Home » Consumer News » Currently Reading:

If Your Password is ‘Password1’, Change It: Everyone Knows

Phillip Dampier March 5, 2012 Consumer News 1 Comment

Internet security firm Trustwave knows your password, if it happens to be “Password1.”

It turns out that is among the most popular password choices now in use on websites and work computers — even more popular than old favorites like “qwerty” and “asdf.”

The security firm noted around 5% of all Internet passwords include a variation on the word “password.”  Second runner-up?  “Welcome,” which appears more than 1% of the time.

But why “Password1”?

Website password security has gotten increasingly robust in recent years, now demanding users include at least one capital letter and number.  “Password1” also stays within the usual requirements for passwords longer than six characters (and often fewer than 10).

The West Australian newspaper reports:

Exploiting weak or guessable passwords was the top method attackers used to gain access last year. It played a role in 29% of the security breaches Verizon’s response team investigated.

Verizon’s scariest finding was that attackers are often inside victims’ networks for months or years before they’re discovered. Less than 20% of the intrusions Verizon studied were discovered within days, let alone hours.

Even scarier: Few companies discovered the breach on their own. More than two-thirds learned they’d been attacked only after an external party, such as a law-enforcement agency, notified them. Trustwave’s findings were almost identical: Only 16% of the cases it investigated last year were internally detected.

So if your password is something guessable, what’s the best way to make it more secure? Make it longer.

Adding complexity to your password — swapping “password” for “p@S$w0rd” — protects against so-called “dictionary” attacks, which automatically check against a list of standard words.

0 0 votes
Article Rating
1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Andrew Madigan
Andrew Madigan
12 years ago

The number of attacks based on leaks is growing. Many people use the same password for many different sites (try remembering 500 different passwords). When a site is attacked and leaks passwords, the hackers will try to log in to other sites with the same (or similar) credentials. Executing a dictionary attack is difficult against secure sites: they’ll lock the an account after 3 attempts so the attacker has to try every account and hope to find one with an insecure password. The fact that sites store the user’s password is unacceptable. They only need to store the hash of… Read more »

Search This Site:

Contributions:

Recent Comments:

Your Account:

Stop the Cap!