Connect with us

Technology

America’s most-used password in 2025 revealed

Published

on

America’s most-used password in 2025 revealed

NEWYou can now listen to Fox News articles!

Passwords play a huge role in how you stay safe online. They protect your accounts, devices and money. Still, many people pick logins that criminals can guess in seconds. 

The latest NordPass report shows this problem again. This year, “admin” took the top spot as the most common password in the United States.

NordPass and NordStellar, two cybersecurity companies that track leaked credentials and online threats, reviewed millions of exposed passwords to spot trends. They also examined how password habits differ across generations. The pattern is clear: many of us still rely on simple words, easy number strings and familiar keyboard patterns. These choices give attackers a quick path into countless accounts.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW

Weak passwords like “admin” give attackers a quick way into your accounts before you even realize it.  (Kurt “CyberGuy” Knutsson)

Most common passwords in the United States

NordPass shared its top 20 list for 2025. “Admin” sits at number one. Variations of the word “password” take up five spots. Number strings appear nine times. One explicit term even made the list.

Here are the 20 most common passwords in the USA this year:

  • admin
  • password
  • 123456
  • 12345678
  • 123456789
  • 12345
  • Password
  • 12345678910
  • Gmail.12345
  • Password1
  • Aa123456
  • f*******t
  • 1234567890
  • abc123
  • Welcome1
  • Password1!
  • password1
  • 1234567
  • 111111
  • 123123

Weak logins remain a major problem because criminals rely on automated tools. These tools try simple words and common patterns first. When millions of people reuse the same easy passwords, attackers succeed fast.

HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE

Advertisement

Reusing the same login across sites makes it easy for criminals to jump from one hacked account to another. (Kurt “CyberGuy” Knutsson)

Global trends show the same risky password behavior

The United States is not alone. Globally, “123456” ranks as the most common password. “Admin” and “12345678” follow closely behind. These patterns appear because they are easy to remember. Sadly, they are also easy to crack.

Researchers noticed one shift worth noting: more passwords now include special characters. The increase is sharp. However, most examples remain weak. Strings like P@ssw0rd and Abcd@1234 still follow predictable rules that tools can break with little effort.

The word “password” stays popular around the world. People even use it in local languages. This shows how widespread the problem is.

Why younger generations still make unsafe password choices

Many people assume younger adults understand digital safety. They grew up with phones and social media. Research shows that this assumption is wrong.

Advertisement

NordPass found that an 18-year-old often picks the same weak password patterns as an 80-year-old. Younger users favor long number sequences. Older users lean toward names. Neither group creates secure or random strings. Generations Z and Y tend to avoid names. Generations X and older use them often. Each approach carries risk because attackers expect both patterns.

AI-POWERED SCAMS TARGET KIDS WHILE PARENTS STAY SILENT

Researchers found that weak and predictable passwords still appear in leaked data again and again. (Kurt “CyberGuy” Knutsson)

Why weak passwords remain a big threat

Weak passwords fuel data breaches and account takeovers. Criminals run scripts that check billions of combinations every second. When your password is common, they break in fast.

A single stolen login can expose your email, social accounts, bank information and more. Many attacks start this way. Once criminals get inside one account, they often try the same password on others.

Advertisement

Steps to stay safe with your passwords 

You can improve your digital safety with a few simple habits. These steps help block common attacks and protect your accounts.

1) Create strong random passwords

Pick long passwords or short passphrases. Aim for at least 20 characters. Mix letters, numbers and special characters. Avoid patterns. 

2) Avoid password reuse

Use a unique password for each account. If one login gets hacked, the others stay safe.

3) Review and update weak passwords

Check your old logins. Replace anything short, predictable or reused. Fresh passwords lower your risk.

4) Use a password manager

A password manager creates secure passwords and stores them safely. It also fills them in for you, so you do not need to remember them.

Advertisement

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

5) Turn on multi-factor authentication (MFA)

MFA adds a second check before you log in. It is one of the easiest ways to block attackers.

6) Keep your software updated

Update your phone, computer browsers and apps on a regular schedule. These updates patch security gaps that criminals try to exploit. When you fall behind on updates, weak passwords become even riskier because attackers can pair old software flaws with easy logins.

