
{"id":1829,"date":"2012-06-14T09:21:44","date_gmt":"2012-06-14T12:21:44","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1829"},"modified":"2017-03-14T09:14:51","modified_gmt":"2017-03-14T12:14:51","slug":"las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/","title":{"rendered":"Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?"},"content":{"rendered":"<div>Con los recientes ataques a Linked In, los hacker del gobierno y las miles de cuentas robadas en diferentes redes sociales y servicios de correo\u2026 Nos estamos preocupando m\u00e1s y m\u00e1s sobre nuestra seguridad en la web.<\/div>\n<div>Nuestra primera preocupaci\u00f3n siempre es sobre nuestras contrase\u00f1as o \u201cpasswords\u201d. Siempre hemos recomendado por esta v\u00eda utilizar n\u00fameros, letras y signos en una sola clave, al igual que utilizar diferentes claves para diferentes servicios no vaya a ser que por mala suerte adivinen nuestra clave y pongamos una variedad de cuentas en manos de nuestro atacante.<\/div>\n<div><\/div>\n<div>Usualmente los usuarios utilizan contrase\u00f1as con palabras sencillas o n\u00fameros que van del 1 al 8. Por eso les dejo una lista de las 25 contrase\u00f1as m\u00e1s usadas que aparece en la lista\u00a0<em>10,000 Top Passwords<\/em>\u00a0del consultor de seguridad\u00a0<a href=\"http:\/\/xato.net\/passwords\/more-top-worst-passwords\/#more-269\" target=\"_blank\">Mark Burnett<\/a>.<\/div>\n<div>M\u00e1s del 14% de los usuarios tienen contrase\u00f1as del top 10 y el 9.8% de los usuarios tienen la clave \u201c123456? y \u201c12345678?.<\/div>\n<div>Pero no todo se trata de tener una buena clave, debemos tomar en cuenta las preguntas de seguridad. En una reciente entrevista que le\u00ed en GQ, realizada al responsable de muchas de las fotos desnudas de celebridades de Hollywood que fueron filtradas a la web durante los \u00faltimos dos a\u00f1os (Ej: Scarlett Johannson), el hacker confiesa que entrar a las cuentas se le hac\u00eda muy f\u00e1cil ya que mucha de las respuestas a las preguntas de seguridad (preguntas que aparecen luego de intentar entrar a una cuenta de correo) se encuentran en la web.<\/div>\n<h2>5 reglas para escoger una buena contrase\u00f1a<\/h2>\n<div>Al momento de escoger una contrase\u00f1a segura solo aplican pocas reglas:<\/div>\n<div>1. Mezcla may\u00fasculas y min\u00fasculas.<\/div>\n<div>2. Utiliza por lo menos un n\u00famero.<\/div>\n<div>3. Agrega un signo de puntuaci\u00f3n.<\/div>\n<div>4. Escoge algo privado. Algo que solo tu conozcas.<\/div>\n<div>5. Mientras m\u00e1s largo mejor (s\u00ed, chinazo).<\/div>\n<div>Pueden generar una contrase\u00f1a con esta herramienta online: <a href=\"https:\/\/thebestvpn.com\/password-generator\">https:\/\/thebestvpn.com\/password-generator<\/a>\/<\/div>\n<h2>Las 25 contrase\u00f1as m\u00e1s utilizadas<\/h2>\n<div>\n<ol>\n<li>\n<div>password<\/div>\n<\/li>\n<li>\n<div>123456<\/div>\n<\/li>\n<li>\n<div>12345678<\/div>\n<\/li>\n<li>\n<div>1234<\/div>\n<\/li>\n<li>\n<div>qwerty<\/div>\n<\/li>\n<li>\n<div>12345<\/div>\n<\/li>\n<li>\n<div>dragon<\/div>\n<\/li>\n<li>\n<div>pussy<\/div>\n<\/li>\n<li>\n<div>baseball<\/div>\n<\/li>\n<li>\n<div>football<\/div>\n<\/li>\n<li>\n<div>letmein<\/div>\n<\/li>\n<li>\n<div>monkey<\/div>\n<\/li>\n<li>\n<div>696969<\/div>\n<\/li>\n<li>\n<div>abc123<\/div>\n<\/li>\n<li>\n<div>mustang<\/div>\n<\/li>\n<li>\n<div>michael<\/div>\n<\/li>\n<li>\n<div>shadow<\/div>\n<\/li>\n<li>\n<div>master<\/div>\n<\/li>\n<li>\n<div>jennifer<\/div>\n<\/li>\n<li>\n<div>111111<\/div>\n<\/li>\n<li>\n<div>2000<\/div>\n<\/li>\n<li>\n<div>jordan<\/div>\n<\/li>\n<li>\n<div>superman<\/div>\n<\/li>\n<li>\n<div>harley<\/div>\n<\/li>\n<li>\n<div>1234567<\/div>\n<\/li>\n<\/ol>\n<\/div>\n<div>\n<p>Si tienen una de estas contrase\u00f1as, no dejen de seguir las 5 reglas anteriores y cambiarla lo antes posible.<\/p>\n<p>Fuente:\u00a0<a href=\"http:\/\/runrun.es\/ciber\/46439\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena.html\" target=\"_blank\">runrun.es<\/a><\/p>\n<\/div>\n<div>Visto en:\u00a0<a href=\"http:\/\/seguridad-informacion.blogspot.com.ar\/\">http:\/\/seguridad-informacion.blogspot.com.ar<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Con los recientes ataques a Linked In, los hacker del gobierno y las miles de cuentas robadas en diferentes redes sociales y servicios de correo\u2026 Nos estamos preocupando m\u00e1s y m\u00e1s sobre nuestra seguridad en la web. Nuestra primera preocupaci\u00f3n siempre es sobre nuestras contrase\u00f1as o \u201cpasswords\u201d. Siempre hemos recomendado por esta v\u00eda utilizar n\u00fameros, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1829","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?\",\"datePublished\":\"2012-06-14T12:21:44+00:00\",\"dateModified\":\"2017-03-14T12:14:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\"},\"wordCount\":389,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2012-06-14T12:21:44+00:00\",\"dateModified\":\"2017-03-14T12:14:51+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?","datePublished":"2012-06-14T12:21:44+00:00","dateModified":"2017-03-14T12:14:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/"},"wordCount":389,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/","url":"https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 25 contrase\u00f1as m\u00e1s utilizadas: \u00bfC\u00f3mo escoger una buena contrase\u00f1a?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2012-06-14T12:21:44+00:00","dateModified":"2017-03-14T12:14:51+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/las-25-contrasenas-mas-utilizadas-como-escoger-una-buena-contrasena\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1829"}],"version-history":[{"count":3,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1829\/revisions"}],"predecessor-version":[{"id":3713,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1829\/revisions\/3713"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}