These popular passwords can be hacked in seconds – is your code on this list? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

These popular passwords can be hacked in seconds – is your code on this list? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

Now could be a good time to get your passwords in order and make some urgent changes. New research has revealed just how simple some codes are to crack with it taking a matter of seconds for cyber crooks to gain access to personal accounts.


The new report from the team at payment firm Dojo makes for worrying reading but some pretty simple modifications will make sure your online accounts stay safe.


Dojo says that the most hackable passwords are ones that contain all lowercase letters or numbers and are less than 8 characters long. For example, the passwords purple, letmein or 202201 can all be guessed in under a second. Compare that to the word wednesday1 which takes over 2,000 seconds to crack and you can see how small changes can make a big difference.


Another mistake people make is using the same codes for both work and home accounts which makes the chance of being attacked much more likely.


“With 51% of people using the same passwords for both work and personal accounts, it’s common for people to repeat password patterns that are easy to remember. But the study found that 365,174 passwords feature all lowercase letters and an average password length of eight characters,” Dojo explained.


“When using this password pattern hackers can access your data easily, as the number of combinations they need to try is lower. If you are using all lowercase letters for your passwords, it would take hackers just three seconds to guess.”



(Getty Images/iStockphoto)


Along with lowercase and short passwords, another mistake is to use nicknames, TV shows, colours and fashion brands as these are some of the most hackable in the world.


So what should you be doing to i ..

Support the originator by clicking the read the rest link below.