Keep Calm – and change your password!
In just 110 attempts, a hacker typically can gain access to one new account, which takes him just one second, i.e. to say that he merely takes 17 minutes to break into a whopping 1,000 accounts. However, a well thought of password makes his job really hard!
Get that perfect password
Follow these simple guidelines to generate the ‘perfect password’:
- The top 10 most popular passwords are: 123456, 12345, 123456789, Password, iloveyou, princess, rockyou, qwerty, 12345678 and abc123. Such passwords account for nearly 50% of the passwords generated globally. Using these passwords means spelling trouble for yourself.
- Your password should contain a minimum of 8 characters, which should be a mix of 4 types: upper case letters, lower case letters, numbers and special characters.
- It should not be a name, a slang word, or any word in the dictionary. It should not include any part of your name or your e-mail address. Every name plus every word in the dictionary will fail under a simple brute force attack, which means that it can be retrieved by a hacker within seconds.
- Nearly 3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more. It is necessary to have different passwords for different accounts. If you cannot remember them, write them down and keep it safely with you. Don’t forget to change your passwords atleast once every month.
- Keep in mind – if it is easy to remember, it is easy to hack!
Nowadays certain tools have become the hacker’s weapons. However, a few small measures can beat them too:
is a basic tool that can be used for getting passwords. Via this, every key pressed on the computer/laptop is recorded, and can be viewed later on. So, any password keyed in can be recovered by the hacker.
Solution: Circumvent this by using virtual keyboard while typing sensitive information such as bank passwords.
Hackers can also use ‘remote administration tools’ or ‘RATs’ to gain access into your computer/laptop using the internet and monitor every activity.
Solution: Normally, such malicious tools cannot be removed manually. Use a reputed anti-spyware tool such as Reimage or Malwarebytes Anti-Malware.
AS A USER – feel free to share the stupidest passwords you have created, not your current ones ;), by commenting below.
Disclaimer: The above article is curated based on limited and publicly available open source information. The views and opinions expressed therein and all data and information so provided is solely for informational purposes, to be used at the sole discretion of the reader. If you disagree with any article or any part thereof, please contact us and we will resolve the issue at the earliest. KyaBae makes no representations as to accuracy, completeness, currentness, suitability, or validity of any information and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.