Source link