If you use these passwords, change them right now, they are the most hacked

The password is the main security barrier to avoid intruders in our accounts. We use them to protect email, social networks or any device. In case there is a problem and it is leaked, hackers can access the accounts and compromise privacy and security. In addition, they can use methods to try to steal them. In this article we are going to talk about the passwords that are most used to try to steal and that you should avoid using.

Keys most used to attack

If you use these passwords, change them right now

Hackers can use certain common passwords to try to break into accounts illegitimately. Basically what they do is try what is usually more common and see if that person has made the mistake of using a password considered frequent and being able to enter their profile on social networks, email or any online platform.

But what are these most common passwords ? Here we can mention two possibilities. The first one is to test keys that are generic, that can be used by any user. They are usually of the type “password”, “admin”, “123456”, “qwerty”, etc. They are common words or digits, used by many users for ease of remembering them. Sometimes they are even keys that are already pre-established in devices such as routers, as is the case with “admin” and the like.

On the other hand, the second option is to try more personalized passwords but following the same pattern. That is, they can try, for example, with the first and last name of that person, the date of birth, the mobile number if they know what it is, etc. They are fairly common keys that despite being a major error are still widely used.

These are, therefore, the passwords that hackers will first try to try to gain access to an account. As you can see, it is not even necessary to have great knowledge in cybersecurity, since anyone could try them. Simply by knowing what your email address is, they could start testing with the first ones, while if they know your name or date of birth (something they could find out through social networks, for example) they could go to the second block.

In any case, whatever method they use, they could break into your account if you make the mistake of using these common password types. To avoid this, we invite you to check if your password has been leaked and use reliable passwords.

Robo de contraseñas a través del traductor de Google

What secure keys to use

So what should a good password look like to avoid these kinds of problems? It is essential that you do not make mistakes and that is why we are going to give you some essential guidelines so that you can generate strong access codes with which you can protect your device, social networks or any online service.

All this cannot be missing in your passwords:

  • Unique key, that you do not use elsewhere
  • Letters (upper and lower case), numbers and other symbols
  • At least 12 characters
  • It must not contain any personal data
  • change it from time to time

If you follow these recommendations, you can have really strong and secure passwords. You will be able to prevent them from accessing your social networks or any platform, since hackers can use brute force and try multiple passwords that are more common.