Revealed: The 10 most popular and worst passwords of 2024

A recent report from NordPass, in collaboration with NordStellar, reveals that weak passwords continue to be widely used despite the known risks. Analyzing a vast 2.5TB database of global passwords, many sourced from the dark web, the report identifies '123456' as the most popular password for the sixth consecutive year. This trend is alarming both in personal and business contexts, with corporate accounts showing similar patterns of negligence. Such weak passwords can be easily cracked in less than a second, leading to potential account compromises and identity thefts.
The findings underscore the urgent need for enhanced digital security practices. NordPass recommends users adopt longer, more complex passwords and utilize password managers to generate unique credentials for different accounts. The report also highlights the growing adoption of passkeys, which leverage biometric authentication for more secure access. As digital threats continue to evolve, prioritizing stronger password practices is crucial to safeguarding personal and professional data against cyber threats.
RATING
The article effectively raises awareness about the common issue of weak passwords and provides practical advice on improving digital security. Its strengths lie in its clear communication and engaging tone, which makes it accessible to a wide audience. However, the article could benefit from more balanced perspectives, greater transparency regarding its sources, and clearer attribution to enhance its credibility. While it highlights an important digital security issue, the lack of detailed source information and context slightly undermines its authority. Overall, it serves as a useful guide for readers seeking to improve their online security practices, but it could be strengthened with more rigorous sourcing and balanced viewpoints.
RATING DETAILS
The article accurately highlights the issue of weak passwords, referencing a report from NordPass. It states that '123456' remains the most common password, supported by NordPass’s released data. However, while the article is generally truthful, it lacks specific citations or links to the original NordPass report, which would enhance verifiability. Claims about the number of users using weak passwords ('over 3 million people') are not directly backed by data within the article. Including precise figures and direct quotes from the report would improve factual accuracy. Additionally, while it mentions collaboration with NordStellar, more context on this partnership would bolster credibility.
The article predominantly presents one viewpoint: the need for stronger passwords and cybersecurity practices. While this is a valid perspective, it lacks a balanced discussion of alternative views or potential challenges in implementing better password practices. For example, it doesn’t explore why people might continue to use weak passwords despite known risks or discuss potential drawbacks of password managers. Including perspectives from cybersecurity experts or user experiences could provide a more nuanced view. The article’s tone is somewhat alarmist, focusing on the dangers without equally addressing practical solutions or acknowledging progress in cybersecurity awareness.
The article is well-written and engaging, using a conversational tone that makes complex cybersecurity issues accessible to a general audience. The structure is logical, starting with the problem of weak passwords and progressing to solutions. The use of subheadings and bullet points, like 'Top 10 most common passwords,' aids readability and comprehension. However, some sections, such as the promotional inserts for newsletters and social media, interrupt the flow and could be more seamlessly integrated. While the article warns against weak passwords effectively, it could benefit from clearer distinctions between factual reporting and opinion, especially in segments that employ emotive language.
The article references NordPass and its collaboration with NordStellar, which are reputable entities in cybersecurity. However, it lacks direct citations or links to the original study or data, which weakens the ability to verify the claims independently. The absence of detailed source information or expert commentary limits the depth and credibility of the article. Including direct quotes from experts or linking to the report would strengthen the quality of sources. The reliance on unnamed sources like 'a massive 2.5TB database of global passwords' without further context raises questions about data collection and privacy considerations.
The article lacks transparency in terms of disclosing the methodology behind the data collection and analysis by NordPass and NordStellar. There is no information about how the passwords were sourced or the criteria used for the analysis. Additionally, the article does not disclose any potential conflicts of interest, such as affiliations with NordPass or NordStellar. Providing more information on the basis for claims and any affiliations would enhance transparency. The promotional elements, such as encouraging readers to subscribe to a newsletter, could be seen as detracting from editorial objectivity without clear separation.
YOU MAY BE INTERESTED IN

Is your VPN enough without antivirus protection?
Score 6.8
The best password manager for 2025
Score 6.8
Hackers find a way around built-in Windows protections
Score 6.8
GenAI, the future of fraud and why you may be an easy target
Score 6.4