{"id":1560,"date":"2011-01-15T18:18:15","date_gmt":"2011-01-15T18:18:15","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1560"},"modified":"2020-05-07T04:16:56","modified_gmt":"2020-05-07T04:16:56","slug":"25-most-used-passwords-revealed-is-yours-one-of-them","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/","title":{"rendered":"25 Most Used Passwords Revealed: Is Yours One Of Them?"},"content":{"rendered":"\n<p>After it was discovered that more than <a href=\"https:\/\/www.theverge.com\/2012\/6\/7\/3071707\/linkedin-hack-six-million-passwords-leaked\">six million LinkedIn passwords <\/a>had been leaked as well as many at Last.fm and eHarmony, no one has stopped talking about password and pass-code security. Here is a list of top 25 most used passwords,<\/p>\n\n\n\n<p>That&#8217;s actually a good thing because it&#8217;s an incredibly important topic that many computer users don&#8217;t take seriously.<\/p>\n\n\n\n<p> Here are the top 25 most used passwords,<\/p>\n\n\n\n<p> &#8216;password&#8217;, <\/p>\n\n\n\n<p>&#8216;123456&#8217;, <\/p>\n\n\n\n<p>&#8216;12345678&#8217;,<\/p>\n\n\n\n<p> &#8216;1234&#8217;, <\/p>\n\n\n\n<p>&#8216;qwerty&#8217;, <\/p>\n\n\n\n<p>&#8216;12345&#8217;, <\/p>\n\n\n\n<p>&#8216;dragon&#8217;,<\/p>\n\n\n\n<p> &#8216;pussy&#8217;,<\/p>\n\n\n\n<p> &#8216;baseball&#8217;, <\/p>\n\n\n\n<p>&#8216;football&#8217;, <\/p>\n\n\n\n<p>&#8216;letmein&#8217;,<\/p>\n\n\n\n<p> &#8216;monkey&#8217;,<\/p>\n\n\n\n<p> &#8216;696969&#8217;,<\/p>\n\n\n\n<p> &#8216;abc123&#8217;,<\/p>\n\n\n\n<p> &#8216;mustang&#8217;,<\/p>\n\n\n\n<p> &#8216;michael&#8217;, <\/p>\n\n\n\n<p>&#8216;shadow&#8217;,<\/p>\n\n\n\n<p> &#8216;master&#8217;,<\/p>\n\n\n\n<p> &#8216;jennifer&#8217;,<\/p>\n\n\n\n<p> &#8216;111111&#8217;,<\/p>\n\n\n\n<p> &#8216;2000&#8217;,<\/p>\n\n\n\n<p> &#8216;jordan&#8217;,<\/p>\n\n\n\n<p> &#8216;superman&#8217;, <\/p>\n\n\n\n<p>&#8216;harley&#8217;, <\/p>\n\n\n\n<p>&#8216;1234567&#8217;.<\/p>\n\n\n\n<p>Is yours one of them? If so, it&#8217;s safe to say you should consider changing it to something stronger immediately.\u00a0<\/p>\n\n\n\n<p><em><a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Professional<\/a> includes a database of the top 500 common passwords in use today and will display a warning if you use one of them.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After it was discovered that more than six million LinkedIn passwords had been leaked as well as many at Last.fm and eHarmony, no one has stopped talking about password and pass-code security. Here is a list of top 25 most used passwords, That&#8217;s actually a good thing because it&#8217;s an incredibly important topic that many &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\"> <span class=\"screen-reader-text\">25 Most Used Passwords Revealed: Is Yours One Of Them?<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1567,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,26],"tags":[27,29,30],"class_list":["post-1560","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-security-alerts","tag-password","tag-privacy","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-15T18:18:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-07T04:16:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png\" \/>\n\t<meta property=\"og:image:width\" content=\"538\" \/>\n\t<meta property=\"og:image:height\" content=\"218\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"25 Most Used Passwords Revealed: Is Yours One Of Them?\",\"datePublished\":\"2011-01-15T18:18:15+00:00\",\"dateModified\":\"2020-05-07T04:16:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\"},\"wordCount\":154,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png\",\"keywords\":[\"password\",\"Privacy\",\"Security\"],\"articleSection\":[\"Data Protection\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\",\"name\":\"25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png\",\"datePublished\":\"2011-01-15T18:18:15+00:00\",\"dateModified\":\"2020-05-07T04:16:56+00:00\",\"description\":\"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png\",\"width\":538,\"height\":218,\"caption\":\"Most used passwords\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"25 Most Used Passwords Revealed: Is Yours One Of Them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog","description":"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/","og_locale":"en_US","og_type":"article","og_title":"25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog","og_description":"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them","og_url":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/","og_site_name":"Kruptos Security Blog","article_published_time":"2011-01-15T18:18:15+00:00","article_modified_time":"2020-05-07T04:16:56+00:00","og_image":[{"width":538,"height":218,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png","type":"image\/png"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"25 Most Used Passwords Revealed: Is Yours One Of Them?","datePublished":"2011-01-15T18:18:15+00:00","dateModified":"2020-05-07T04:16:56+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/"},"wordCount":154,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png","keywords":["password","Privacy","Security"],"articleSection":["Data Protection","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/","url":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/","name":"25 Most Used Passwords Revealed: Is Yours One Of Them? - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png","datePublished":"2011-01-15T18:18:15+00:00","dateModified":"2020-05-07T04:16:56+00:00","description":"25 Most Used Passwords Revealed: Is Yours One Of Them? Kruptos 2 Pro includes top 500 common passwords in use today and will warn you if use one of them","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2010\/12\/weakpassword.png","width":538,"height":218,"caption":"Most used passwords"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/25-most-used-passwords-revealed-is-yours-one-of-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"25 Most Used Passwords Revealed: Is Yours One Of Them?"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1560"}],"version-history":[{"count":4,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1560\/revisions"}],"predecessor-version":[{"id":2243,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1560\/revisions\/2243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1567"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}