Top 50 passwords you shouldn’t use – and learn how to create a strong password!

by Klaus on December 23, 2010

in Guides/How-To, Security, Tech News

As you probably already know, Gawker media was compromised not long ago and  passwords belonging to their users went out on the Internet. Gawker media is behind several sites with Gizmodo probably being the most popular one, at least in the tech-world, I imagine.

Based on the 188.279 passwords leaked, Graham Cluley from Sophos made a “top 50”-list over the most used passwords. Passwords which you might want to avoid using as they are really simple to guess and brute force hack:

It’s probable safe to assume that most of the passwords in the list above are only used on unimportant sites such as Gizmodo and not for anything more personal such as Facebook or e-mail accounts.

But why not spend a few minutes and learn how to actually create a strong and secure password that you can easily remember and others cannot easily guess/hack? Here’s how…

Comments & Leave a Comment


{ 12 comments… read them below or add one }

latest-price December 23, 2010 at 13:44

is it safe to type our name in the password?


DJ ARIF December 25, 2010 at 09:59

No sister! It’s not safe to use name in password. If you do that then anyone who knows your name can easily guess your password and you may got hacked! Be aware if this. Try to read this post once again and the watch the video also. Hope this will be helpful for you.

**Another thing try using your name in the name box while commenting.
DJ ARIF recently posted… The Reasons Why Islam Is Against Black Magic And Sorcery


DJ ARIF December 25, 2010 at 10:02

Very short but effective post. It will be so helpful for those users who use general passwords for their security!
DJ ARIF recently posted… The Reasons Why Islam Is Against Black Magic And Sorcery


Miguel Urbina December 26, 2010 at 16:53

OH!, my god!, you discover my password!


Rajesh Chaukwale December 28, 2010 at 18:17

Very nice post friend. I guess this will be helpful for all readers in selecting a safe and strong password. I just read a general survey on web which said that more than 40% passwords can be easily cracked by bruteforcing. This fact really needs attention.
Rajesh Chaukwale recently posted… Download Deep Freeze 6 Full version- Protect computers from Viruses


Rob McCance January 4, 2011 at 03:29

I’ve got to admit, I’ve used qwerty before.

When that expired I went to asdfgh and then zxcvbn.

Then I of course had to move on from the keyboard row methodology.

Rob McCance recently posted… Atlanta Property Taxes


TJ McDowell January 4, 2011 at 21:54

I can’t believe admin isn’t in the list. I guess different systems would see different top passwords…or maybe that was the password of the guy who leaked the info =)
TJ McDowell recently posted… PhotoOne Bought By StudioPlus Software


rijans | TechGainer January 9, 2011 at 05:19

Yeah, these passwords which are most used are included in password cracking dictionaries. No one should use these types of dictionaries.
rijans | TechGainer recently posted… Security 360 Anti-virus An Advanced and Free Anti-Malware-Trojan Remover


darcy January 17, 2011 at 19:45

It is very important to choose the right password, and it is bad to use 123456 or password. Wow, I do really hope that people don’t use this on most sites.
darcy recently posted… Dedicated Server Price Range Information


sridhar April 8, 2011 at 05:37

very useful list. we need to find out how strong is our password using online tools.
sridhar recently posted… JQuery Check-Select all Checkboxes


Witty Artist May 27, 2011 at 11:53

Very useful list and interesting movie. You can also use very personal things & numbers as passwords. The chance for hackers to find it out is a slim one.


Eliot Pearson May 28, 2011 at 16:54

Very informative video. I don’t think people take security seriously. A person wonders why they are victim of indentity theft.
Eliot Pearson recently posted… A Little Spring Cleaning



Leave a Comment

CommentLuv badge

{ 3 trackbacks }

Previous post:

Next post: