Internet

If you use these passwords, change them right now, they are the most hacked

The password is the main security barrier to avoid intruders in our accounts. We use them to protect email, social networks or any device. In case there is a problem and it is leaked, hackers can access the accounts and compromise privacy and security. In addition, they can use methods to try to steal them. In this article we are going to talk about what are the passwords they use the most to try to steal and what you should avoid using.

Keys most used to attack

The hackers they can use certain passwords that are common to try to break into accounts illegitimately. Basically what they do is try what is usually more common and see if that person has made the mistake of using a password considered frequent and being able to enter their profile on social networks, email or any online platform.

But what are these? most common passwords? Here we can mention two possibilities. The first one is to test keys that are generic, that can be used by any user. They are usually of the type “password”, “admin”, “123456”, “qwerty”, etc. They are common words or digits, used by many users for ease of remembering them. Sometimes they are even keys that are already pre-established in devices such as routers, as is the case with “admin” and the like.

On the other hand, the second option is to try more personalized passwords but following the same pattern. That is, they can try, for example, with the first and last name of that person, the date of birth, the mobile number if they know what it is, etc. They are fairly common keys that despite being a major error are still widely used.

These are, therefore, the passwords that hackers will first try to try to gain access to an account. As you can see, it is not even necessary to have great knowledge in cybersecurity, since anyone could try them. Simply by knowing what your email address is, they could start testing with the first ones, while if they know your name or date of birth (something they could find out through social networks, for example) they could go to the second block.

In any case, whatever method they use, they could break into your account if you make the mistake of using these common password types. To avoid this, we invite you to check if your password has been leaked and use reliable passwords.

What secure keys to use

Then,what should a good password look like to avoid this kind of problem? It is essential that you do not make mistakes and that is why we are going to give you some essential guidelines so that you can generate strong access codes with which you can protect your device, social networks or any online service.

All this cannot be missing in your passwords:

  • Unique key, that you do not use elsewhere
  • Letters (upper and lower case), numbers and other symbols
  • At least 12 characters
  • It must not contain any personal data
  • change it from time to time

If you follow these recommendations, you can have really strong and secure passwords. You will be able to prevent them from accessing your social networks or any platform, since hackers can use brute force and try multiple passwords that are more common.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *