{"id":75553,"date":"2014-01-20T11:36:08","date_gmt":"2014-01-20T10:36:08","guid":{"rendered":"http:\/\/onsoftware.softonic.fr\/?p=75553"},"modified":"2025-06-12T12:15:48","modified_gmt":"2025-06-12T11:15:48","slug":"2014-01-20-pire-mot-de-passe-2013","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/fr\/2014-01-20-pire-mot-de-passe-2013\/","title":{"rendered":"Et le pire mot de passe de l&#8217;ann\u00e9e 2013 est d\u00e9cern\u00e9 \u00e0&#8230;"},"content":{"rendered":"<p>Comme chaque ann\u00e9e, Splashdata, une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e en applis et logiciels de s\u00e9curit\u00e9, a dress\u00e9 son palmar\u00e8s des pires mots de passe. Et cette ann\u00e9e, c&#8217;est le mot de passe &#8220;123456&#8221; qui a \u00e9t\u00e9 \u00e9lu. Il d\u00e9tr\u00f4ne ainsi le fameux &#8220;password&#8221; vainqueurs lors des pr\u00e9c\u00e9dentes \u00e9ditions.<\/p>\n<p>Pour \u00e9tablir son classement, Splashdata a utilis\u00e9 les bases de  donn\u00e9es mises en ligne apr\u00e8s les diff\u00e9rentes cyberattaques qui ont eu lieu en 2013 (dont la c\u00e9l\u00e8bre attaque d&#8217;Adobe).<\/p>\n<p>Les pires mots de passe sont \u00e9videmment les plus connus et malheureusement les plus utilis\u00e9s.On y retrouve &#8220;querty&#8221;, &#8220;azerty&#8221;, &#8220;iloveyou&#8221; ou encore les suites de chiffres &#8220;123456789&#8221;.<\/p>\n<p>Si vous reconnaissez l&#8217;un de vos mots de passe dans cette liste, nous vous conseillons fortement de le changer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-75557\" title=\"Palmar\u00e8s mot de passe 2013\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/9\/2014\/01\/Palmar\u00e8s-mot-de-passe-2013.jpg\" alt=\"\" width=\"269\" height=\"526\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2014\/01\/Palmar\u00e8s-mot-de-passe-2013.jpg 269w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/9\/2014\/01\/Palmar\u00e8s-mot-de-passe-2013-268x524.jpg 268w\" sizes=\"auto, (max-width: 269px) 100vw, 269px\" \/><\/p>\n<p>Souce: <a href=\"http:\/\/splashdata.com\/press\/worstpasswords2013.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Splashdata<\/a><\/p>\n<h3><strong>\u00c0 lire aussi:<\/strong><\/h3>\n<ul>\n<li><a title=\"Qu'est-ce que la validation en deux \u00e9tapes et pourquoi l\u2019utiliser d\u00e8s maintenant ?\" href=\"http:\/\/articles.softonic.fr\/2013-04-26-quest-ce-que-la-verification-en-deux-etapes-et-pourquoi-lutiliser-des-mainte\" target=\"_self\" rel=\"noopener noreferrer\">Qu&#8217;est-ce que la validation en deux \u00e9tapes et pourquoi l\u2019utiliser d\u00e8s maintenant ?<\/a><\/li>\n<li><a title=\"Comment bien choisir son mot de passe?\" href=\"http:\/\/articles.softonic.fr\/comment-bien-choisir-ses-mots-de-passe\" target=\"_self\" rel=\"noopener noreferrer\">Comment bien choisir son mot de passe?<\/a><\/li>\n<li><a title=\"Quels seront les virus et antivirus du futur?\" href=\"http:\/\/articles.softonic.fr\/2013-09-05-virus-et-antivirus-du-futur\" target=\"_self\" rel=\"noopener noreferrer\">Quels seront les virus et antivirus du futur?<\/a><\/li>\n<li><a title=\"Alternatives \u00e0 Google : 5 moteurs de recherche anonymes et s\u00e9curis\u00e9s\" href=\"http:\/\/articles.softonic.fr\/2013-08-01-alternatives-google-4-moteurs-de-recherche-anonymes-securises\" target=\"_self\" rel=\"noopener noreferrer\">Alternatives \u00e0 Google : 5 moteurs de recherche anonymes et s\u00e9curis\u00e9s<\/a><\/li>\n<li><a title=\"Surveillance d'Internet: 10 solutions pour prot\u00e9ger sa vie priv\u00e9e sur le web\" href=\"http:\/\/articles.softonic.fr\/2013-07-21-surveillance-internet-10-solutions-proteger-sa-vie-privee-web\" target=\"_self\" rel=\"noopener noreferrer\">Surveillance d&#8217;Internet: 10 solutions pour prot\u00e9ger sa vie priv\u00e9e sur le web<\/a><\/li>\n<li><a title=\"Nos derni\u00e8res infos sur PRISM\" href=\"http:\/\/actualites.softonic.fr\/b\/prism\" target=\"_self\" rel=\"noopener noreferrer\">Nos derni\u00e8res informations sur l&#8217;affaire PRISM<\/a><\/li>\n<li><a title=\"Les moteurs de recherche anti-Google\" href=\"http:\/\/articles.softonic.fr\/duckduckgo-et-startpage-les-moteurs-de-recherche-anti-google\" target=\"_self\" rel=\"noopener noreferrer\">DuckDuckGo et Startpage : les moteurs de recherche anti-Google<\/a><\/li>\n<li><a title=\"Gmail et Yahool Mail peuvent-ils lire vos emails\" href=\"http:\/\/articles.softonic.fr\/2013-06-04-confidentialite-gmail-et-yahoo-peuvent-lire-vos-emails\" target=\"_self\" rel=\"noopener noreferrer\">Confidentialit\u00e9: Gmail et Yahoo! peuvent-ils lire vos emails?<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Comme chaque ann\u00e9e, Splashdata, une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e en applis et logiciels de s\u00e9curit\u00e9, a dress\u00e9 son palmar\u00e8s des pires mots de passe. Et cette ann\u00e9e, c&#8217;est le mot de passe &#8220;123456&#8221; qui a \u00e9t\u00e9 \u00e9lu. Il d\u00e9tr\u00f4ne ainsi le fameux &#8220;password&#8221; vainqueurs lors des pr\u00e9c\u00e9dentes \u00e9ditions. Pour \u00e9tablir son classement, Splashdata a utilis\u00e9 les bases &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/fr\/2014-01-20-pire-mot-de-passe-2013\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Et le pire mot de passe de l&#8217;ann\u00e9e 2013 est d\u00e9cern\u00e9 \u00e0&#8230;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":8020,"featured_media":73963,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1],"tags":[687,689],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-75553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-mot-de-passe","tag-password"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/75553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/users\/8020"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/comments?post=75553"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/75553\/revisions"}],"predecessor-version":[{"id":165018,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/75553\/revisions\/165018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media\/73963"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media?parent=75553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/categories?post=75553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/tags?post=75553"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/usertag?post=75553"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/vertical?post=75553"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/content-category?post=75553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}