• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • About
  • Contact
  • Subscribe
  • Advertise
methodshop

methodshop

tech news, reviews & how to's

  • Top Stories
  • Latest
  • Fun
  • Life
  • Learn

Home : Security : Jimmy Kimmel Demonstrates How Easy It Is To Social Engineer Passwords

Jimmy Kimmel Password Hacking
Image elements via TBIT

Jimmy Kimmel Demonstrates How Easy It Is To Social Engineer Passwords

In this video, Jimmy Kimmel makes social engineering passwords look easy. The show was able to expose confidential information and passwords from strangers.

January 25, 2019 by Joe Michaels
FacebookTweetPinLinkedIn
Table of Contents[Hide][Show]
  • Social Engineering Passwords On National TV
  • Exploiting Image Search and Facial Recognition
  • Our Most Common Passwords

Want to know someone’s password? All you have to do is ask. Just grab a camera, microphone and start interviewing people on the street. Apparently, they will just tell you their password as long as you have a microphone. Who knew social engineering passwords and confidential information was so easy?

Jimmy Kimmel Demonstrates How Easy It Is To Social Engineer Passwords … #Password #Passwords #Hackers #passwordhacking #identitytheft #privacy #socialengineering

Click To Tweet

Social Engineering Passwords On National TV

In this Jimmy Kimmel Live segment, the show was able to expose a handful of passwords and other confidential information in just a matter of minutes. How did they do it? They used a hacking technique called social engineering. In case you are unfamiliar with the term, social engineering is when someone uses deception and manipulation to obtain confidential or personal information for fraudulent purposes. Basically they just politely asked people questions until they had the information they needed. Some of the personal information that Jimmy Kimmel Live was able to obtain using this social engineering password cracking technique include names of pets and family members, birthdays, graduation dates and more.

Exploiting Image Search and Facial Recognition

From an online privacy perspective, here’s where things really start to get scary. We now know two things about the people interviewed in this Jimmy Kimmel Live segment: their passwords and what they look like. That’s all a hacker needs to start to unravel your life.

Jimmy Kimmel Uses Social Engineering To Get Strangers To Reveal Their Passwords on National TV

Click To Tweet

If you have someone’s photo, then you can use any number of free reverse image search services to run image searches and facial recognition scans. A photo people search will often return matches to someone’s social media profiles. For example, a Twitter account. Now the hacker knows one more thing about you, your Twitter username. In this example, a savvy hacker already has the username and password login credentials they need. Once they log in to your social media profile, they can then discover additional information about you, like your phone number and email address. At this point, it may be only a matter of time until your primary email account and even banking accounts are compromised.

Our Most Common Passwords

Of course, hackers might not even need to use phishing email or social engineering attacks to obtain a password. Cracking a password might be as easy as just guessing. In 2010, a data breach of one of Facebook‘s app developer partners exposed the account passwords of 32 million users around the world. One of the most interesting insights from the breach is how lazy we all are with our passwords. Here are the 10 most common passwords exposed in the breach:

  1. 123456
  2. 12345
  3. 123456789
  4. Password
  5. iloveyou
  6. princess
  7. rockyou
  8. 1234567
  9. 12345678
  10. abc123

Another thing worth pointing out, according to Jimmy Kimmel, the most common password in the United States is “password123”. At least that’s more secure than President Skroob‘s luggage combination from Spaceballs.


Related Posts:

  • Expert Mandolin Player Chris Thile Demonstrates Mandolin Shredding
    Expert Mandolin Player Chris Thile Demonstrates Mandolin…
  • The 10 Most Popular Passwords Revealed After Massive Data Breach
    The 10 Most Popular Passwords Revealed After Massive Data…
  • 7 Tips On How To Manage Online Passwords And Keep Your Data Safe From Hackers
    7 Tips On How To Manage Online Passwords And Keep Your Data…



FacebookTweetPinLinkedIn
Category: Security Tag: Facebook, facial recognition, Hacks, Image Search, jimmy kimmel, password, President Skroob, Social Engineering, Spaceballs, TV & Film, Twitter
Previous Post: « E-Cars: Electric & Hybrid Cars The 6 Best Environmentally Friendly Cars To Consider (2019)
Next Post: How The “Amen Break” Became The Most Sampled Drum Beat In Music History Drum Set »

Sidebar

Trending Now

  • 18 Weird Facts About Sea-Monkeys You Won't Believe Are True, Including Their Connection To The Ku Klux Klan18 Weird Facts About Sea-Monkeys You Won’t Believe Are True, Including Their…
  • 7 Pictures Of Naked People Captured By Google's Cameras7 Pictures Of Naked People Captured By Google’s Cameras
  • 20 Famous People Who Are Members Of The Sleepless Elite20 Famous People Who Are Members Of The Sleepless Elite
  • 25 Reasons Why Action Park Was The World's Most Dangerous Amusement Park25 Reasons Why Action Park Was The World’s Most Dangerous Amusement Park
  • The 30 Best Caddyshack Quotes That'll Make You LaughThe 30 Best Caddyshack Quotes That’ll Make You Laugh
  • 55 Funny Out Of Office Messages That Will Make Your Coworkers Smile55 Funny Out Of Office Messages That Will Make Your Coworkers Smile
  • 50+ Famous Happy Birthday Quotes From Notable Personalities50+ Famous Happy Birthday Quotes From Notable Personalities
  • How To Easily Create A PayPal Shipping Label Without InvoiceHow To Easily Create A PayPal Shipping Label Without Invoice
  • Fletch Quotes: 30 Of The Funniest Quotes From The Movie FletchFletch Quotes: 30 Of The Funniest Quotes From The Movie Fletch
  • How To Play The Original Oregon Trail Game Online For FreeHow To Play The Original Oregon Trail Game Online For Free

Categories

About

MethodShop’s mission is to entertain, inform, and sometimes gross you out. MethodShop has affiliate relationships, so we may get a small share of the revenue from your purchases. Items are sold by the retailer, not by us. All prices are subject to change.

Latest

Vintage Sexist Ads

The 28 Most Sexist Ads From The Mad Men Era Of Advertising

Alexa Music

15 Essential Music Commands For Amazon Alexa

Follow

  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest
MethodShop Animated Zoom Icon
  • About
  • Submit
  • Disclaimer
  • Privacy Policy
  • Contact
  • Subscribe
  • Store

Copyright © 2022 MethodShop · All Rights Reserved · Powered by BizBudding Inc.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT