{"id":131775,"date":"2024-09-13T16:01:59","date_gmt":"2024-09-13T20:01:59","guid":{"rendered":"https:\/\/rbach.net\/?p=131775"},"modified":"2024-09-18T14:40:09","modified_gmt":"2024-09-18T18:40:09","slug":"passwords-dont-make-these-mistakes-to-stay-safe","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/passwords-dont-make-these-mistakes-to-stay-safe\/","title":{"rendered":"Passwords: Don\u2019t Make These Mistakes to Stay Safe"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background-e1721589762107.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-131826 size-medium\" title=\"Passwords: Don\u2019t Make These Mistakes to Stay Safe\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?resize=150%2C150&#038;ssl=1\" alt=\"Passwords: Don\u2019t Make These Mistakes to Stay Safe\" width=\"150\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Retro-style-zombie-computer-with-no-cobwebs-on-a-white-background.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>In 2023, over <strong><a title=\"17 Billion Personal Records Exposed in Data Breaches in 2023\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/personal-records-exposed-data\/\" target=\"_blank\" rel=\"noopener\">1.7 billion passwords<\/a><\/strong> were compromised. This number is over five times the population of the United States or an average of over 46,000 passwords per minute. Compromised records refer to personal data, such as passwords, that have been stolen or leaked, often through data breaches or hacking attacks. Chances are good that some of your credentials are out there. These compromised records often end up on the <strong>dark web<\/strong>. The dark web, a hidden part of the internet accessible only through specialized software, is known for its anonymity and is often used for illegal activities. Hackers use the dark web to buy, sell, trade, or steal data, as seen in the recent <a title=\"Massive Data Leak Exposes 10 Billion Unencrypted Passwords\" href=\"https:\/\/wp.me\/p2wgaW-yfW\" target=\"_blank\" rel=\"nofollow noopener\">Rockyou2024 data leak<\/a>. This makes it a popular marketplace for hackers to acquire compromised passwords and other sensitive information. Once hackers have the data, they engage in a process of guessing, information gathering, and tricking to commit identity theft. Each phase is designed to exploit the data that the attackers already possess.<\/p>\r\n\r\n<h3>The hackers try to guess your password<\/h3>\r\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spray-painting-password-white-background-e1721496300947.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131810\" title=\"Don't Be Hacked! Avoid These Password Mistakes\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spray-painting-password-white-background-e1721496300947-100x150.jpg?resize=67%2C100&#038;ssl=1\" alt=\"Don't Be Hacked! Avoid These Password Mistakes\" width=\"67\" height=\"100\" \/><\/a>Hackers can launch a brute-force attack with just an email address. A brute force attack is an automated, trial-and-error method known as &#8220;<strong>password spraying<\/strong>.&#8221; In password spraying, a cyber attacker tries common passwords across many accounts, avoiding account lockouts and remaining undetected. For hackers, a list of passwords is merely a starting point. Bad actors employ a variety of tactics to decipher your credentials.<\/p>\r\n<p><strong>They try sequential number combinations &#8211;<\/strong> Hackers often try sequential number combinations. As the table below shows, most passwords share a common feature: <a title=\"Why Are We Still Using Bad Passwords\" href=\"https:\/\/wp.me\/p2wgaW-y8J\" target=\"_blank\" rel=\"noopener\">sequential numbers<\/a>, such as 12345.\u00a0Avoid using these in your passwords as they make them predictable and easy to guess<\/p>\r\n\n<table id=\"tablepress-98\" class=\"tablepress tablepress-id-98\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"6\" class=\"column-1\"><h3><center><strong>NordPass top 5 worst passwords 2019 - 2023<\/strong><\/center><\/h3><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><strong>2019<\/strong><\/td><td class=\"column-3\"><strong>2020<\/strong><\/td><td class=\"column-4\"><strong>2021<\/strong><\/td><td class=\"column-5\"><strong>2022<\/strong><\/td><td class=\"column-6\"><strong>2023<\/strong><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">01<\/td><td class=\"column-2\">12345<\/td><td class=\"column-3\">123456<\/td><td class=\"column-4\">123456<\/td><td class=\"column-5\">password<\/td><td class=\"column-6\">123456<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">02<\/td><td class=\"column-2\">123456<\/td><td class=\"column-3\">123456789<\/td><td class=\"column-4\">123456789<\/td><td class=\"column-5\">123456<\/td><td class=\"column-6\">admin<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">03<\/td><td class=\"column-2\">123456789<\/td><td class=\"column-3\">picture1<\/td><td class=\"column-4\">12345<\/td><td class=\"column-5\">123456789<\/td><td class=\"column-6\">12345678<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">04<\/td><td class=\"column-2\">test1<\/td><td class=\"column-3\">password<\/td><td class=\"column-4\">qwerty<\/td><td class=\"column-5\">guest<\/td><td class=\"column-6\">123456789<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">05<\/td><td class=\"column-2\">password<\/td><td class=\"column-3\">12345678<\/td><td class=\"column-4\">password<\/td><td class=\"column-5\">qwerty<\/td><td class=\"column-6\">1234<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" title=\"Top 200 Most Common Passwords\" rel=\"noopener nofollow\" target=\"_blank\">NordPass<\/a><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td><td class=\"column-6\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-98 from cache -->\r\n<p>Using sequential numbers is also a bad idea for the <a title=\"What\u2019s the World\u2019s Safest, Best PIN?\" href=\"https:\/\/www.rd.com\/article\/the-worlds-safest-best-pin\/\" target=\"_blank\" rel=\"nofollow noopener\">four-digit PIN<\/a> of your debit card.<\/p>\r\n<p><strong>They guess common phrases &#8211;\u00a0<\/strong>Hackers often guess common phrases. Therefore, avoid using common words or phrases. Common words or phrases in passwords are predictable and can be easily cracked. While they may be easy for you to remember, they are also among the first passwords that hackers will guess.<\/p>\r\n<p>In lists of the <a title=\"Why Are We Still Using Bad Passwords\" href=\"https:\/\/wp.me\/p2wgaW-y8J\" target=\"_blank\" rel=\"noopener\">most common passwords<\/a>, the word \u201cpassword\u201d has consistently been in the top 10 for the past five years. Phrases such as \u201cAdmin,\u201d \u201ciloveyou,\u201d \u201cqwerty,\u201d and \u201cguest\u201d frequently appear in the top 25.<\/p>\r\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/6d81b270-be84-43a3-b43e-efc92aa91fb3.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131811\" title=\"substitutions in passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/6d81b270-be84-43a3-b43e-efc92aa91fb3-150x150.jpg?resize=100%2C100&#038;ssl=1\" alt=\"substitutions in passwords\" width=\"100\" height=\"100\" \/><\/a><strong>They look for substitutions &#8211;\u00a0<\/strong>Hackers often look for substitutions. Using common words with case and numerical substitutions in a password is risky. Attackers frequently use dictionary attacks. Dictionary attacks occur when the bad guys attempt common words, phrases, and predictable substitutions. Attackers often use common words with case and numerical substitutions, such as &#8216;4&#8217; for &#8216;A,&#8217; &#8216;3&#8217; for &#8216;E,&#8217; &#8216;1&#8217; for &#8216;I,&#8217; and &#8216;0&#8217; for &#8216;O&#8217;.&#8221; Therefore, even with these substitutions, your password could still be relatively easy to crack. For example, they will try &#8220;password,&#8221; &#8220;Password,&#8221; &#8220;Pa$$word,&#8221; and &#8220;Passw0rd&#8221; too.<\/p>\r\n<h3>Next they gather information<\/h3>\r\n<p><strong>They try pet and family names &#8211;\u00a0<\/strong>Hackers often try pet and family names. In your passwords, do not use easily guessable information such as your pet\u2019s, child\u2019s, or spouse\u2019s name. Bing warns that this kind of personal information can often be found on social media or through other means. This makes it easier for someone to guess your password. An attacker who has obtained some of your personal information may also check your family\u2019s accounts to try to access your records.<\/p>\r\n<p><strong>They use significant dates &#8211; <\/strong>Hackers often use<strong> significant dates<\/strong>. Just like family names, it\u2019s not good to use significant dates such as a birthday, anniversary, or a loved one\u2019s birthday as passwords. These dates are easy to guess because they are memorable. Hackers can easily guess or discover special dates through social media. Hackers can also figure them out quite easily if they have access to your personal information.<\/p>\r\n<h3>Hackers try to trick you into giving them your passwords<\/h3>\r\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing-white-background-digital-art.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131813\" title=\"trick you into giving them your password\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing-white-background-digital-art.jpg?resize=100%2C100&#038;ssl=1\" alt=\"trick you into giving them your password\" width=\"100\" height=\"100\" \/><\/a><strong>They go phishing &#8211;\u00a0<\/strong>Hackers often go phishing. Phishing is one of the easiest ways for attackers to obtain your credentials. They send out bogus emails disguised as legitimate ones. Malicious actors send phishing emails to trick you into revealing personal information (such as passwords and credit card numbers) through fake emails or websites.<\/p>\r\n<p>Clicking on a phishing email will redirect you to a fake website. Once there, they will capture your user ID and password. Therefore, <strong>don&#8217;t open emails from unknown sources<\/strong>.