These Are The Top 5 Passwords Most Of the Hackers Try First

The most common passwords that hackers use to gain access to your account is revealed. A new study from F-Secure highlights that the use of such common passwords one of the prime reasons people lose their vital information. IoT devices are found to be the gateway as users don't bother to change the factory-set password it comes with.

Must Read

Net Worth Of Jeff Bezos Is More Than Combined Net Worth of India’s Top 10 Richest People!

Jeff Bezos and the phrase 'World's Richest Person' has become synonym to each other. But after the...

Search Engine Optimization In Digital Era: Look Beyond Traffic

Search engine optimization, aka SEO, plays a vital role in today's online world, especially if it's about...

After Banning Apps, India To Clamp Down On Startup Investments From China

The recent border conflict between India and China has led to the Indian Government to actively take...

Weak Passwords have long been one of the main targets of hackers and the prime reasons behind data security breaches. In fact, the list of top passwords is sold as commodities on the dark web and millions of people buy them on a regular basis.

As a reaction to this, many cybersecurity firms have undertaken research over the years to identify general patterns in people’s password habits and how they cause vulnerability.

Advertisements

One such study was recently conducted by the cybersecurity company F-Secure. The company set up a number of ‘honeypot’ servers all around the world. Before we dig deep into it, let’s understand the interesting concept of Honeypot.

Honeypot servers are decoy servers that are installed into networks along with the main production system. These servers detect any possible attacks on the network, and alert the main system. Thus, the name honeypot comes from its ability to attract/detect attacks.

The study revealed that the number of attacks on the Internet of Things devices, aka IoT devices, that are connected to the internet across the world, are on the rise. The study was also able to identify the usual method used to hack into devices, as well. SMB ports and Telnet were found to be the most vulnerable ports.

Once a hacker has successfully breached into a device, all they need to do is to figure out passwords.

Most commonly used passwords

The same study also analyzed the common passwords hackers try when hacking into a device.

Advertisements

According to the study, the first most common password that most of the hackers try is ‘admin’. A lot of users either don’t bother to change the predefined password of the application or platform or set it for the ease of remembering. And, that’s how they make a mistake.

The other top most commonly used ones are ‘12345’, ‘default’, ‘password’, and ‘root’.

According to F-Secure, the passwords reflect the kinds of devices hackers try to access, which are mainly routers and other devices with factory-default passwords. This makes factory default passwords another common choice for hackers.

Through other studies, a number of other patterns have been discovered in people’s passwords. One of these is ‘123456’. Passwords like ‘iloveyou’, names of animals, first names of people, names of family members are also very common. The names of football teams are also recurring themes with ‘liverpool’ being the most common.

Password Hygiene

It’s a generally acknowledged fact that hackers are becoming smarter by the day and finding newer ways to attack potential targets. As passwords are one of the most fundamental access keys to any device or account, when strong, they can protect your privacy against prying eyes.

A good practice when creating passwords is to make them complex and unique. This isn’t as hard as it sounds. The general guidelines that flash to users creating new accounts suffice in coming up with a strong password. Using a mix of special characters, capital letters, numbers, and lowercase letters make a password strong.

Many people use the same password across platforms, which should be voided at all costs. This might be hard to keep track of, but will ensure greater safety in the long run.

Many browsers like Google Chrome now auto-generate strong passwords. These passwords are encrypted and saved in a secure database, are auto-filled whenever the user accesses the account and can be changed/removed easily.

For those unwilling to put the effort into creating a complex and unique password, this can be a good alternative.

However, saving passwords should always be a last resort. Password databases are the most sought after in present times. Thus, saved passwords are not entirely secure and can fall prey to breaches at any time. For Instance, many companies suffered from massive breaches due to the Heartbleed Bug in 2014, and Google was among the worst affected. Additionally, an infographic by DigitalGuardian illustrated how sharing too much information on the internet, especially social media makes users vulnerable to hackers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

The Leaked Video Of Pixel 5 Is Quite Revealing!

Google never stops to surprise us, and Pixel 5 is no different. A recent leaked video of...

A New Xiaomi 108MP Camera Smartphone May Debut Soon!

In November 2019, Xiaomi propelled its first smartphone with a 108MP camera. In the last six months, the smartphone major has launched...

Instagram Reels In India: A Possible Death For The Indian Alternatives Of TikTok?

After the Indian Government banned the popular short-form video app TikTok along with 58 other Chinese-origin apps, many ‘homegrown’ or Indian-made Tiktok...

How People Set Their Passwords: 123456 Is The Most Common One [STUDY]

Do you know why hackers quickly gain access to your system or online accounts? It's because the passwords are...

Will The Ban On TikTok Be Revoked?

The ban on TikTok is the talk of the town. All hell broke loose for Tiktok when the popular short-form video platform...

Global 5G Chipset Market: $22.41 Billion By 2026, Driven by 5G Smartphones

As the world has started shifting from 4G to 5G era, the global 5G chipset market has started attracting the eyeballs of...

In-Depth: Dprime

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one...

Fantastic 4: Four Day Work Week A Flashpoint Of Innovation?

It has been an idea that has been mooted by many, perhaps also somewhat sceptically. From being a dark horse to becoming...

TikTok Is Facing The Wrath Of People Who Love It The Most

Ever since the popular social media app TikTok entered India, it has been growing very aggressively in terms of users. Within a...

More Articles Like This