Many websites have a set of questions to give access to your account if you forgot the passwords etc. But often these questions are poorly thought ...
Raul E Garcia
Applied Mathematician & Software Engineer, ??Fraud Detection & Benford's Law Expert, Custom Excel apps for Fraud detection, SQL, C#, MVC, SSIS, Azure, Excel VBA, Data Science, Selenium, Matlab, Math studies UCSD UPRM UPR
Question#1:
The full question: Many websites have a set of questions to give access to your account if you forgot the passwords etc. But often these questions are poorly thought and often have a ??few possible answers (like city of birth - where its likely to be one of the top populated cities) . List some of these common poor choices for verification and suggest some better ones?
?? ChatGTP:
You're absolutely right—many security questions are poorly designed and can be easily guessed, socially engineered, or even found through public records. Here’s a breakdown of some bad security questions and better alternatives:
Common Weak Security Questions (Bad Choices)
Better Security Questions (Stronger Choices)
A good security question should have: ? High Variability – Many possible answers. ? Memorable for You, Hard for Others – You won't forget, but others can't guess. ? Not Publicly Available – Not easily found online.
Alternative Approaches
Would you like a list of randomly generated strong security question ideas? ??
Here are randomly generated strong security question ideas that meet good security criteria:
Personal & Memorable but Hard to Guess
Highly Unique but Still Memorable
Super Specific & Difficult to Guess
Tips for Using These Safely
Question#2: Any known cases where these easy questions led to fraud? ??????
Yes, weak security questions have been exploited in several high-profile cases of fraud, account takeovers, and breaches. Here are some notable ones:
<<Note: many fraudsters or hackers below used multiple techniques...>>
1. Sarah Palin’s Yahoo Email Hack (2008)
?? What Happened?
?? Weak Security Question Used:
?? Impact:
2. Mat Honan’s Apple iCloud Hack (2012)
?? What Happened?
?? Weak Security Flaws Exploited:
?? Impact:
3. Paris Hilton’s Phone Hack (2005)
?? What Happened?
?? Weak Security Question Used:
?? Impact:
4. Celebrities' iCloud Leaks ("The Fappening") (2014)
?? What Happened?
?? Weak Security Questions Exploited:
?? Impact:
5. MySpace Account Takeovers (2006-2009)
?? What Happened?
?? Weak Security Questions Exploited:
?? Impact:
Key Takeaways
? Public Information is Dangerous:
? Celebrity or Not, You're at Risk:
? Use 2FA Whenever Possible:
? Fake Your Answers (or Use a Password Manager):
Would you like more real-world examples or security best practices? ???? - yes
More Real-World Cases of Security Question Exploits & Best Practices
Here are additional high-profile cases where weak security questions played a role in account takeovers and fraud:
6. Reddit Moderator Account Takeovers (2023)
?? What Happened?
?? Weak Security Question Exploited:
?? Impact:
7. 2016 U.S. Presidential Election: John Podesta’s Email Hack
?? What Happened?
?? Weak Security Question Exploited:
?? Impact:
8. 2018 Instagram & Twitter Celebrity Account Hijackings
?? What Happened?
?? Weak Security Questions Exploited:
?? Impact:
Best Practices for Security Questions & Account Protection
?? What NOT to Do
?? Use real, publicly available answers.
?? Choose answers that could change over time.
?? Use common or predictable answers.
? What TO Do (Better Security Practices)
?? Use Fake, Unpredictable Answers
?? Use Two-Factor Authentication (2FA) Everywhere
?? Enable Account Recovery Email & Backup Codes
?? If Possible, Choose Custom Security Questions
领英推荐
?? Avoid Answering Security Questions Honestly on Social Media
Final Takeaway: Security Questions Are Weak – Use 2FA??
Security questions were never meant to be strong authentication—they were designed for convenience.
Would you like recommendations on best password managers or a guide to setting up better security for your accounts? ???? yes
Ultimate Guide to Securing Your Accounts (Best Practices & Tools) ????
With security questions being a weak link, here’s a comprehensive guide on how to properly secure your accounts using password managers, 2FA, and other best practices.
1?? Use a Password Manager (No Reusing Passwords!)
A password manager helps you store and generate strong, unique passwords for every site.
?? Why use one?
? Prevents password reuse (which is how many hacks happen).
? Creates ultra-strong, random passwords (e.g., X@98gG1*#p!).
? Autofills passwords for convenience.
?? Best Password Managers (2024 Recommendations):
Password Manager Key Features Free Plan? Bitwarden Open-source, secure, best free plan
? Yes 1Password Best UI, travel mode (hides passwords temporarily)
? No Dashlane Dark web monitoring, VPN included
? Yes (limited) NordPass Easy to use, encrypted cloud storage
? Yes KeePassXC Offline storage (local only)
?? Best Practices for Password Managers:
? Enable a strong master password (Use a passphrase like GreenUnicorn$Banana!98).
