Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Google warns: Don’t use these passwords or you are at risk

Credential theft now behind 37 percent of successful intrusions on Gmail accounts.

byKerem Gülen
August 11, 2025
in Cybersecurity, News
Home News Cybersecurity

Google has issued a warning regarding surging attacks targeting Gmail users to steal security credentials, confirming these incidents are responsible for 37% of successful intrusions. The attacks, often involving infostealer malware, leverage password theft to gain unauthorized access to accounts. Google advises users to enhance account security by adopting passkeys or the “Sign in with Google” option, rather than relying on traditional passwords, and to avoid linked or popup sign-in windows.

Google’s research indicates that most users have not yet implemented passkeys, despite their inherent advantages over passwords. Passkeys are described as unique digital credentials tied to a user’s device, making them resistant to guessing, theft, or forgetting. A significant number of users continue to depend on older sign-in methodologies, including passwords, which necessitates a critical re-evaluation of current password practices to mitigate vulnerability to hackers.

Hive Systems highlights that common vulnerabilities such as password reuse, insufficient character lengths, and weak complexity contribute significantly to unauthorized system access. The organization has compiled “time-to-crack estimates for passwords of various lengths and character sets,” demonstrating that a combination of uppercase and lowercase letters, numbers, and symbols is optimal when a password is at least eight characters long. This guide primarily considers a standalone brute force approach. However, in practical scenarios, attackers often do not initiate from scratch, which results in significantly reduced cracking times, sometimes rendering the password immediately vulnerable.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The length or complexity of a password does not negate the risk if it has been reused across multiple services and subsequently breached or stolen. In such instances, all accounts employing that identical password become susceptible to compromise. NordPass’s annual list of the top 200 most common passwords, now in its sixth year, underscores prevalent poor password hygiene. NordPass compiled this data by analyzing passwords that had been stolen through malware or exposed in various data leaks. If a user’s password appears on this list or closely resembles one of its entries, immediate modification is advised.

Despite these recommendations, the most crucial advice remains consistent: users should add a passkey to their Google account and prioritize its use for all sign-ins. Furthermore, replacing SMS-based two-factor authentication (2FA) with an authenticator application is strongly encouraged. Users are also cautioned against logging into any Google account through linked or popup sign-in prompts, which can be indicators of phishing attempts or other malicious activities.


Featured image credit

Tags: CybersecurityFeaturedgmailpassword

Related Posts

BetterPic: The industry-leading AI headshot generator

BetterPic: The industry-leading AI headshot generator

September 26, 2025
Co-op Group reports £75m loss after April cyber-attack

Co-op Group reports £75m loss after April cyber-attack

September 25, 2025
Taiwan industrial production up 14.4% in August thanks to AI chips

Taiwan industrial production up 14.4% in August thanks to AI chips

September 25, 2025
Nansen AI launches agent for on-chain Ethereum insights

Nansen AI launches agent for on-chain Ethereum insights

September 25, 2025
Apple: DMA delays iPhone mirroring and AirPods live translation in EU

Apple: DMA delays iPhone mirroring and AirPods live translation in EU

September 25, 2025
LastPass: GitHub hosts atomic stealer malware campaign

LastPass: GitHub hosts atomic stealer malware campaign

September 25, 2025

LATEST NEWS

BetterPic: The industry-leading AI headshot generator

Co-op Group reports £75m loss after April cyber-attack

Taiwan industrial production up 14.4% in August thanks to AI chips

Nansen AI launches agent for on-chain Ethereum insights

Apple: DMA delays iPhone mirroring and AirPods live translation in EU

LastPass: GitHub hosts atomic stealer malware campaign

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.