<\/p>\r\n<div class=\"content user-select-text\" tabindex=\"0\" aria-description=\"\" aria-label=\"Sent by Copilot: Job phishing is a scam where fraudsters pose as employers to steal personal information or money from job seekers[^4^].\">\r\n<div class=\"ac-container ac-adaptiveCard has-image\">\r\n<div class=\"ac-textBlock\">\r\n<p><strong>Job phishing<\/strong> &#8211; <a class=\"tooltip-target\" href=\"https:\/\/seon.io\/resources\/dictionary\/job-scam\/\" target=\"_blank\" rel=\"noopener\" data-citationid=\"1d37a7f5-436f-cba7-eb41-cbdfc7111be3-2-group\">Job phishing<\/a> is a scam that takes advantage of the unemployed or those looking to change jobs. Job scammers may send emails or create fake job listings that require applicants to provide personal information or pay fees upfront. Be wary of job offers that seem too good or ask for sensitive information before an interview.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<p><strong>Hackers often use password reset questions &#8211; <\/strong>Have you ever registered your username and password with a company for tech support or some swag? And then later, did you receive an email asking if you requested a password change, even though you didn\u2019t? It was probably a hacker.<\/p>\r\n<p>Cybercriminals can use your password reset questions to change your password and lock you out of your account. For instance, if you suddenly find yourself unable to access your Facebook account, you may have been hacked.<br \/><br \/>One way to prevent this is by providing nonsensical answers to security questions. Instead of providing accurate information, provide quirky responses that only you would know. The next time your account asks where you were born, You could say Butterfly.<\/p>\r\n<p><strong><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Work-in-progress-1-e1721512278775.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131820\" title=\"SPAM Bots\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Work-in-progress-1-e1721512278775-150x142.jpg?resize=100%2C94&#038;ssl=1\" alt=\"SPAM Bots\" width=\"100\" height=\"94\" \/><\/a>They create bots &#8211;<\/strong>If they have exhausted their resources, hackers have one final tool to break your code. They can create a bot. A phishing bot is a program that automatically sends fake emails or messages to trick people into revealing personal information. The bot can try every possible combination of user ID and password. Modern computers can be very fast at guessing passwords. Here&#8217;s a breakdown:<\/p>\r\n<ul data-sourcepos=\"3:1-3:1\">\r\n<li data-sourcepos=\"3:1-3:1\">Faster guesses for simpler passwords: Hackers can very quickly try millions of simple passwords (like &#8220;password123&#8221;).<\/li>\r\n<li data-sourcepos=\"4:1-4:40\">Slower guesses for stronger passwords: More complex passwords with a mix of uppercase and lowercase letters, numbers, and symbols take much longer to crack.<\/li>\r\n<\/ul>\r\n<h3 data-sourcepos=\"6:1-6:46\"><em>rb-<\/em><\/h3>\r\n<p data-sourcepos=\"6:1-6:46\"><em>The key is to make it as difficult as possible for hackers by using strong passwords. Even with powerful computers, a strong password can take years to crack.<\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><strong>Related article<\/strong><\/p>\r\n<ul>\r\n<li><a title=\"How Secure is My Password?\" href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\" target=\"_blank\" rel=\"nofollow noopener\">How Secure is My Password?<\/a> (<a title=\"Security.org\" href=\"https:\/\/www.security.org\" target=\"_blank\" rel=\"nofollow noopener\">Security.org<\/a>)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener\">Ralph Bach<\/a> has been in IT for a while and has blogged from the <a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener\">Bach Seat<\/a> about IT, careers, and anything else that has caught my attention since 2005. You can follow me on <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> or <a title=\"Mastodon\" href=\"https:\/\/mastodon.social\/@rbnetinfo\" rel=\"nofollow \">Mastodon<\/a>. Email the Bach Seat <a title=\"Email Bach Seat\" href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Cybercrooks have a three-step plan to exploit stolen passwords. They are: guess, gather, and trick. A strong password is the best defense against these attacks.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[3719,2541,4],"class_list":["post-131775","post","type-post","status-publish","format-standard","hentry","tag-3719","tag-passwords","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/131775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=131775"}],"version-history":[{"count":27,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/131775\/revisions"}],"predecessor-version":[{"id":132415,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/131775\/revisions\/132415"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=131775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=131775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=131775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}