? Use 2FA on your password manager! (More on this below).
? Don’t store your master password in your email.
2?? Set Up Two-Factor Authentication (2FA) Everywhere
Two-factor authentication (2FA) adds an extra layer of security by requiring a second step beyond your password.
?? Best 2FA Methods (Ranked from Best to Worst):
2FA Method Security Level Recommended?
Hardware Security Key (e.g., YubiKey, Titan Key) ?????????? (Best)
? Yes Authenticator Apps (Google Authenticator, Authy, Aegis) ????????
? Yes SMS 2FA (Text Messages) ???? (Weak, vulnerable to SIM swapping) ?? Only if no other option Email 2FA ?? (Weak, emails can be hacked)
? Avoid
?? Best Authenticator Apps:
? Authy – Best for multi-device backups.
? Aegis – Best open-source option for Android. ? Google Authenticator – Simple, but lacks cloud backup.
? Enable 2FA on important accounts:
3?? Lock Down Your Email (Most Important!)
?? Your email is the key to everything. If hacked, an attacker can reset all your passwords!
?? Email Security Checklist:
? Use a strong, unique password (stored in a password manager).
? Enable 2FA on email (preferably with an authenticator app, NOT SMS).
? Disable security questions if possible (or set fake answers).
? Check for old, unused email recovery options (remove old numbers/emails).
? Use a private, separate email for banking & sensitive logins (not shared on social media).
?? Bonus: Use alias emails with services like ProtonMail, SimpleLogin, or Apple’s “Hide My Email” for extra security.
4?? Avoid Phishing & Social Engineering Attacks
Even with strong passwords and 2FA, attackers might try to trick you into giving up access.
?? How to Spot Phishing Emails & Messages:
? “Your account has been locked! Click here to reset your password.”
? “Unusual activity detected, log in here to verify.”
? “Congratulations! You won a free iPhone, claim now.”
? Always check the sender's email address (legit companies won’t send from [email protected]).
? Don’t click suspicious links—manually go to the website instead.
? Use browser extensions like uBlock Origin & Bitdefender TrafficLight to block fake sites.
5?? Protect Yourself from SIM Swapping Attacks (Phone Hacks)
?? Hackers can take over your phone number and bypass SMS 2FA!
?? How to Prevent SIM Swap Attacks:
? NEVER use SMS for 2FA if avoidable (use an authenticator app or security key instead). ? Set up a PIN with your mobile carrier (prevents attackers from porting your number).
? Use a Google Voice number for account recovery instead of your real number.
? Watch for signs of a SIM swap attack (your phone suddenly loses service for no reason).
6?? Secure Your Crypto & Financial Accounts
?? Crypto and bank accounts are prime targets for hackers.
?? For Crypto Security:
? Use a hardware wallet (Ledger, Trezor) for large holdings.
? Use a dedicated email for crypto exchange accounts.
? Enable withdrawal whitelisting (so funds can only be sent to approved addresses).
?? For Banking Security:
? Enable 2FA (preferably via an authenticator app, not SMS).
? Use a separate, private email for banking.
? Disable overdraft protection to prevent unauthorized charges.
7?? Monitor for Data Breaches & Leaks
?? Check if your passwords have been leaked:
? Have I Been Pwned (Check if your email/password is in a data breach).
? Use Bitwarden/Dashlane’s breach monitoring feature to track compromised logins.
?? Set Up Breach Alerts:
? Google Security Checkup (Google Account > Security).
? Enable alerts for unusual login attempts on email & banking apps.
TL;DR – Summary of Your Action Plan
? Use a password manager (Bitwarden, 1Password, Dashlane).
? Enable 2FA with an authenticator app (Authy, Google Authenticator).
? Use a hardware security key (YubiKey for extra protection).
? Secure your email first (2FA, strong password, private recovery options).
? Avoid SMS-based 2FA (prevent SIM swapping).
? Watch out for phishing & social engineering scams.
? Check if your data is leaked on HaveIBeenPwned.
Question#3: List the 100 most used passwords
Here are the 100 most commonly used passwords, based on data breaches and security reports:
?? The Worst & Most Commonly Used Passwords (Do NOT Use These!) ??
Top 25 Most Used Passwords
More Commonly Used Passwords (26-50)
Still Bad, But Used Often (51-75)
Still Common, Still Weak (76-100)
?? Why These Passwords Are Bad
? How to Create a Strong Password
?? Use at least 12-16 characters (longer is better).
?? Include a mix of uppercase, lowercase, numbers, and symbols (e.g., Z$9n1@h4F*).
?? Avoid using real words or personal info (like names or birthdays).
?? Use a passphrase (e.g., PurpleElephant$Hiking!82). <<good>>
?? Use a Password Manager (Bitwarden, 1Password, Dashlane) to generate and store passwords securely.
?? Want to Check if Your Password Has Been Leaked?
?? Go to Have I Been Pwned and enter your password (securely hashed) to see if it has been exposed in data breaches.