Pro Tip: Use a data removal service

Leaked passwords often come from old profiles on data broker sites you forgot about. A data removal service can wipe your personal info from those sites and reduce how much of your data ends up on breach lists. When less of your information is floating around online, your accounts become less tempting targets.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways 

Weak passwords remain a huge issue in 2025, even with new tools and better education. You have the power to improve your security with a few quick changes. When you build strong habits, you make it harder for criminals to get inside your accounts. Small steps add up fast and give you far more protection online.

Advertisement

What do you think keeps people stuck on weak passwords even when the risks are clear? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Will Trump’s DOJ actually take on Ticketmaster?

Published

on

Will Trump’s DOJ actually take on Ticketmaster?

In mid-February, the Department of Justice lost its head antitrust enforcer — just weeks before it was scheduled to argue one of the year’s biggest anti-monopoly cases in court.

Antitrust Division chief Gail Slater announced her departure suddenly, via a post on her personal X account. But to those who follow the agency closely, it was far from surprising. For months, leaks about the division described tensions between Slater and her team with DOJ leadership, and President Donald Trump’s penchant for personal dealmaking raised questions about who would really call the antitrust shots.

Over the summer, two of Slater’s top deputies were fired for what the DOJ said was “insubordination.” One of them later described pushing back against a wireless networking deal between Hewlett Packard Enterprise (HPE) and Juniper Networks, peddled by “MAGA-In-Name-Only” lobbyists and DOJ officials. The week before Slater announced her departure, a third deputy also left the agency.

The timing drew extra scrutiny because Mike Davis, one of the lobbyists close to Trump who worked on the HPE-Juniper deal, is also reportedly working for Live Nation. Live Nation did not provide a comment on the reported connection. “What was happening implicitly before is now explicit,” one former DOJ official, speaking on background to discuss personnel matters, says of Slater’s sudden departure. “A lot of very powerful corporations have figured out that they can just push through fantasy deals and fantasy outcomes in ways that were impossible before, and all they have to do is pay.” After Slater posted about her departure, Attorney General Pam Bondi thanked her in a statement “for her service to the Antitrust Division which works to protect consumers, promote affordability, and expand economic opportunity.”

”A lot of very powerful corporations have figured out that they can just push through fantasy deals”

Advertisement

The DOJ and a group of what’s grown to 40 state attorneys general sued Live Nation-Ticketmaster in May 2024, seeking to break up the company they allege used anticompetitive practices to lock artists and venues into its orbit. By allegedly tying together different parts of its business, using exclusionary contracts, and threatening “financial retaliation” to keep new players out of the market, the company succeeded in driving up ticket prices for consumers, they argue. Live Nation said in a blog post at the time that the lawsuit “ignores everything that is actually responsible for higher ticket prices.”

With jury selection in the case slated to begin on March 2nd, many are left wondering if the DOJ will remain on the case. Should the agency settle and choose to no longer be involved in the trial, at least some of the 40 states who joined the DOJ in the initial lawsuit could — and likely would — continue to push ahead with the litigation. “We look forward to going to trial on March 2 against Live Nation,” California’s top antitrust enforcer, Paula Blizzard, said at an event the day of Slater’s announcement. Tennessee Attorney General Jonathan Skrmetti also plans to move forward with the states’ lawsuit, Capitol Forum reported.

The DOJ very well may remain a lead plaintiff. Omeed Assefi, who is taking over Slater’s role in the interim, pledged to continue her agenda, MLex reported. As of February 17th, he has said the case is strong and favors trial, according to Capitol Forum. Global Competition Review also reported last week that Assefi encouraged staff to look to his work on criminal antitrust enforcement as a guide to how he’ll lead the division. “Ask them how I feel about settling cases in lieu of trial,” he reportedly said. “Ask them how I feel about accepting half measures and mere monetary penalties in lieu of seeking justice.”

But Slater, too, was known as a serious enforcer of antitrust law — and reports suggest her agenda was overruled.

“The states are no stranger to real politik

Advertisement

In general, states are always prepared for changes in their trial partners, says Gwendolyn Lindsay Cooley, former Wisconsin antitrust chief and chair of the National Association of Attorneys General Multistate Antitrust Task Force. (Cooley agreed to speak generally about the role of state enforcement and not about the Live Nation case in particular, which Wisconsin was part of during her time there.) “The states are no stranger to real politik,” Cooley says. State enforcers understand that priorities and personnel can change with administrations, either in state offices or at the DOJ. This can require changes, like reassigning the most seasoned lawyers to fill gaps left by federal attorneys. But Cooley says there are plenty of experienced litigators in the states. “My understanding from talking with states generally is that this is something they were prepared for, and so should be able to take this in stride,” Cooley says.

