Politics

How long will a hacker take one of your passwords in 2025?

ADVERTISING

Eight characters formed by numbers can instantly decipher, according to the Hive Systems Computer company, last year had 37 seconds. Every year, The company publishes its passwordshowing the time needed to hack a password Using the best hardware available for the consumer.

Hive performed with encrypted passwords with the method used on most websites. In this case, it was BCrypt, the most common, according to previous violation data. But this encryption is not infallible and can be deciphered using the Brute force method.

Generally, The longer the passwords, the more it takes to decipher them: The most complex, of eight characters, would take 164 years. On the other hand, six characters or not can be deciphered in two weeks.

It should be noted that Passwords demonstrated by the HIVE systems are also randomly generated. If a password has been previously stolen, use the words of the dictionary or has been reused among the websites, the time needed to decipher it decrease drastically, As shown below, the control is instantaneous.

New security measures are increasingly necessary

If you want to check the strength of your passwords, the website How sure is my password? (How sure is my password?), As the name suggests, You can tell you if you need to change it.

Although the longest passwords offer greater protection, their management can be a challenge, therefore password managers who archive and protect the access credentials safely are a very popular solution.

Moreover, A password manager favors the use of a univocal session and complexes that limit exposure to security in case of data violation. Even if the password is weak, websites usually have safety functions to avoid gross strength, like the limitation of the number of attempts. The portals that lead to sensitive information usually also use a further level of security, such as two authentication factors, to avoid fraud.

Even if before passwords change, now Experts insist on creating strong and unique passwords and keeping them unless they are compromised. This approach is considered more effective than frequent changes, which can lead to the weakest passwords and to the reuse of the similar ones.

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button