Close X
Friday, November 22, 2024
ADVT 
Tech

32 Passwords You Should Never Use Unless You Are Begging To Be Hacked

Darpan News Desk IANS, 01 Nov, 2019 06:15 PM

    In what may have been an exhaustive ordeal, security researchers have dug deep into the dark web, forums, social networks, chat channels and website that are hidden from regular web browsers where stolen data such as credentials are commonly traded between cybercrimanls.


    The researchers have stated that there are more than 21 million credentials that belong to Fortune 500 companies with 95 per cent of these included in plaintext passwords that were either stored unencrypted or cracked by cybercriminals.

     

    The ImmuniWeb researchers analysed nearly 20 million passwords and claim that only 4.9 million were unique.


    Out of the remaining, some of the passwords were commonly used than others.


    As per a related report by Forbes, Davey Winder states, “the research also revealed some interesting facts on an industry by industry basis. Retail was by far and away the industry with the weakest passwords, being those under eight characters, dictionary words, or system defaults.


    The following four sectors were much more closely grouped and were as follows: telecommunications, industrials, transportation, and financials.”


    The industries with the highest number of stolen credentials were quite alarming. Technology was at the highest with 5 million exposed passwords. This was followed by financials with 4.9 million passwords. After this, healthcare at 1.9 million, industrials at 1.8 million and energy at 1.7 million.


    The report adds that about 42 per cent of all the stolen passwords were linked in one way or the other to the company name concerned or the breached resource. It comes as no surprise then that attackers were able to “brute-force” these passwords “which means they could have a computer program try every dictionary word and common variations using numerical or special character replacements until the password was found.”


    Ilia Kolochenko, CEO and founder of ImmuniWeb states, “The disastrous situation with weak passwords may first appear to be easily addressable by standard technical means. however, in light of the wide and dynamic spectrum of corporate and third-party systems handling confidential or sensitive data, this task becomes virtually unfeasible."


    To this effect Winder states that this is true as several organisations have no concrete means to authorize password policies of their IT providers and partners which in turn exposes the corporate accounts to weak passwords which eventually leads to compromises.


    Kolochenko says, “Two-factor authentication (2FA) is no panacea. worse, as some researches have recently demonstrated, may undermine security if incorrectly implemented." He recommends, “Holistic visibility of your digital assets and data, coherent identity and access management (IAM) program covering third-parties and third-party risk mitigation strategy are essential to protect your organization.”


    Here is a look at the 32 passwords you should never use:


    000000

    111111

    112233

    123456

    12345678

    123456789

    1qaz2wsx

    3154061

    456a33

    66936455

    789_234

    aaaaaa

    abc123

    career121

    carrier

    comdy

    cheer!

    cheezy

    Exigent

    old123ma

    opensesame

    pass1

    passer

    passw0rd

    password

    password1

    penispenis

    snowman

    soccer1

    student

    welcome

    !qaz1qaz

     

    MORE Tech ARTICLES

    Women Entrepreneurs Galvanized To Disrupt Male-dominated Tech Industry

    Women Entrepreneurs Galvanized To Disrupt Male-dominated Tech Industry
    VANCOUVER — Technology entrepreneur Tammy Meyers does a mental count every time she attends a business conference promoting the augmented reality company she co-founded. Almost always, she's one of the only women in the room.

    Women Entrepreneurs Galvanized To Disrupt Male-dominated Tech Industry

    Indian-Origin Researchers Report Cybersecurity Risks In 3D Printing

    A team comprising of Indian-origin researchers has found cybersecurity risks in 3D printing by examining two aspects -- printing orientation and insertion of fine defects.

    Indian-Origin Researchers Report Cybersecurity Risks In 3D Printing

    How To Get Started Playing 'Pokemon Go'

    How To Get Started Playing 'Pokemon Go'
    The "Pokemon Go" smartphone game has become a phenomenon since its debut nearly two weeks ago. The appeal stems partly from how easy it is to play.

    How To Get Started Playing 'Pokemon Go'

    Technology Gives Unique Voices To Those Who Can't Speak

    Technology Gives Unique Voices To Those Who Can't Speak
    SPRINGFIELD, N.H. — Jessie Levine smiles and shakes her head when she hears the outgoing voicemail message on her iPhone. "I sound young! And fast!" she marvels. "That person never, ever expected to talk like this."

    Technology Gives Unique Voices To Those Who Can't Speak

    The Latest: Man Plays 'Pokemon,' Crashes Car Into Tree

    The Latest: Man Plays 'Pokemon,' Crashes Car Into Tree
    A man is recovering from minor injuries he suffered when he crashed his brother's car into a tree in central New York while playing "Pokemon Go" on his smartphone.

    The Latest: Man Plays 'Pokemon,' Crashes Car Into Tree

    Irked Owners Trying To Pry 'Pokemon Go' Clutch From Property

    Irked Owners Trying To Pry 'Pokemon Go' Clutch From Property
    LOS ANGELES — As throngs of "Pokemon Go" players traipse around to real-world landmarks in pursuit of digital monsters, some ticked-off property owners are asking to have their locations in the fictional Poke-verse removed.

    Irked Owners Trying To Pry 'Pokemon Go' Clutch From Property