The T-Mobile-Sprint merger litigation may serve as a guide. After Trump’s DOJ approved the merger, some states settled their cases, but others continued a fight to block the merger. In the end, however, they failed — a court let the merger close anyway.

States could be more aggressive in pursuing the Live Nation-Ticketmaster trial. The company has been widely criticized by musicians and concertgoers alike, including after infamously bungling a Taylor Swift ticket presale in 2022. In an interview with Bloomberg, attorneys general for California and Connecticut said they’d maintain a high bar for settling. “Any resolution that is politically motivated or impacted, or any settlement that comes from trying to placate the president or meet his demands is not likely to fly with Connecticut or California either,” Connecticut AG William Tong said.

In fact, citizen complaints about Ticketmaster are among the top 10 things state AGs commonly hear about, according to Cooley. “That’s something that the state AGs are going to be really paying attention to.”

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Advertisement
Continue Reading

Technology

Spyware can hijack your phone in seconds

Published

on

Spyware can hijack your phone in seconds

NEWYou can now listen to Fox News articles!

You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.

If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.

This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)

What makes ZeroDayRAT spyware so dangerous?

Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.

Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:

  • A full stream of incoming notifications
  • A searchable inbox of text messages
  • Device model and operating system details
  • Battery level and lock status
  • Network activity and app usage

In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.

It can watch and listen in real time

Here is where things get even more disturbing.

ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:

Advertisement
  • Capture every keystroke with context
  • See which app you opened
  • Track how long you spent inside it
  • Record gestures and inputs
  • Access your microphone
  • Activate your front or rear camera
  • View your screen in real time

Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.

Your banking and crypto apps are targets too

Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.

Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.

Why Apple and Google are tightening app rules

There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.

How to tell if ZeroDayRAT spyware is on your phone

Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.

Unusual battery drain

Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.

Advertisement

Phone overheating without heavy use

If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.

Strange data usage spikes

Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.

Unknown apps or configuration changes

Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.

Unexpected login alerts

If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.

Microphone or camera indicators are activating randomly

Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.

Advertisement

If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)

How to remove ZeroDayRAT spyware from your phone

If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.

1) Disconnect immediately

Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.

Advertisement

2) Change your passwords from a different device

Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.  Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Run a trusted mobile security scan

Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Remove suspicious apps and profiles

On iPhone, check SettingsGeneralVPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.

5) Back up essential data carefully

If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.

6) Perform a factory reset

A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.

Advertisement

7) Monitor your financial accounts

Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.

When to replace the device

In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.

Ways to stay safe from ZeroDayRAT spyware

The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.

1) Avoid sideloading apps

Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.

2) Think before you tap and use strong antivirus protection

Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

3) Keep your phone updated

Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.

4) Review app permissions regularly

Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.

5) Use strong authentication

Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.

6) Use a data removal service to reduce your exposure

Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering.  Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

7) Do not bypass your phone’s built-in security protections

Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.

Advertisement

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)

Kurt’s key takeaways

ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.

Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Android malware hidden in fake antivirus app
Advertisement
Continue Reading

Technology

Nothing couldn’t wait to show off the Phone 4A

Published

on

Nothing couldn’t wait to show off the Phone 4A

After teasing the upcoming launch of its midrange Phone 4A last week, Nothing has now revealed what the rear of the device looks like. An official render of the Phone 4A shared on X shows off the brand’s familiar transparent-industrial stylings, alongside a new “Glyph Bar” lighting feature located to the right of the triple camera island.

This Glyph Bar features nine individually controllable mini-LEDs that appear as a line of seven square lights — six white, and one red — replacing the three LED light strips that surround the camera on Nothing’s 3A devices. Nothing says that the Glyph Bar is 40 percent brighter than the previous A-series’ lights and uses patented tech to provide “a more natural, neutral, bleed-free glow.”

Nothing hasn’t shared much else about the Phone 4A series besides confirming it’ll be running a Snapdragon chip. Full specifications, price, and availability might not be announced until it launches on March 5th. Nothing CEO Carl Pei has confirmed that there won’t be a Phone 4 this year, however, so last year’s Phone 3 will remain the current flagship for now.

Continue Reading

Trending