Three of the most commonly used passwords are: “123456,” “password,” and “iloveyou?”
I logged into Gmail recently and was pleasantly surprised to read this screen pop at the top of the screen:
“Thousands of online accounts are hijacked every day. If you re-use your Gmail password at other websites, change it now.”
Thank you, Google! This is exactly the kind of message people need!
Many people use the same password on multiple sites. Each site that requires you to establish a user name and password employ varying degrees of network security. Less sophisticated sites may even store your password in their database as unencrypted text! And if their network is hacked, and a hacker discovers your username and password, they will likely attempt to use it on sites like Facebook, AOL, Yahoo, and Google to see if it works. If you’ve used the same password everywhere, well, bad people now have access to a lot of personal data. And what’s one of the first things a criminal will do once access is gained? They change the password! Now you can’t get into your account.
I don’t think it’s an exaggeration to say, many identify theft cases begin with a simple password hack.
So change and diversify your weak password! Or someone else will.
I’m by no means an expert on digital security or passwords for that matter. But I have found good resources that have helped me become more sophisticated in my use of passwords.
- There are a lot of tools available to help you avoid having to remember different passwords for all those sites. I use LastPass, and there are other similar trustworthy services worth looking into.
- Here’s a good, eye-opening read on password hacking from John P. at One Man’s Blog: How I’d Hack Your Weak Passwords.
- I’ve developed a fascination with passwords, or more precisely, password security. I listen often to a podcast called Security Now where hosts Steve Gibson and Leo LaPorte discuss topics related to internet, cyber, digital, and network security. Passwords come up often. In fact, Steve Gibson has his own fascination with passwords. Unlike my fascination, however, his has the potential to help people be safer online. You know, because he’s like a computer science genius and all, and I’m not. Anyway, he created a fun tool called Password Haystacks which analyzes the time required to hack a given password, assuming certain variables. For example, 123456 is hacked in under 20 minutes if the hacker is using an exhaustive key search, or brute force technique. Play around with Password Haystacks and see how your password (or hopefully passwords) stack up!
Now that’s a Public Service Announcement! Thanks Trent. That Haystacks site is wild…
You’re welcome! Thanks for checking out the post. Haystacks is fun. Steve is also working on a method of creating unique passwords “off the grid” using a Latin square as a paper-based password guide. Latin squares are used in the familiar Sudoku puzzles. The idea is the user would create a unique Latin square and use the characters on the grid as a way to generate passwords. Not sure I’ll go that far with my password diversification, but the idea in general is pretty cool (and nerdy!).