Thursday, May 1, 2025
HomeCyber Security NewsMost Popular Websites Still Allow Users To Have Weak Passwords

Most Popular Websites Still Allow Users To Have Weak Passwords

Published on

SIEM as a Service

Follow Us on Google News

The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most popular websites in the world, which do not fulfill the minimum required standards.

Researchers also found that 12% of websites had no limitations at all for the length of passwords. They made this discovery using a first-of-its-kind automated tool that can evaluate a website’s password creation regulations.

This automated tool for assessment was developed by Ph.D. student Suood Al Roomi and assistant professor Frank Li of Georgia Tech’s School of Cybersecurity and Privacy to examine every website in the Google Chrome User Experience Report (CrUX). This database contains one million web pages.  

- Advertisement - Google News
Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Outdated Password Practices Are Widespread

This tool was effective on over 20,000 websites in the database and indicated that many websites:

  • Permit very short passwords
  • Avoid blocking common passwords.
  • Use outdated specifications such as complicated characters.

Additionally, the researchers found that the majority of sites keep up with 2004 regulations, while only a few fully follow standard guidelines.

The study found that over half of the websites accepted passwords with six characters or fewer and that 75% did not enforce the suggested minimum of eight characters. Approximately 12% had no length restrictions, while 30% did not allow special characters or spaces.

Just 28% of the websites under investigation had password block lists in place, leaving thousands of websites open to hacker attempts to access users’ accounts by using popular passwords, a technique known as ‘password spraying.’

Al Roomi and Li observed the consistency of length constraints and needs for numerals, capital and lowercase characters, special symbols, combinations, and starting letters with the aid of machine learning.

Additionally, they may check to determine if websites allowed dictionary words or passwords known to have been compromised.

“As a security community, we’ve identified and developed various solutions and best practices for improving internet and web security. It’s crucial that we investigate whether those solutions or guidelines are actually adopted in practice to understand whether security is improving in reality”, said Li.

Hence, it is crucial to use strong passwords. They safeguard your private information by preventing illegal access to your device accounts and gadgets. The more difficult the password, the more secure your data will be against hackers and online threats.

You may improve organizational security and keep yourself secure from cybercriminals by enforcing the usage of multi-factor authentication (MFA).

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...