Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Superhero Passwords Pose Serious Risk to Personal, Enterprise Accounts

Superheroes may be able to save everyone in a fantasy world, but they can’t keep online accounts secure in the digital era, Mozilla warns.

With hundreds of thousands of occurrences in breach datasets, superhero passwords aren’t a strong account protection method, even when the real identities of superheroes are used instead.

Superheroes may be able to save everyone in a fantasy world, but they can’t keep online accounts secure in the digital era, Mozilla warns.

With hundreds of thousands of occurrences in breach datasets, superhero passwords aren’t a strong account protection method, even when the real identities of superheroes are used instead.

Data from breach notification website haveibeenpwned.com reveals that thousands of users choose to protect their online accounts with superhero names, thus weakening their protection.

With more than 328,000 occurrences in breach datasets, Superman is the most commonly used superhero password, followed by Batman (more than 226,000 occurrences) and Spider-Man (slightly over 160,000 occurrences).

Wolverine, Ironman, Wonder Woman, and Daredevil are also popular, emerging tens of thousands of times in datasets.

The real identities of superheroes are also poor choices for passwords. James Howlett/Logan was seen more than 30,000 times in datasets and Clark Kent, Bruce Wayne, Peter Parker and Tony Stark had thousands of occurrences each as well.

If such passwords are used within enterprise environments, they could expose the entire organization to attacks. In fact, even the compromise of a personal account may lead to the gathering of information that, when leveraged in phishing, could help a malicious actor breach an organization.

With the Cybersecurity Awareness month underway, Mozilla decided to raise awareness on the importance of using strong passwords to secure online accounts, and added a password manager in Firefox for Android.

Advertisement. Scroll to continue reading.

“Passwords are one of the easily compromised components within a company. To mitigate risk, enterprises should either establish a tight password policy or switch to a passwordless model. The latter will be far more efficient,” Mohit Tiwari, co-founder and CEO at Data Store and Object Security (DSOS) provider Symmetry Systems, said.

To ensure additional protection, users should enable two-factor authentication to all accounts that support the feature, and should also use monitoring services that alert them when their accounts appear in data breaches. Using an encrypted connection, such as a Virtual Private Network (VPN), also improves security.

“Users have failed to maintain proper passwords for decades. That will never change. Therefore, innovation must build an easy to use alternative that provides appropriate security with a better user experience. Enterprises have to find the right balance of technology innovation alongside security for traditional models,” Tyler Shields, CMO at cyber asset management and governance solutions provider JupiterOne, told SecurityWeek.

“Passwords are the most misused line of defense in cyber security today. Words are only better than randomized passwords because they can be easily remembered, instead of being written down. In trade off, the password itself is simplified and easier to guess. My recommendation would be to eliminate passwords completely. However, if you must use a password, make sure to use a password manager and incorporate very complex, difficult to guess, randomly generated passwords via those tools,” Shields continued.

Related: IBM: Average Cost of Data Breach Exceeds $4.2 Million

Related: Controversial Web Host Epik Confirms Customer Data Exposed in Breach

Related: Regular Users Can Now Remove Password From Their Microsoft Account

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.