Top 100 Most Common Used Passwords – Avoid Them Or Get Hacked
If you’ve been listening to the news lately you may have been hearing about all sorts of different websites getting hacked from Linked In, and eHarmoney to the latest round involving Yahoo. However one of the major reasons so many people were hacked was because of a human error of not creating a strong enough password.
The truth is passwords are the barrier of protection between us and someone steeling your identity and using it. So in this article I have compromised a list of the 100 most commonly used passwords which are in no particular order. However I’m sure I may have missed one here or their so feel free add them in the comments below.
100 Most Common Used Passwords
- 123456
- password
- 123456789
- welcome
- ninja
- abc123
- qwerty
- 12345678
- princess
- sunshine
- iloveyou
- welcome
- jesus
- babygirl
- 12345
- rockyou
- Nichole
- Daniel
- money
- monkey
- freedom
- 654321
- michael
- 1234567
- love
- master
- ginger
- 11111
- 1234
- dragon
- batman
- baseball
- buster
- starwars
- dallas
- summer
- access
- killer
- mustang
- 2000
- soccer
- ranger
- 696969
- tigger
- pass
- shadow
- Jennifer
- letmein
- Joshua
- merlin
- Robert
- hockey
- 666666
- orange
- jordan
- trustno1
- superman
- computer
- 123123
- thunder
- internet
- lifehack
- 0
- gizmodo
- whatever
- cheese
- nintendo
- f— You
- blahblah
- passwOrd
- gawker
- Password
- pokemon
- michelle
- pepper
- kotaku
- F#ck
- P#ssy
- 6969
- 1111
- a##hole
- golfer
- austin
- biteme
- cowboy
- silver
- F#cker
- bigdog
- bl#wjob
- yellow
- 131313
- hello
- please
- scooter
- dick
- iwantu
- sexy
- panties
- hammer
- yankees
What All Of These Passwords Have In Common
Now that you’ve had a chance to review the list of the most common passwords people will use let’s do a little analysis and see what they all have in common and hopefully we can identify some trends to avoid.
- Names. One trend I noticed immediately was how people were using just their first name or someone else’s first name as a password. I’m not saying using someones name is bad but mix it up a bit and use a name along with a number and a symbol. This will make it much harder for the hacker to crack.
- Cuss Words. Again, cuss words such as f–kyou are blatantly obvious keywords.
- Numbers. Another thing you might have noticed is how people will use simple combinations of numbers such as 123456789, or 696969, or 666666. Using numbers is just a bad idea even though their are millions of combinations.
- Short. Of all the passwords I’ve listed the longest one is 9 characters and the shortest is only one. The reality is if you want your password to be unbreakable and to do that it needs to be long and in most cases your passwords should be at least 10 characters long. The more characters you can add the harder it will be for a hacker to break.
- Simple. Finally the last thing I noticed is that all of these passwords they are way to simple. Passwords such as welcome, freedom, money, and of course password are way to easy for scammers to pick. Instead go with combinations that are familiar so you can remember it but are also complex. In fact a recent comment left on my site by Sally suggest to use a base word such as stumbleforward but to change it slightly so it still has a complexity to it that hackers can’t break. In my case I could change it to something like $stumb13tf0rward.
Final Thoughts…
This brings me to my final thought, if are using one of these popular and common passwords and haven’t been hacked yet consider yourself lucky. This should be a red flag to you that you need to change your password if you happen to see it on this list.
However just because your password isn’t on this list doesn’t mean you can’t or won’t be hacked. Take the time to create a strong password and change them often. Later this week I’m going to dig in a bit further and cover the websites that you will be the most likely to get hacked on.
Till then Subscribe to Stumble Forward by Email and get this great and helpful content delivered straight to your inbox.
Chris H.