Characters Like ‘Loki’ and ‘Thor’ Top Breached Password List

Share post:

Specops Software, a password management and authentication company released a compilation of frequently used DC and Marvel characters found on breached password lists on Monday.

To determine the list, the company said it analyzed more than 800 million passwords from a subset of more than 2 billion passwords in Specop’s Breached Password Protection.

According to Specops, Marvel’s Loki appears most frequently on lists of broken passwords.

Runner-up “Thor” surfaced almost 148,000 times on the password lists, edging out “Robin” at number 3. “Joker” and “Flash” round out the top five.

Interestingly, the top 10 includes six DC characters, compared to Marvel’s four appearances with “Batman” (DC), “Superman” (DC), “Vision” (Marvel), “Falcon” (Marvel) and “Penguin” (DC) at the top of the list.

It has been revealed that superhero characters used as passwords can still use a healthy dose of special characters and numbers.

The results add a layer of cybersecurity to the classic debate about the two comic universes.

In recent months, there have been a number of high-profile cybersecurity attacks on critical U.S. infrastructure, including a water treatment plant in Florida, JBS Foods ransomware attacks and the incident at the Colonial Pipeline.

This highlights the importance of password security in the face of recent cybercrime.

For more information, read the original story from TechRepublic.

Featured Tech Jobs


Related articles

Cyber Security Today, Week in Review for week ending Friday, March 1, 2024

This episode features a discussion on how hard it is to kill a ransomware gang, Canada's proposed new online harms bill, why organizations still allow staff to use vulnerable software

Healthcare sector “stretched thin” in fight against cyber attacks warns CSO of Health-ISAC

In an interview Errol Weiss talks about the challenges facing hospitals a

Cyber Security Today, March 1, 2024 – Warnings to GitHub users and Ivanti gateway administrators, and more

This episode reports on a recommendation that enterprises drop Ivanti Policy Secure and Connect Secure devices because threat actors can get around mitigations for recent vulne

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways