Many websites have a set of questions to give access to your account if you forgot the passwords etc. But often these questions are poorly thought ...
So many silly passwords

Many websites have a set of questions to give access to your account if you forgot the passwords etc. But often these questions are poorly thought ...


Question#1:

The full question: Many websites have a set of questions to give access to your account if you forgot the passwords etc. But often these questions are poorly thought and often have a ??few possible answers (like city of birth - where its likely to be one of the top populated cities) . List some of these common poor choices for verification and suggest some better ones?

?? ChatGTP:

You're absolutely right—many security questions are poorly designed and can be easily guessed, socially engineered, or even found through public records. Here’s a breakdown of some bad security questions and better alternatives:

Common Weak Security Questions (Bad Choices)

  1. What is your mother's maiden name?
  2. What city were you born in?
  3. What was your first pet's name?
  4. What is your favorite color?
  5. What is your father's middle name?
  6. What is your favorite movie?
  7. What is your first car?
  8. Who was your childhood best friend?
  9. What was the name of your elementary school?
  10. What is your favorite food?

  • Guessable from social media posts or cultural background.


Better Security Questions (Stronger Choices)

A good security question should have: ? High Variability – Many possible answers. ? Memorable for You, Hard for Others – You won't forget, but others can't guess. ? Not Publicly Available – Not easily found online.

  1. What was the name of your first imaginary friend?
  2. What was the first concert you attended?
  3. What is the name of the first person you kissed?
  4. What is the first dish you learned to cook?
  5. What was the model of your childhood bicycle?
  6. What is the most unusual place you’ve visited?
  7. What was the first book you ever bought?
  8. What was your childhood phone number? (Just last 4 digits)
  9. What is the middle name of your oldest cousin?
  10. What was your childhood stuffed animal’s name?

  • Personal and unlikely to be in records.


Alternative Approaches

  • Use Passphrases Instead: Instead of answering truthfully, treat security questions like passwords (e.g., Q: What was your first pet’s name? A: BlueSky42!)
  • Two-Factor Authentication (2FA): The best security measure is using 2FA with apps like Authy or Google Authenticator.
  • Password Managers: Store fake answers to security questions in a password manager to prevent social engineering attacks.

Would you like a list of randomly generated strong security question ideas? ??

Here are randomly generated strong security question ideas that meet good security criteria:

Personal & Memorable but Hard to Guess

  1. What is the title of a book you’ve never finished but wanted to?
  2. What was the name of the first teacher you disliked?
  3. What is a word you mispronounced as a child?
  4. What is the most embarrassing song you liked as a kid?
  5. What is the first thing you remember drawing as a child?
  6. What was your favorite hiding spot as a kid?
  7. What is a weird phrase only your family used?
  8. What was the first meal you ever burned while cooking?
  9. What was your childhood imaginary profession (e.g., astronaut, ninja, wizard)?
  10. What was the first major news event you remember witnessing?

Highly Unique but Still Memorable

  1. What is the last five-digit number you ever wrote on a piece of paper?
  2. What was your first self-invented nickname?
  3. What object did you always carry in your pocket as a kid?
  4. What’s the first airport you ever traveled through?
  5. What was the first non-English word you learned?
  6. What was the first number you memorized that wasn't a phone number?
  7. What’s the first fictional character you wanted to be?
  8. What’s the first website you remember visiting regularly?
  9. What is the strangest gift you’ve ever received?
  10. What is a personal slang word or phrase you invented?

Super Specific & Difficult to Guess

  1. What was the color of the first house/apartment you lived in?
  2. What is a location only you and a few others know about?
  3. What’s a unique combination of three random words that mean something to you?
  4. What’s the first email address you remember using?
  5. What’s the first password you ever created (do not use it now)?
  6. What was the name of your childhood neighborhood (but not the city)?
  7. What’s the name of a song you associate with a very specific memory?
  8. What object did you always keep under your bed as a child?
  9. What’s the first online username you ever used?
  10. What’s the name of a place that no longer exists but you used to visit?


