- Looking for a Nintendo Switch? Black Friday deals are here 5 Years Ago
- Facebook copies Instagram with experimental ‘Popular Photos’ feature 5 Years Ago
- This iPhone app says it will alert you if you’ve been hacked Today 2:43 PM
- ‘Marvel’s Hero Project’ is the wholesome content 2019 needs Today 2:40 PM
- Get more out of VSCO with VSCO search Today 2:09 PM
- Twitter carves out ‘cause-based’ advocacy exemption in political ads ban Today 2:06 PM
- Disney+ accounts are being hacked—here’s how to protect yourself Today 1:52 PM
- Instagram is hiding likes globally and searching for a ‘well-being’ product researcher Today 1:42 PM
- ‘The Mandalorian’ opens up its mythology even further in ‘Chapter 2’ Today 12:54 PM
- Want to buy a drone on a budget? We’ve got you covered Today 12:51 PM
- ‘Simpsons’ writer accuses Republicans of stealing Sideshow Bob’s defense Today 12:49 PM
- Keanu Reeves’ appearance in ‘SpongeBob Movie’ trailer quickly becomes a meme Today 12:35 PM
- Charli XCX makes the band in Netflix’s ‘Nasty Cherry’ Today 12:33 PM
- Taylor Swift’s distress call reignites fight with Scooter Braun and former label Today 12:16 PM
- How to disable autoplay for previews and trailers on Disney+ Today 12:10 PM
Here are 500 passwords you should never, ever use
You might want to swap out “Blink182” for another band.
When a tool known as iBrute bubbled up to the surface of Hacker News yesterday, speculation turned to a vulnerability in iCloud’s Find My iPhone feature as a possible source for the cache of photos. And while it’s not clear if iBrute or a similar method was actually the route into the private photo collections of Jennifer Lawrence and others, the weakness in iCloud—which Apple has since patched—is certainly cause for alarm.
Posted to GitHub, iBrute is a brute-force tool, meaning that it breaks into an account by guessing one password after another in rapid succession. It’s a pretty crude kind of hack, made possible by weak passwords and an unsettling loophole in Find My iPhone that failed to shut out suspicious users after a handful of failed login attempts.
Making a strong password is always in style, but this list of 500 weak passwords that came packaged with the iBrute hack is so last season. Here are some highlights:
- [email protected] (look at your keyboard)
If your password looks anything like any of these, sprinkle in a healthy dose of extra characters, numbers, and symbols before it’s too late. And if your password has been “Blink182” since Enema of the State came out, you’ve got bigger issues.
Taylor Hatmaker has reported on the tech industry for nearly a decade, covering privacy and government. Most recently, she was the Debug editor of the Daily Dot. Prior to that, she was a staff writer and deputy editor at ReadWrite, a tech and business reporter for Yahoo News, and the senior editor of Tecca. Her editorial interests include censorship, digital activism, LGBTQ issues, and futurist consumer tech.