These Are The Top 5 Passwords Most Of the Hackers Try First

The most common passwords that hackers use to gain access to your account is revealed. A new study from F-Secure highlights that the use of such common passwords one of the prime reasons people lose their vital information. IoT devices are found to be the gateway as users don't bother to change the factory-set password it comes with.

Must Read

Google Just Got Super Smart: Launches The Knowledge Graph

If there is one product on the Internet that has had absolutely no competition whatsoever, it is Google Search....

What Everyone Ought To Know About Social Bookmarking

As a marketer, you might be wearing different hats in your startup. Strategizing content, Executing SEO activities, drawing a social media...

E-Commerce Industry In India Worth $13.5 Billion In 2014: Will Cross $16 Billion In 2015

According to the latest report by IAMAI and IMRB International, the eCommerce industry in India reached a value of INR 81,525...

Weak Passwords have long been one of the main targets of hackers and the prime reasons behind data security breaches. In fact, the list of top passwords is sold as commodities on the dark web and millions of people buy them on a regular basis.

As a reaction to this, many cybersecurity firms have undertaken research over the years to identify general patterns in people’s password habits and how they cause vulnerability.

Advertisements

One such study was recently conducted by the cybersecurity company F-Secure. The company set up a number of ‘honeypot’ servers all around the world. Before we dig deep into it, let’s understand the interesting concept of Honeypot.

Honeypot servers are decoy servers that are installed into networks along with the main production system. These servers detect any possible attacks on the network, and alert the main system. Thus, the name honeypot comes from its ability to attract/detect attacks.

The study revealed that the number of attacks on the Internet of Things devices, aka IoT devices, that are connected to the internet across the world, are on the rise. The study was also able to identify the usual method used to hack into devices, as well. SMB ports and Telnet were found to be the most vulnerable ports.

Once a hacker has successfully breached into a device, all they need to do is to figure out passwords.

Most commonly used passwords

The same study also analyzed the common passwords hackers try when hacking into a device.

Advertisements

According to the study, the first most common password that most of the hackers try is ‘admin’. A lot of users either don’t bother to change the predefined password of the application or platform or set it for the ease of remembering. And, that’s how they make a mistake.

The other top most commonly used ones are ‘12345’, ‘default’, ‘password’, and ‘root’.

According to F-Secure, the passwords reflect the kinds of devices hackers try to access, which are mainly routers and other devices with factory-default passwords. This makes factory default passwords another common choice for hackers.

Through other studies, a number of other patterns have been discovered in people’s passwords. One of these is ‘123456’. Passwords like ‘iloveyou’, names of animals, first names of people, names of family members are also very common. The names of football teams are also recurring themes with ‘liverpool’ being the most common.

Password Hygiene

It’s a generally acknowledged fact that hackers are becoming smarter by the day and finding newer ways to attack potential targets. As passwords are one of the most fundamental access keys to any device or account, when strong, they can protect your privacy against prying eyes.

A good practice when creating passwords is to make them complex and unique. This isn’t as hard as it sounds. The general guidelines that flash to users creating new accounts suffice in coming up with a strong password. Using a mix of special characters, capital letters, numbers, and lowercase letters make a password strong.

Many people use the same password across platforms, which should be voided at all costs. This might be hard to keep track of, but will ensure greater safety in the long run.

Many browsers like Google Chrome now auto-generate strong passwords. These passwords are encrypted and saved in a secure database, are auto-filled whenever the user accesses the account and can be changed/removed easily.

For those unwilling to put the effort into creating a complex and unique password, this can be a good alternative.

However, saving passwords should always be a last resort. Password databases are the most sought after in present times. Thus, saved passwords are not entirely secure and can fall prey to breaches at any time. For Instance, many companies suffered from massive breaches due to the Heartbleed Bug in 2014, and Google was among the worst affected. Additionally, an infographic by DigitalGuardian illustrated how sharing too much information on the internet, especially social media makes users vulnerable to hackers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

IPL Ads And Dogecoin Frenzy Put Crypto Exchanges in India In Hot Water?

IPL advertisements and the dogecoin frenzy has overwhelmed Indian banks to the fullest extent! According to multiple industry sources, Indian...

In-Depth: Dprime

Will ‘TikTok By Microsoft’ Be A Winner?

For the last two years, TikTok has been in the public eye for all sorts of reasons. First, it was the exploded and unparalleled...

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter, with a...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one of the...

More Articles Like This