Tips for Using These Safely

  • Fake Answers: You can intentionally make up answers to these and store them in a password manager.
  • Custom Security Questions: Some websites allow you to enter your own security questions—use one from this list! <<nice: ??>>
  • Avoid Over-Sharing: Don't pick answers that someone can find from your social media history.


Question#2: Any known cases where these easy questions led to fraud? ??????

Yes, weak security questions have been exploited in several high-profile cases of fraud, account takeovers, and breaches. Here are some notable ones:

<<Note: many fraudsters or hackers below used multiple techniques...>>


1. Sarah Palin’s Yahoo Email Hack (2008)

?? What Happened?

  • A hacker accessed Sarah Palin’s personal Yahoo email account during the 2008 U.S. presidential campaign.
  • The hacker, David Kernell, used Yahoo’s password recovery system, which relied on weak security questions.

?? Weak Security Question Used:

  • “Where did you meet your spouse?”
  • Answer: Easily found through publicly available information.

?? Impact:

  • Emails were leaked, causing embarrassment and political damage.
  • The hacker was convicted and sentenced to prison.


2. Mat Honan’s Apple iCloud Hack (2012)

?? What Happened?

  • Tech journalist Mat Honan’s entire digital life was erased in minutes when hackers gained access to his Apple iCloud account.
  • The hackers social-engineered Apple support using personal details to bypass security questions.
  • They used this access to remotely wipe his iPhone, iPad, and MacBook.

?? Weak Security Flaws Exploited:

  • Apple’s verification relied on easy-to-find security answers like billing address and the last four digits of a credit card.
  • Hackers found this information via Amazon's weak verification system, which also exposed partial credit card numbers.

?? Impact:

  • Lost years of personal photos, data, and emails.
  • Forced Apple and Amazon to revamp their security policies.


3. Paris Hilton’s Phone Hack (2005)

?? What Happened?

  • Hackers accessed Paris Hilton’s T-Mobile Sidekick account and leaked her personal contacts and photos.

?? Weak Security Question Used:

  • “What is the name of your pet?”
  • Answer: Her pet’s name was well-known publicly.

?? Impact:

  • Her celebrity contacts (phone numbers, emails, messages) were leaked online.
  • Exposed the vulnerability of carrier security questions.


4. Celebrities' iCloud Leaks ("The Fappening") (2014)

?? What Happened?

  • Hackers gained access to iCloud accounts of multiple celebrities and stole private photos.
  • Attackers used a combination of brute-force attacks and social engineering to reset passwords.

?? Weak Security Questions Exploited:

  • “What is your mother’s maiden name?”
  • “What is the name of your first pet?”
  • Answers were found in interviews, Wikipedia, and social media posts.

?? Impact:

  • Massive privacy violation for victims.
  • Apple strengthened iCloud security with two-factor authentication (2FA).


5. MySpace Account Takeovers (2006-2009)

?? What Happened?

  • Hackers used common security questions to reset passwords on MySpace accounts.
  • They targeted high-profile or well-followed users, including musicians, influencers, and early internet celebrities.

?? Weak Security Questions Exploited:

  • “What is your favorite food?”
  • “What is your first pet’s name?”
  • Attackers guessed these easily or found them in blog posts and public MySpace pages.

?? Impact:

  • Accounts were hijacked and used to spread spam, scams, or personal data leaks.
  • MySpace later deprecated security questions in favor of email-based recovery.


Key Takeaways

? Public Information is Dangerous:

  • If your security answer can be found on social media, interviews, Wikipedia, or genealogy websites, it’s a bad security question.

? Celebrity or Not, You're at Risk:

  • If someone knows enough about you (or can Google you), they can bypass weak security questions.

? Use 2FA Whenever Possible:

  • Most of these attacks could have been prevented with two-factor authentication (2FA).

? Fake Your Answers (or Use a Password Manager):

  • Instead of real answers, use random words or passphrases stored in a password manager (e.g., Q: First car? A: BlueMonkey42!).

