If you're still using this insecure password method, it's time to stop!

Such is the case with Keyboard Walk Password, which seems strong at first but is actually very insecure.

So, what are Keyboard Walk Passwords and why shouldn't you use them?

What is Keyboard Walk Password?

If you're still using this insecure password method, it's time to stop! Picture 1

'Keyboard walking' is a type of password that is created by drawing a specific pattern on the keys on the keyboard instead of using a mnemonic word or symbol. The idea is that you remember the pattern you 'draw' on the keyboard instead of what you type.

For example, if you run your finger along the top row of a QWERTY keyboard, you'll create the password "qwertyuiop." At first glance, it looks like a secure password — it doesn't contain common words, it's a jumble of characters, and it's easy to type to unlock your computer.

But in reality, "qwertyuiop" is one of the most common passwords, making it easy to guess and making it easier to access your account.

Why is Keyboard Walk Password weak?

If you're still using this insecure password method, it's time to stop! Picture 2

Here's the problem with Keyboard Walk Passwords: Anytime a password is derived from a specific pattern or common thought that people tend to have, it's considered a common password. Hackers always keep an eye out for passwords that people commonly use and use them when trying to break into someone's account.

Unfortunately, while drawing patterns on your keyboard may seem clever, other people have had the same idea, so there's a good chance that the pattern you come up with has already been thought of and used by hundreds of thousands of other users.

Examples of popular Keyboard Walk Passwords

Luckily, we have a way to see which Keyboard Walk Passwords are the most popular. This is because many passwords have been leaked from account databases, allowing researchers to record and rank each password's popularity.

According to Spec Ops report, here are the 10 most used Keyboard Walk Passwords:

  1. Qwerty (found over 1 million times)
  2. qwert
  3. wet
  4. asdfg
  5. stress
  6. zxcvbnm
  7. drew
  8. qwertyuiop
  9. asdfgh
  10. vbnhb

If you trace the keys in each password with your finger, you can see the pattern each person used to create that password. Most of them are just straight lines on the keyboard, but some are circles. For example, 'Drews' and 'vbnhb' involve drawing a memorable circle on the keyboard.

How to secure your account with a strong and unique password

Keyboard Walk Passwords are easy to remember, but they also make it very easy for hackers to access your accounts. If you want to improve your online security but don't want to remember long, complicated passwords, there are two great alternatives to try.

Use strong but memorable passwords

Here's some good news: There are ways to create strong passwords that are still memorable. Sometimes you can take something you like, like a famous quote or personal information, and combine it with numbers and symbols to create a strong password.

Use a password manager

If you want to use secure passwords but can't remember them all, it's time to start using a password manager. These managers will remember your account passwords, meaning you can keep them as secure as possible without having to worry about remembering them later.

Keyboard Walk Passwords may be convenient, but they're easy for hackers to guess. Now you know how to improve your passwords, including using stronger, better passwords if you want.

4 ★ | 1 Vote

May be interested

  • Method in HTTPMethod in HTTP
    the set of common methods for http / 1.1 is defined below and this set of settings can be expanded based on the requirements. these method names are case-sensitive and they must be used in uppercase.
  • How to set a password for a PDF file?How to set a password for a PDF file?
    because pdf files are often used to store and share online, it is easy to reveal personal secrets or sensitive information. therefore, to ensure safety, it is best to set a password for your important files. at that time, only those who have the password can read it. if you do not know how to do, you can refer to the instructions below of tipsmake.com.
  • Ransomware STOP started installing Trojans to steal victim passwordsRansomware STOP started installing Trojans to steal victim passwords
    in addition to encrypting files on the system, ransomware stop strains have also started quietly installing the azorult password stealing trojan on the victim's computer to steal account information, electronic wallet, and file desktop ...
  • Instructions to retrieve Skype passwordInstructions to retrieve Skype password
    you haven't used skype for a long time, so you've forgotten your login password. in addition, the use of many different accounts makes you unable to remember correctly. so what to do now? please refer to the following article to retrieve skype password easily
  • How to Get Someone Else's Facebook PasswordHow to Get Someone Else's Facebook Password
    do you need to find someone's facebook password for urgent reasons? you can recover your password using facebook's trusted contacts feature. this is a feature that allows you to access other people's facebook passwords and log into their accounts. however, this method is only effective in some cases mentioned below. continue reading below to learn how to get someone's facebook password using their email address and the trusted contacts feature.
  • How to hack Wifi password with Aircrack-NgHow to hack Wifi password with Aircrack-Ng
    in this article, we will use aircrack-ng and dictionary attack method with encrypted password taken from the 4-step handshake process.
  • Red warnings to watch out for on insecure websitesRed warnings to watch out for on insecure websites
    the website owner is responsible for the safety of its visitors, but unfortunately not all websites are safe. studies show that up to 18.5 million websites are infected with malware.
  • Effective time management with the Eisenhower Matrix method: Put effort into important and non-urgent tasksEffective time management with the Eisenhower Matrix method: Put effort into important and non-urgent tasks
    eisenhower matrix method is useful for those who are struggling in time management and busy people, focusing on solving important tasks that are directly related to future success.
  • Forgot iPhone password, what to do?Forgot iPhone password, what to do?
    it is often difficult to forget the 4-digit iphone password (passcode) but does not mean it does not happen. if you forget or enter the wrong 6-time passcode on your iphone or ipad, your device will show notifications of disabled (disabled). what should you do in this case?
  • Top 3 best password management software 2020Top 3 best password management software 2020
    top 3 best password management software 2020. many people use that method to set the same password for all accounts to be easy to remember, but this is quite dangerous because if revealing the password of an account then the other accounts are also at risk of being lost.