how long should my password be?

25 Worst Passwords of 2014

The 25 most commonly used passwords online.–PC Pitstop.

25 Worst Passwords of 2014

by Fox Van Allen for Techlicious

Today, password management app company SplashData released its annual list of the “Worst Passwords of 2014,” the 25 most commonly used passwords used online. Once again, both “123456” and “password” top the list as the most common – and thus the most commonly guessed and compromised – passwords of the year.

The full top 25 list, compiled by analyzing over 3.3 million passwords leaked through hacks and compromises throughout 2014, is as follows:

1. 123456
2. password
3. 12345
4. 12345678
5. qwerty
6. 1234567890
7. 1234
8. baseball
9. dragon
10. football

Article continued here

This excerpt appears with the permission of Techlicious.

139 total views, 2 views today

(Visited 16 times, 1 visits today)

13 thoughts on “25 Worst Passwords of 2014

  1. I use the square root of pi as my password. It has never been hacked, although this is only my second time on line in five years. I finally had some down time to log on.

  2. I save my passwords in Greek in a password-encrypted file, then go to the desired one, C it to the clipboard, close that file, go to the website and V it to the password-space. Since all (?) password readers seem to look as the underlying ASCII-code of the characters entered, it has always worked. This should stymie any keystroke-logging malware that may have eluded my other defenses. I hope.

  3. Why do you use the turn hackers for every body in programming. Microsoft uses term to discredit all hackers. To distinguish between the two Unix/Linux programmers uses Crackers for bad people and Hackers for good people.

    • @Joseph Jones: Because our audience is the general public, not Linux programmers, and the term “hacker” is widely understood in this context to mean black hat hackers (or crackers), not white hat hackers. We’re certainly not using the term to discredit all hackers. White hat hacking is a critical means of identifying security flaws in common programs and services that may otherwise be uncovered by black hat hackers if left undiagnosed.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.