Would you like more real-world examples or security best practices? ???? - yes


More Real-World Cases of Security Question Exploits & Best Practices

Here are additional high-profile cases where weak security questions played a role in account takeovers and fraud:


6. Reddit Moderator Account Takeovers (2023)

?? What Happened?

  • Attackers hacked into multiple high-profile Reddit moderator accounts.
  • They used password resets that relied on security questions and social engineering Reddit's support team.

?? Weak Security Question Exploited:

  • “What is the name of your first school?”
  • Attackers used OSINT (Open-Source Intelligence) methods to find this on LinkedIn, old Facebook posts, or even yearbooks.

?? Impact:

  • Subreddits were hijacked and used to spread scam content.
  • Led to increased awareness about using 2FA for moderators.


7. 2016 U.S. Presidential Election: John Podesta’s Email Hack

?? What Happened?

  • John Podesta, Hillary Clinton’s campaign chairman, had his Gmail hacked.
  • Hackers reset his password using security questions and a phishing email.

?? Weak Security Question Exploited:

  • “What was your first car?”
  • Attackers guessed or found it in public records.

?? Impact:

  • Thousands of campaign emails were leaked via WikiLeaks.
  • Raised concerns about cybersecurity in political campaigns.


8. 2018 Instagram & Twitter Celebrity Account Hijackings

?? What Happened?

  • Hackers bypassed account security for influencers and celebrities.
  • Some attacks were done via password reset questions on Twitter & Instagram.

?? Weak Security Questions Exploited:

  • “What is your mother’s maiden name?”
  • “What city were you born in?”
  • Both answers were easily found on Wikipedia or genealogy sites.

?? Impact:

  • Hackers sold hijacked social media handles for thousands of dollars on the dark web.
  • Led platforms to enforce stronger 2FA and verification.


Best Practices for Security Questions & Account Protection

?? What NOT to Do

?? Use real, publicly available answers.

  • Example: Mother’s maiden name, birthplace, or pet’s name (all easily found online).

?? Choose answers that could change over time.

  • Example: Favorite movie or song (you might change your mind later!)

?? Use common or predictable answers.

  • Example: Favorite color (limited options, easy to guess).


? What TO Do (Better Security Practices)

?? Use Fake, Unpredictable Answers

  • Instead of real answers, create a random phrase or unrelated word. Example: Q: First pet's name? A: PurpleBanana47
  • Store these in a password manager like Bitwarden, 1Password, or LastPass.

?? Use Two-Factor Authentication (2FA) Everywhere

  • Apps like Google Authenticator, Authy, or physical security keys protect against security question hacks.
  • Avoid SMS-based 2FA, as SIM-swapping attacks can bypass it.

?? Enable Account Recovery Email & Backup Codes

  • If a service allows email recovery instead of security questions, use that.
  • Save backup codes for accounts in a secure place.

?? If Possible, Choose Custom Security Questions

  • Some sites let you set your own question. Pick one only you can answer, such as: “What was your childhood dream job that never happened?” “What is a word you invented as a kid?”

?? Avoid Answering Security Questions Honestly on Social Media

  • Hackers love viral “answer these fun questions” trends because they collect answers to common security questions.
  • Example: ?? “What was your first car? Drop a picture below!” (Now an attacker has this info.)


Final Takeaway: Security Questions Are Weak – Use 2FA??

Security questions were never meant to be strong authentication—they were designed for convenience.

  • They are often a weak point in security, easily guessed or researched.
  • Whenever possible, disable security questions and use two-factor authentication instead.

Would you like recommendations on best password managers or a guide to setting up better security for your accounts? ???? yes


Ultimate Guide to Securing Your Accounts (Best Practices & Tools) ????

With security questions being a weak link, here’s a comprehensive guide on how to properly secure your accounts using password managers, 2FA, and other best practices.


1?? Use a Password Manager (No Reusing Passwords!)

A password manager helps you store and generate strong, unique passwords for every site.

?? Why use one?

? Prevents password reuse (which is how many hacks happen).

? Creates ultra-strong, random passwords (e.g., X@98gG1*#p!).

? Autofills passwords for convenience.

