{"id":920,"date":"2023-12-16T05:51:25","date_gmt":"2023-12-16T05:51:25","guid":{"rendered":"https:\/\/e5hforensics.com\/?p=920"},"modified":"2024-02-26T13:08:45","modified_gmt":"2024-02-26T13:08:45","slug":"australias-top-20-most-common-passwords-being-sold-on-the-dark-web","status":"publish","type":"post","link":"https:\/\/e5hforensics.com\/index.php\/2023\/12\/16\/australias-top-20-most-common-passwords-being-sold-on-the-dark-web\/","title":{"rendered":"Australia&#8217;s top 20 most common passwords being sold on the Dark Web"},"content":{"rendered":"\n<p>A stolen trove of passwords\u00a0<a href=\"https:\/\/www.9news.com.au\/dark-web\" target=\"_blank\" rel=\"noreferrer noopener\">released on the dark web<\/a>\u00a0has been analysed, and it reveals a dangerous trend in how Aussies choose their passwords. While you might not guess the most common password found on the Dark Web, the top five is full of extremely simple and predictable options.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.9news.com.au\/national\/australias-top-20-most-common-passwords-being-sold-on-the-dark-web\/e8144715-65f1-41ef-b685-18574d3b2e89\">https:\/\/www.9news.com.au\/national\/australias-top-20-most-common-passwords-being-sold-on-the-dark-web\/e8144715-65f1-41ef-b685-18574d3b2e89<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A stolen trove of passwords\u00a0released on the dark web\u00a0has been analysed, and it reveals a dangerous trend in how Aussies choose their passwords. While you might not guess the most common password found on the Dark Web, the top five is full of extremely simple and predictable options. https:\/\/www.9news.com.au\/national\/australias-top-20-most-common-passwords-being-sold-on-the-dark-web\/e8144715-65f1-41ef-b685-18574d3b2e89<\/p>\n","protected":false},"author":2,"featured_media":923,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/comments?post=920"}],"version-history":[{"count":3,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/920\/revisions"}],"predecessor-version":[{"id":940,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/posts\/920\/revisions\/940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media\/923"}],"wp:attachment":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media?parent=920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/categories?post=920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/tags?post=920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}