What Are The Worst Passwords To Use?

worst passwords
By Ben Hartwig
18 October, 2018

In order to choose a good, safe password, it’s important to know why a strong password is important: it’s not likely that an individual will take time to try cracking your password and gaining access to your accounts and files. Instead, the work is likely to be done by a computer program capable of inundating a firewall with a barrage of potential passwords until the correct one is discovered.

Don’t make it easier for them by making your password “1-2-3-4-5-6-7” as apparently nearly 20 percent of all people do. Other simple passwords that don’t pass the test are “qwerty” “princess” and your child’s name. Also, reusing the same password on multiple sites is a bad idea that nearly 30 percent of people practice – a fact that was discovered in a security breach of 32 million accounts.

Don’t Take The Bait

A smart individual hacker has many opportunities to gain access to your files by guessing – or plotting. Oftentimes a fake website or phishing email that offers some gift or benefit for logging on is a veiled attempt to steal your password. Other times a phishing email will be disguised as a message from a legitimate bank or business that needs to contact you (if you’d just log on through their link). That’s how Russian hackers allegedly got access to thousands of Democratic National Campaign emails in 2015, launching the international scandal over interference in the presidential campaign.

So, if your password is a string of consecutive numbers, or “password,” it’s time to change that. Because hackers have developed all sorts of new and devious ways to hijack your most personal information.

Experts warn that weak passwords or simplistic password combinations have had devastating consequences for businesses, even Equifax, the major credit reporting company whose files were hacked, resulting in millions of stolen social security numbers and other sensitive information.

Other Ways Hackers Get In

Easier than guessing your password or lurking over your shoulder in a coffee shop is setting up a fake public wifi network and using it to plant malware on the mobile and laptop devices that people use to connect with. These may launch keyloggers on your hard drive, which are programs that steal passwords, allowing the hacker to gain access to your accounts without actually stealing your phone or computer. Experts also suggest not entering passwords on public computers such as at libraries because these may be infected with malware that will access your account.

Some schemes prey on unsuspecting employees of companies by setting up fake IT (computer assistance) phone lines that request personal identification information and passwords when employees phone in. Even one or two points of access into a company’s files can wreak havoc, whether stealing information or releasing malware that disrupts the company’s ability to do business. Ransomware attacks are examples of this sort of damaging hacking: malware is activated on a company’s computers, essentially locking up all files and functions until a ransom is paid, usually in untraceable cryptocurrency like Bitcoin.

Psychological hacking is a more personal approach to attacking computer security. The 2015 hack of the dating site for cheating spouses, Ashley Madison, threatened to divulge users’ names as well as any explicit sexual fantasies they’d listed on the site, which gave the owners plenty of motivation to deal with the hacker’s demands. Just a few years later those of us with connected homes that include microphones and cameras for security could find ourselves the target of attacks that include recordings of conversations and views of our homes by turning those devices against us.

Tips From Pros

Make it harder for hackers to guess your password with these suggestions:

  • make your password at least 8 characters long, including symbols and numbers
  • use your keyboard to make passwords out of shapes (such as letters)
  • change passwords to sensitive websites and accounts at least once a year
  • opt for 2-factor authentication when available
  • change the answers to your security questions into nonsense strings of letters and numbers too

Many sources suggest using a password management service such as LastPass or Dashlane, which are sophisticated enough to mimic the security settings the government uses. With these, you need only remember one password, which opens the “vault.”

Dash Cam

Cop Cam: How Does Police Dash Cam work?

We live in the age of video, and law enforcement has not escaped this trap.…
09 April, 2020 Law Enforcement
gun background check

What Does Gun Background Check Consist Of?

When someone purchases a gun through a licensed gun dealer, a background check is required…
06 April, 2020 Law Enforcement
car accident

Recovering After Your First Car Accident

Car accidents are never good and can sometimes be very serious or life-threatening. If this…
26 March, 2020 Safety
private investigator

Complete Guide to Hiring a Private Investigator

Whether you need to find a missing person or find out if your spouse is…
24 March, 2020 Privacy
fake news

How to Detect “Fake News” Stories: Complete Guide to Fact-Checking

The last few years have brought many changes to the world, and one of the…
20 March, 2020 Cyber Security
Know your neighbors

Who Are My Neighbors?

Whether you live in the city or suburbs, in a heavily populated area or a…
10 March, 2020 Safety
NFL Players

NFL Players and their Criminal Histories

In 2019, an average of 16.5 million people watched NFL football games. Sundays during football…
06 March, 2020 Crime
tax rates

The 10 Best Cities With the Lowest Tax Rates

There are plenty of reasons why relocating to a new city makes a whole lot…
26 February, 2020 Uncategorized
immigrants

Best Cities in America to Immigrate To

America is a nation built by immigrants. As the immigration debate rages on, there is…
19 February, 2020 Uncategorized
background report details

Does Infotracer Notify the Person You Ran a Background Report On?

In order to choose a good, safe password, it’s important to know why a strong…
10 December, 2018 Safety
best apps for cheating spouse

7 Apps to Use for Cheating Spouses

In order to choose a good, safe password, it’s important to know why a strong…
01 February, 2019 Dating & Relationships
texting while driving

Who’s More Likely to Text and Drive – Teenagers or Their Parents?

In order to choose a good, safe password, it’s important to know why a strong…
27 June, 2019 Safety

Online E-Card Scam: When Good Wishes Deliver Troubles

In order to choose a good, safe password, it’s important to know why a strong…
11 October, 2018 Cyber Security

10 States with “No Candy” Laws for Halloween

In order to choose a good, safe password, it’s important to know why a strong…
06 October, 2018 Law Enforcement

What are the 5 Biggest Online Scams?

In order to choose a good, safe password, it’s important to know why a strong…
13 August, 2018 Cyber Security

Best and Worst States for DMV

In order to choose a good, safe password, it’s important to know why a strong…
15 May, 2019 Safety

5 Things You Should Know Before Exploring the “Dark Web”

In order to choose a good, safe password, it’s important to know why a strong…
27 August, 2018 Cyber Security

Privacy Controls: Part 2: Control your Personal Reputation Online on Google

In order to choose a good, safe password, it’s important to know why a strong…
04 September, 2018 Privacy