?? Best Password Managers (2024 Recommendations):

Password Manager Key Features Free Plan? Bitwarden Open-source, secure, best free plan

? Yes 1Password Best UI, travel mode (hides passwords temporarily)

? No Dashlane Dark web monitoring, VPN included

? Yes (limited) NordPass Easy to use, encrypted cloud storage

? Yes KeePassXC Offline storage (local only)

?? Best Practices for Password Managers:

? Enable a strong master password (Use a passphrase like GreenUnicorn$Banana!98).

? Use 2FA on your password manager! (More on this below).

? Don’t store your master password in your email.


2?? Set Up Two-Factor Authentication (2FA) Everywhere

Two-factor authentication (2FA) adds an extra layer of security by requiring a second step beyond your password.

?? Best 2FA Methods (Ranked from Best to Worst):

2FA Method Security Level Recommended?

Hardware Security Key (e.g., YubiKey, Titan Key) ?????????? (Best)

? Yes Authenticator Apps (Google Authenticator, Authy, Aegis) ????????

? Yes SMS 2FA (Text Messages) ???? (Weak, vulnerable to SIM swapping) ?? Only if no other option Email 2FA ?? (Weak, emails can be hacked)

? Avoid

?? Best Authenticator Apps:

? Authy – Best for multi-device backups.

? Aegis – Best open-source option for Android. ? Google Authenticator – Simple, but lacks cloud backup.

? Enable 2FA on important accounts:

  • Google, Apple, Microsoft, Facebook, Instagram, Twitter, PayPal, Crypto Exchanges, Banking Accounts.


3?? Lock Down Your Email (Most Important!)

?? Your email is the key to everything. If hacked, an attacker can reset all your passwords!

?? Email Security Checklist:

? Use a strong, unique password (stored in a password manager).

? Enable 2FA on email (preferably with an authenticator app, NOT SMS).

? Disable security questions if possible (or set fake answers).

? Check for old, unused email recovery options (remove old numbers/emails).

? Use a private, separate email for banking & sensitive logins (not shared on social media).

?? Bonus: Use alias emails with services like ProtonMail, SimpleLogin, or Apple’s “Hide My Email” for extra security.


4?? Avoid Phishing & Social Engineering Attacks

Even with strong passwords and 2FA, attackers might try to trick you into giving up access.

?? How to Spot Phishing Emails & Messages:

? “Your account has been locked! Click here to reset your password.”

? “Unusual activity detected, log in here to verify.”

? “Congratulations! You won a free iPhone, claim now.”

? Always check the sender's email address (legit companies won’t send from [email protected]).

? Don’t click suspicious links—manually go to the website instead.

? Use browser extensions like uBlock Origin & Bitdefender TrafficLight to block fake sites.


5?? Protect Yourself from SIM Swapping Attacks (Phone Hacks)

?? Hackers can take over your phone number and bypass SMS 2FA!

?? How to Prevent SIM Swap Attacks:

? NEVER use SMS for 2FA if avoidable (use an authenticator app or security key instead). ? Set up a PIN with your mobile carrier (prevents attackers from porting your number).

? Use a Google Voice number for account recovery instead of your real number.

? Watch for signs of a SIM swap attack (your phone suddenly loses service for no reason).


6?? Secure Your Crypto & Financial Accounts

?? Crypto and bank accounts are prime targets for hackers.

?? For Crypto Security:

? Use a hardware wallet (Ledger, Trezor) for large holdings.

? Use a dedicated email for crypto exchange accounts.

? Enable withdrawal whitelisting (so funds can only be sent to approved addresses).

?? For Banking Security:

? Enable 2FA (preferably via an authenticator app, not SMS).

? Use a separate, private email for banking.

? Disable overdraft protection to prevent unauthorized charges.


7?? Monitor for Data Breaches & Leaks

?? Check if your passwords have been leaked:

? Have I Been Pwned (Check if your email/password is in a data breach).

? Use Bitwarden/Dashlane’s breach monitoring feature to track compromised logins.

?? Set Up Breach Alerts:

? Google Security Checkup (Google Account > Security).

? Enable alerts for unusual login attempts on email & banking apps.


