Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Google warns: Don’t use these passwords or you are at risk

Credential theft now behind 37 percent of successful intrusions on Gmail accounts.

byKerem Gülen
August 11, 2025
in Cybersecurity, News
Home News Cybersecurity

Google has issued a warning regarding surging attacks targeting Gmail users to steal security credentials, confirming these incidents are responsible for 37% of successful intrusions. The attacks, often involving infostealer malware, leverage password theft to gain unauthorized access to accounts. Google advises users to enhance account security by adopting passkeys or the “Sign in with Google” option, rather than relying on traditional passwords, and to avoid linked or popup sign-in windows.

Google’s research indicates that most users have not yet implemented passkeys, despite their inherent advantages over passwords. Passkeys are described as unique digital credentials tied to a user’s device, making them resistant to guessing, theft, or forgetting. A significant number of users continue to depend on older sign-in methodologies, including passwords, which necessitates a critical re-evaluation of current password practices to mitigate vulnerability to hackers.

Hive Systems highlights that common vulnerabilities such as password reuse, insufficient character lengths, and weak complexity contribute significantly to unauthorized system access. The organization has compiled “time-to-crack estimates for passwords of various lengths and character sets,” demonstrating that a combination of uppercase and lowercase letters, numbers, and symbols is optimal when a password is at least eight characters long. This guide primarily considers a standalone brute force approach. However, in practical scenarios, attackers often do not initiate from scratch, which results in significantly reduced cracking times, sometimes rendering the password immediately vulnerable.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The length or complexity of a password does not negate the risk if it has been reused across multiple services and subsequently breached or stolen. In such instances, all accounts employing that identical password become susceptible to compromise. NordPass’s annual list of the top 200 most common passwords, now in its sixth year, underscores prevalent poor password hygiene. NordPass compiled this data by analyzing passwords that had been stolen through malware or exposed in various data leaks. If a user’s password appears on this list or closely resembles one of its entries, immediate modification is advised.

Despite these recommendations, the most crucial advice remains consistent: users should add a passkey to their Google account and prioritize its use for all sign-ins. Furthermore, replacing SMS-based two-factor authentication (2FA) with an authenticator application is strongly encouraged. Users are also cautioned against logging into any Google account through linked or popup sign-in prompts, which can be indicators of phishing attempts or other malicious activities.


Featured image credit

Tags: CybersecurityFeaturedgmailpassword

Related Posts

UK Home Office seeks full Apple iCloud data access

UK Home Office seeks full Apple iCloud data access

September 2, 2025
iPhone 17 may drop physical SIM in EU

iPhone 17 may drop physical SIM in EU

September 2, 2025
Zscaler: Salesloft Drift breach exposed customer data

Zscaler: Salesloft Drift breach exposed customer data

September 2, 2025
AI boosts developer productivity, human oversight still needed

AI boosts developer productivity, human oversight still needed

September 2, 2025
Windows 11 25H2 enters testing with no new features

Windows 11 25H2 enters testing with no new features

September 2, 2025
ChatGPT logo fixes drive demand for graphic designers

ChatGPT logo fixes drive demand for graphic designers

September 2, 2025

LATEST NEWS

UK Home Office seeks full Apple iCloud data access

iPhone 17 may drop physical SIM in EU

Zscaler: Salesloft Drift breach exposed customer data

AI boosts developer productivity, human oversight still needed

Windows 11 25H2 enters testing with no new features

ChatGPT logo fixes drive demand for graphic designers

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.