{"id":1426,"date":"2019-10-17T21:32:35","date_gmt":"2019-10-17T21:32:35","guid":{"rendered":"https:\/\/www.comtodo.info\/?p=1426"},"modified":"2021-09-22T16:05:35","modified_gmt":"2021-09-22T16:05:35","slug":"las-10-contrasenas-mas-inseguras-del-mundo","status":"publish","type":"post","link":"https:\/\/comtodo.com\/en\/las-10-contrasenas-mas-inseguras-del-mundo\/","title":{"rendered":"The 10 most insecure passwords in the world"},"content":{"rendered":"<h4><span style=\"color: #101040;\">Do you know what is the most insecure password in the world? Easy: &#8220;123456&#8221;.<\/span><\/h4>\n<p><span style=\"color: #101040;\">Some, very astute, make it harder for hackers and &lt;strong&gt;&lt;\/strong&gt;use the key &#8220;123456789&#8221;. With this, the only thing they achieve is to have the second most insecure password in the world.<\/span><\/p>\n<ul>\n<li><span style=\"color: #101040;\">The rehabilitated criminal hackers who now face off against internet criminals.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #101040;\">These two passwords are part of the blacklist that published on Tuesday the <\/span><br><span style=\"color: #101040;\">National Cybersecurity Center (NCSC), a <\/span><br><span style=\"color: #101040;\">Government agency of the United Kingdom responsible for preventing and combating <strong>computer crimes<\/strong>.<\/span><\/p>\n<p><span style=\"color: #101040;\">The list published by the NCSC includes 100,000 of the most commonly used passwords that have been violated by third parties in global cyber attacks.<\/span><\/p>\n<p><span style=\"color: #101040;\">The NCSC warns that the publication of these passwords does not pose a <strong>risk<\/strong>, since they are already in the public domain.<\/span><\/p>\n<ul>\n<li><span style=\"color: #101040;\">Why cybersecurity should be more like a chameleon than a rhinoceros.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #101040;\">On the contrary, they say that this list is a way of raising <strong>awareness<\/strong> about the way in which attackers use the passwords they obtain illegally.<\/span><\/p>\n<p><span style=\"color: #101040;\">Further, it can be a way to make work harder for <\/span><br><span style=\"color: #101040;\">cybercriminals and reduce the risk of users of networks and <strong>digital platforms<\/strong>.<\/span><\/p>\n<p><span style=\"color: #101040;\">This is the list of the most insecure passwords in the world, according to NCSC:<\/span><\/p>\n<ol class=\"block-editor-rich-text__editable editor-rich-text__editable\" role=\"textbox\" contenteditable=\"true\" aria-multiline=\"true\" data-is-placeholder-visible=\"false\" aria-label=\"Escribe una lista\u2026\" aria-autocomplete=\"list\">\n<li><span style=\"color: #101040;\">123456<\/span><\/li>\n<li><span style=\"color: #101040;\">123456789<\/span><\/li>\n<li><span style=\"color: #101040;\">qwerty<\/span><\/li>\n<li><span style=\"color: #101040;\">password<\/span><\/li>\n<li><span style=\"color: #101040;\">111111<\/span><\/li>\n<li><span style=\"color: #101040;\">12345678<\/span><\/li>\n<li><span style=\"color: #101040;\">abc123<\/span><\/li>\n<li><span style=\"color: #101040;\">1234567<\/span><\/li>\n<li><span style=\"color: #101040;\">password1<\/span><\/li>\n<li><span style=\"color: #101040;\">12345<\/span><\/li>\n<\/ol>\n<p><span style=\"color: #101040;\">If you wonder what <strong>&#8220;qwerty&#8221;<\/strong> means, that <\/span><br><span style=\"color: #101040;\">appears third, the answer is that it means nothing. It&#8217;s just <\/span><br><span style=\"color: #101040;\">the order in which those letters appear from left to right in the <\/span><br><span style=\"color: #101040;\">computer keyboard. <\/span><\/p>\n<p><span style=\"color: #101040;\"><em data-rich-text-format-boundary=\"true\">Password<\/em>,&nbsp;in position 4, means &#8220;password&#8221; in English. <\/span><\/p>\n<p><span style=\"color: #101040;\">Then there are others that, although they did not manage to enter the top 10, are just as <strong>&#8220;creative&#8221;<\/strong>: &#8220;1234567890&#8221;, &#8220;123123&#8221;, &#8220;000000&#8221;, &#8220;iloveyou&#8221;, &#8220;1234&#8221;.<\/span><\/p>\n<p><span style=\"color: #101040;\">And they couldn&#8217;t miss &#8220;qqqqqq&#8221;, <strong>&#8220;xxxxxx&#8221;<\/strong> or &#8220;aaaaa&#8221;.