TL;DR – Summary of Your Action Plan

? Use a password manager (Bitwarden, 1Password, Dashlane).

? Enable 2FA with an authenticator app (Authy, Google Authenticator).

? Use a hardware security key (YubiKey for extra protection).

? Secure your email first (2FA, strong password, private recovery options).

? Avoid SMS-based 2FA (prevent SIM swapping).

? Watch out for phishing & social engineering scams.

? Check if your data is leaked on HaveIBeenPwned.


Question#3: List the 100 most used passwords

Here are the 100 most commonly used passwords, based on data breaches and security reports:


?? The Worst & Most Commonly Used Passwords (Do NOT Use These!) ??

Top 25 Most Used Passwords

  1. 123456
  2. password
  3. 123456789
  4. 12345
  5. 12345678
  6. qwerty
  7. 1234567
  8. 111111
  9. 123123
  10. abc123
  11. 1234
  12. password1
  13. 1234567890
  14. 123321
  15. qwerty123
  16. 654321
  17. 666666
  18. 1q2w3e4r
  19. sunshine
  20. admin
  21. letmein
  22. welcome
  23. football
  24. monkey
  25. iloveyou


More Commonly Used Passwords (26-50)

  1. dragon
  2. 1qaz2wsx <<keyb sequence>>
  3. master
  4. princess
  5. qwertyuiop
  6. 987654321 <<imagination>>
  7. 123qwe
  8. qazwsx
  9. baseball <<fan>>
  10. shadow
  11. superman <<comic reader>>
  12. trustno1
  13. hunter
  14. ashley
  15. michael
  16. jesus
  17. ninja
  18. chocolate <<hummm>>
  19. mustang
  20. password123 <<wow>>
  21. batman <<comic reader>>
  22. charlie
  23. hockey
  24. thomas
  25. james


Still Bad, But Used Often (51-75)

  1. jessica <<names>>
  2. daniel
  3. asdfgh
  4. buster
  5. soccer <<fans>>
  6. harley
  7. killer
  8. william
  9. 696969 <<sexy>>
  10. jennifer
  11. 1q2w3e
  12. nothing
  13. welcome1
  14. tigger
  15. computer
  16. michelle
  17. 121212
  18. joshua
  19. george
  20. fuckyou <<must be from CA or NY?>>
  21. cheese <<hungry>>
  22. summer <<must be from CA>>
  23. secret <<awesome>>
  24. banana <<hungry>>
  25. qazxsw


Still Common, Still Weak (76-100)

  1. ginger
  2. pokemon
  3. cookie <<hungry>>
  4. matrix
  5. blink182
  6. harrypotter <<oh magic>>
  7. starwars
  8. 987654
  9. freedom
  10. 112233 <<lazy>>
  11. internet <<creative>>
  12. apple <<what pc he has?>>
  13. monkey123
  14. mustang1
  15. diamond
  16. 7777777 <<lazy>>
  17. access
  18. abcd1234
  19. jupiter
  20. a123456
  21. fluffy
  22. taylor
  23. pepper
  24. sunshine123
  25. qwerty1


?? Why These Passwords Are Bad

  1. Easily Guessable – Hackers try these first in brute-force attacks.
  2. Too Short – Many are under 8 characters, making them easy to crack.
  3. In Many Data Breaches – These passwords have already been leaked online.


? How to Create a Strong Password

?? Use at least 12-16 characters (longer is better).

?? Include a mix of uppercase, lowercase, numbers, and symbols (e.g., Z$9n1@h4F*).

?? Avoid using real words or personal info (like names or birthdays).

?? Use a passphrase (e.g., PurpleElephant$Hiking!82). <<good>>

?? Use a Password Manager (Bitwarden, 1Password, Dashlane) to generate and store passwords securely.


?? Want to Check if Your Password Has Been Leaked?

?? Go to Have I Been Pwned and enter your password (securely hashed) to see if it has been exposed in data breaches.



要查看或添加评论,请登录

Raul E Garcia的更多文章

社区洞察

其他会员也浏览了