{"id":10996,"date":"2026-01-21T05:55:19","date_gmt":"2026-01-21T05:55:19","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=10996"},"modified":"2026-01-21T05:55:19","modified_gmt":"2026-01-21T05:55:19","slug":"2025s-most-typical-passwords-have-been-as-predictable-as-ever","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=10996","title":{"rendered":"2025\u2019s most typical passwords have been as predictable as ever"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">As soon as once more, information exhibits an uncomfortable fact: the behavior of selecting eminently hackable passwords is alive and nicely<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/christian-ali-bravo\/\" title=\"Christian Ali Bravo\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2023\/2023-8\/christian-ali-bravo.jpeg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2023\/2023-8\/christian-ali-bravo.jpeg\" alt=\"Christian Ali Bravo\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>20 Jan 2026<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>3 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2025\/12-25\/passwords-2025\/contrasena-mas-usadas-2025.jpg\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2025\/12-25\/passwords-2025\/contrasena-mas-usadas-2025.jpg\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2025\/12-25\/passwords-2025\/contrasena-mas-usadas-2025.jpg\" alt=\"Old habits die hard: 2025\u2019s most common passwords were as predictable as ever\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>\u2018123456\u2019 continues to reign supreme as probably the most commonly-used password amongst individuals internationally, based on two experiences, from <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" target=\"_blank\" rel=\"noopener\">NordPass<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.comparitech.com\/news\/minecraft-qwerty-and-india123-among-2025s-most-common-passwords-report\/\" target=\"_blank\" rel=\"noopener\">Comparitech<\/a>, respectively. A full 25 p.c of the highest 1,000 most-used passwords are made up of nothing however numerals.<\/p>\n<p>As well as, \u2018123456\u2019 appealed to individuals of assorted age cohorts, because it was the most-favored choice amongst millennials, Era X and child boomers alike, and the second most-popular choice amongst Era Z and the Silent Era (after \u201812345\u2019). That is based on NordPass\u2019 evaluation, which relies on billions of leaked passwords and sheds mild on password developments amongst individuals in 44 nations. \u00a0<\/p>\n<p>One other all-too-predictable alternative, \u2018admin\u2019, trailed shut behind, with \u201812345678\u2019, \u2018123456789\u2019 and \u201812345\u2019 coming subsequent, as many individuals clearly proceed to favor comfort, placing their private information, cash and probably reputations in danger.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"The top 10 most common passwords among people in 44 countries (source: NordPass)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/01-26\/most-common-passwords-2025.png\" alt=\"most-common-passwords-2025\" width=\"\" height=\"\"\/><figcaption>The highest 10 most typical passwords amongst individuals in 44 nations (supply: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" target=\"_blank\" rel=\"noopener\">NordPass<\/a>)<\/figcaption><\/figure>\n<p>Within the US and the UK, the general image was simply as grim, with \u2018admin\u2019 taking the highest spot in each nations. Within the US, the one and solely \u2018password\u2019 and \u2018123456\u2019 took the second and third spots, respectively; within the UK, the 2 simply swapped locations.<\/p>\n<p>A lot the identical image is painted by Comparitech\u2019s analysis into two billion actual account passwords leaked on information breach boards in 2025, because it had \u2018123456\u2019, \u201812345678\u2019 and \u2018123456789\u2019 atop its record.<\/p>\n<h2>Standard, standard<\/h2>\n<p>Utilizing an easily-guessable password is tantamount to locking the entrance door of your own home with a paper latch. It presents no precise resistance, and attackers can use brute-force or <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/credential-stuffing-what-it-is-how-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">credential stuffing<\/a> methods that permit them to make fast work of such weak or reused passwords at scale.<\/p>\n<p>It goes with out saying, subsequently, that in case your password made it amongst these most typical password decisions, you&#8217;ll be very nicely suggested to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/how-often-should-change-passwords\/\" target=\"_blank\" rel=\"noopener\">change it instantly<\/a>. Use a robust and distinctive password or passphrase for every account and ideally, retailer them in a good password supervisor.<\/p>\n<p><iframe class=\"embed-video\" title=\"\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/q5DYkzOrz_I\"><\/iframe><\/p>\n<p>Regardless of how cussed, nevertheless, a password continues to be solely a single barrier between your account and a hacker. That\u2019s why two-factor authentication (2FA) as an additional layer of safety is a non-negotiable line of protection lately, significantly for accounts that comprise Personally Identifiable Info (PII) or different necessary information.<\/p>\n<p>The dangers rise sharply in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/05\/04\/creating-strong-user-friendly-passwords-tips-business-password-policy\/\" target=\"_blank\" rel=\"noopener\">company environments<\/a>. Weak, apparent, or reused passwords can expose not solely particular person workers, however <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/cybercriminals-hacking-systems-logging-in\/\" target=\"_blank\" rel=\"noopener\">whole organizations<\/a>, their prospects, and their companions. Certainly, in lots of instances, the preliminary level of entry is neither refined nor novel; as an alternative, it\u2019s merely a password that ought to by no means have been trusted within the first place. The implications, in the meantime, are hardly ever trivial and span monetary loss, operational disruption, regulatory scrutiny, and long-term reputational harm. Which is why firms want a mix of technical safeguards and ongoing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/making-it-stick-get-most-cybersecurity-training\/\" target=\"_blank\" rel=\"noopener\">safety consciousness coaching packages<\/a> for workers.<\/p>\n<p>In the meantime, the technical boundaries for ne\u2019er-do-wells have by no means been decrease. Fashionable instruments can take a look at numerous mixtures of login credentials in minutes, so the chances are firmly stacked within the attacker\u2019s favor. Plus, within the digital ecosystem constructed on interconnected companies and shared identities, the harm stemming from one account takeover is unlikely to remain contained for lengthy.<\/p>\n<p>Additionally, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/06\/20\/passwords-out-passkeys-in-ready-make-switch\/\" target=\"_blank\" rel=\"noopener\">passkeys<\/a> are quickly turning into commonplace, and lots of main platforms, together with Apple, Google, and Amazon, now provide them as a major login technique.<\/p>\n<p>You might need had many New 12 months\u2019s resolutions heading into 2026. But when your individual passwords seem on both record above, bettering your account safety ought to be some of the necessary of them.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>As soon as once more, information exhibits an uncomfortable fact: the behavior of selecting eminently hackable passwords is alive and nicely 20 Jan 2026 \u00a0\u2022\u00a0 , 3 min. learn \u2018123456\u2019 continues to reign supreme as probably the most commonly-used password amongst individuals internationally, based on two experiences, from NordPass and Comparitech, respectively. A full 25 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10998,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4532,1704,3870,7492],"class_list":["post-10996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-2025s","tag-common","tag-passwords","tag-predictable"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10996"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10996\/revisions"}],"predecessor-version":[{"id":10997,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10996\/revisions\/10997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/10998"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 17:48:39 UTC -->