<\/span><\/p>\n<p><span style=\"color: #101040;\">In the list of the worst passwords there are also very <strong>common terms <\/strong>like &#8220;superman&#8221; or &#8220;pokemon&#8221;, or names like &#8220;carlos&#8221;, &#8220;angela&#8221;, &#8220;maria&#8221; or &#8220;gabriel&#8221;, written like this, without capitals or accents. <\/span><\/p>\n<p><span style=\"color: #101040;\">There is other passwords also very insecure, which however do not appear in the list, such as when employees of the same company they use the <strong>name of the company<\/strong>&nbsp;to access personal or corporate platforms.<\/span><\/p>\n<p><span style=\"color: #101040;\">The NCSC warning is clear and simple: &#8220;If you see a password on this list you use, you should <strong>change it immediately<\/strong>.&#8221; <\/span><\/p>\n<h4><span style=\"color: #101040;\">The problem of recycling passwords<\/span><\/h4>\n<p><span style=\"color: #101040;\">For NCSC, one of the biggest risks for people and companies is to use <strong>the same password<\/strong>&nbsp;for various platforms.<\/span><\/p>\n<p><span style=\"color: #101040;\">The password &#8220;123456&#8221;, for example, has appeared <strong>23 million times <\/strong>in the leaks from which the listing was made.<\/span><\/p>\n<h4><span style=\"color: #101040;\">Recommendations<\/span><\/h4>\n<p><span style=\"color: #101040;\">Here are some recommendations from the NCSC to have more secure passwords: <\/span><\/p>\n<ul>\n<li><span style=\"color: #101040;\">Use three random words, that you can easily remember but that do not have relation to each other, for example something like <strong>&#8220;coffeetrainfish&#8221;<\/strong>&nbsp;or <strong>&#8220;wallsshirtcloud&#8221;<\/strong>.<\/span><\/li>\n<\/ul>\n<ul class=\"block-editor-rich-text__editable editor-rich-text__editable\" role=\"textbox\" contenteditable=\"true\" aria-multiline=\"true\" data-is-placeholder-visible=\"false\" aria-label=\"Escribe una lista\u2026\" aria-autocomplete=\"list\">\n<li><span style=\"color: #101040;\">It is almost impossible not to use the same password in several accounts, but in some cases it is highly recommended that you <strong>do not use a password that you have already used.<\/strong><\/span><br><span style=\"color: #101040;\">In cases such as bank accounts, storage systems, mail <\/span><br><span style=\"color: #101040;\">electronic or social networks, it is better not to repeat passwords. <\/span><\/li>\n<li><span style=\"color: #101040;\">For increase safety, the NCSC recommends implementing systems <\/span><br><span style=\"color: #101040;\">two-step authentication, that is, in addition to the password, the <\/span><br><span style=\"color: #101040;\">account ask for a <strong>second access code<\/strong>, such as a temporary code or a security question. <\/span><\/li>\n<li><span style=\"color: #101040;\">It is also advisable to use a <strong>password manager<\/strong>, in which you can store several of them safely. <\/span><\/li>\n<li><span style=\"color: #101040;\">The<\/span><br><span style=\"color: #101040;\">experts in cybersecurity suggest not using personal data or <\/span><br><span style=\"color: #101040;\">repeat the username in the password. It is also advisable to <strong>combine letters<\/strong>, symbols, capital letters and numbers.<\/span><\/li>\n<\/ul>\n\n\n<p><\/p>\n\n    <div class=\"xs_social_share_widget xs_share_url after_content \t\tmain_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content\">\n\n\t\t\n        <ul>\n\t\t\t        <\/ul>\n    <\/div> \n","protected":false},"excerpt":{"rendered":"<p>Do you know what is the most insecure password in the world? Easy: &#8220;123456&#8221;. Some, very astute, make it harder for hackers and &lt;strong&gt;&lt;\/strong&gt;use the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"class_list":["post-1426","post","type-post","status-publish","format-standard","hentry","category-interest"],"_links":{"self":[{"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/posts\/1426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/comments?post=1426"}],"version-history":[{"count":0,"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/posts\/1426\/revisions"}],"wp:attachment":[{"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/media?parent=1426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/categories?post=1426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/comtodo.com\/en\/wp-json\/wp\/v2\/tags?post=1426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}