Infracore LLC Blog

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

An analysis of the millions of stolen credentials by security company LeakedSource shows a troubling practice; the most-used passwords are also super easy to guess. In fact, the number one password (connected to more than 120,000 accounts) is “12345.”

Fans of the 1987 Mel Brooks film Spaceballs can see the irony here. In one of the movie’s most quoted scenes, the evil-yet-lovable Dark Helmet is blackmailing King Roland to turn over the password protecting Druidia’s precious atmosphere. Eventually, King Roland caves and reveals the super-secret, super-important password to be, you guessed it, “12345.”

To which Dark Helmet replies, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

The report from LeakedSource goes on to reveal that the other, most-used passwords are also ridiculously easy to guess; “123456789,” “qwerty,” and “password.”

The fact that Spaceballs came out almost 30 years ago is evidence that using overly simple passwords has been a problem for quite a while, and, as long as there will be passwords, this will continue to be a major issue. Fortunately, the solution is stupidly simple; make sure to use complex passwords with random characters.

Although, using complex passwords is only part of the security equation. For websites and services offering two-factor authentication, like Twitter, you’ll want to take advantage of it. This way, even if a hacker made off with your super-complex password, they’ll still need access to your email account or smartphone in order to log in.

One additional password blunder that’s all too common and easy to avoid is using the same password for multiple accounts. In a major hacking situation like Twitter experienced, even a novice hacker could connect the dots and use the stolen password to try and log into different accounts belonging to the victim.

What kind of a King Roland-like idiot would use the same, super-simple password across multiple online accounts? Well, Facebook’s CEO Mark Zuckerberg for one.

On June 6th, Mark Zuckerberg lost control of his Twitter and Pinterest accounts after a hacker used the same password to access both of them. The super-complex password that stood between a hacker and the King of Social Media, “dadada.” Admittedly, this is a step up from “12345,” but not by much.

To make matters worse, Zuckerberg had used this password before. This highlights yet another best practice when it comes to password security; be sure to routinely change your password, and when you change it, make sure to not use a password that you’ve used before.

Being smart about your passwords will go a long way in protecting your online identity. For your business, it’s wise to take as many security precautions as possible in order to protect your network from hackers looking to steal your company’s sensitive information. To learn more about how Infracore LLC can keep you safe, call us at (858) 509-1970.

Tip of the Week: How to Easily Add a Second Phone ...
3 Talk-to-Text Apps that Get the Job Done


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions User Tips Hackers Microsoft Data Malware Innovation Productivity Software Mobile Devices Tech Term Backup Internet Smartphones Hardware Business Email Browser Communications Windows 10 IT Services Data Backup VoIP Business Continuity Smartphone Computer Cloud Computing Android Alert Business Management Workplace Tips Efficiency Disaster Recovery Small Business Outsourced IT Data Recovery Managed IT Services Office Chrome Artificial Intelligence Router Computers Ransomware Miscellaneous Communication Managed IT Services Cybersecurity Internet of Things Windows 10 Network Law Enforcement IT Support Cybercrime Productivity Facebook Virtualization Windows Collaboration Money Passwords Health Mobile Device Social Media How To Gadgets Office 365 Telephone Systems Holiday Password Applications Spam Work/Life Balance Private Cloud Server Social Engineering App Google Drive Automation Saving Money Quick Tips Word Information Wi-Fi Upgrade Keyboard Managed Service Vulnerability BDR Settings Apps Scam Data Breach HaaS Office Tips Mobile Device Management Data Protection Voice over Internet Protocol IT Support Phishing Microsoft Office Two-factor Authentication Hacking Bring Your Own Device Encryption Save Money Data Security Connectivity Mobility Machine Learning Charger Telephony Human Resources Fraud Access Control Data Management Virtual Assistant Windows 7 Google Docs Patch Management PDF Botnet BYOD Cleaning Comparison Data Storage Worker Telephone System Website CES Marketing Sports Big Data Managed Service Provider Battery Software as a Service Government Computer Care OneNote IT Management Redundancy Content Management Spam Blocking Avoiding Downtime Electronic Medical Records Remote Computing Samsung Public Cloud Business Intelligence IT Plan Training Blockchain Bandwidth Identity Theft Flexibility Entertainment Operating System Update Servers Infrastructure USB Value Firewall Networking Paperless Office Unsupported Software Legal End of Support Automobile History Remote Monitoring VPN Save Time Employer-Employee Relationship Managed IT Smart Technology Current Events Bing Conferencing Software Tips Wireless Charging Devices Best Practice Internet exploMicrosoft FENG Trending Digital Signage Wire Printer Cast Accountants Techology Users Enterprise Content Management Display Outlook Business Mangement Information Technology iPhone SaaS Unified Threat Management Two Factor Authentication Knowledge YouTube Help Desk Emails Cortana Thought Leadership Content Experience Advertising MSP Skype Staff Amazon Authentication Risk Management Relocation User Error Google Search Solid State Drive Flash Search Mouse Telecommuting Virtual Reality Hiring/Firing Password Management Security Cameras Frequently Asked Questions Gmail Instant Messaging Mobile Computing Meetings Travel Monitor Network Congestion Google Apps Video Games Audiobook Music File Sharing Start Menu Specifications Amazon Web Services Nanotechnology Politics Rootkit Proactive IT Audit How to Transportation Safety Smart Office Administrator Remote Work Practices Worker Commute Employer Employee Relationship NIST Hacker Excel Recovery Recycling Books Assessment Camera Digital Signature Education IT Consultant Shortcuts IT solutions Physical Security Workers Addiction Wearable Technology Augmented Reality Tools Document Management Microchip Online Shopping Smart Tech Humor Internet Exlporer Computer Fan Sync Black Market Benefits Hosted Computing Computer Accessories Files Cryptocurrency Smartwatch Tip of the week eWaste Television Data loss Millennials Computing Infrastructure Data storage Leadership Social Cache Scalability Hybrid Cloud Remote Worker Downtime Search Engine webinar Evernote Vendor Management The Internet of Things Multi-Factor Security HIPAA Credit Cards Inventory Bluetooth Safe Mode Employee Windows 10s Windows Server 2008 WiFi Criminal Wireless Emergency Public Computer Wireless Internet Warranty Screen Mirroring Workforce HVAC Vendor HBO Password Manager Troubleshooting Apple Loyalty Wiring Root Cause Analysis Thank You Congratulations Company Culture Webinar Twitter Compliance Managing Stress CrashOverride Regulation Net Neutrality Printers ISP

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JordaBale Tip of the Week: 10 Technology Practices To Improve Business As Usual
11 February 2019
Just to make your business more progressive you have to follow some techniques and tips. In this reg...
Gabrielle Kolios Microsoft Moves to Get a Piece of the Technology as a Service Market Share
08 February 2019
The company of the Microsoft has been really now understood the technology which have to be supposed...
AngusCousens Tip of the Week: How To Enable Flash In Google Chrome
06 February 2019
Google is another popular makeup brand. Ladies can get products for eye makeup also. They can use ht...
Cannedguds These 3 Industries are Being Fundamentally Changed by Smart Technology
29 January 2019
While I support the idea of automated or driverless cars in theory, at the moment they just simply m...
Joan Cameron Tip of the Week: 4 Tools that Provide Your Employees With Greater Flexibility
21 January 2019
These are very helpful tools with we can get rid from lots of unwanted efforts of work. Best essay w...