Tuesday, October 27, 20:50
Home security Survey: 1 in 142 passwords is "123456"

Survey: 1 in 142 passwords is "123456"


One of the largest studies examining it reuse of codes, showed that 1 in 142 passwords is the well-known "123456".

The study, conducted last month, analyzed combinations of usernames and passwords access who were exposed to Internet after violations data various companies.

This data has been on the internet for over 5 years and continues to grow as more and more companies fall. victims attacks, ending in violations data.

Typically, exposed data, including usernames and passwords, is on a site such as GitHub or the GitLab, or are freely distributed through hacking Forums and file-sharing portals.

The companies technology usually collect this information. For example, h GoogleThe Microsoft and Apple, collect exposed passwords to create systems that warn users, when using a "weak" or "common" password.

Also, the site “Have I Been Pwned”Examines the exposed data, and so the users they can consult it to see if credential, they have violated.

Research results

Last month, o Ata Hakçıl, A Turkish student studying at a university in Cyprus also came down analyzed more than one billion usernames and passwords.

The basic finding is that the credentials included only 168.919.919 unique passwords. The code "123456" was found 7 million times.

This means that in every 142 codes access, one was "123456". This is him most commonly reused code in the last five years.

In addition, Hakçıl discovered that The average length of passwords is 9,48 characters, which is not good, as most security experts recommend users to use large passwords (about 16 to 24 characters).

Another problem identified by the Turkish researcher was complexity of codes. Only 12% had a special character.

In most cases, users chose simplified codes, only in letters (29%) or numbers (13%). This means that about 42% of the 1 billion codes were vulnerable to dictionary attacks, allowing attackers to gain access to accounts without any effort or technical difficulty.

The full results of the study are available at GitHub.



Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!



Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...