Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Euronews
Euronews
Oceane Duboust

How long could it take a hacker to crack one of your passwords in 2025?

An eight-character-long password made of numbers can be cracked instantly, according to the IT firm Hive Systems.

Every year, the company releases its password table, which displays the time needed to hack a password using the best consumer-accessible hardware.

It ran its test against passwords, encrypted with the method used on most websites. In this case, it was bcrypt, which was the most widespread, according to the data from previous breaches.

But this encryption isn’t infallible and can be worked backwards.

Overall, the longer and the more complex the passwords, the longer it takes to crack them, with the most complex eight-character passwords taking 164 years.

On the other hand, passwords of six characters or under can all be hacked within two weeks.

It should be noted that the passwords tested by Hive Systems are also randomly generated.

If a password has been previously stolen, uses dictionary words, or has been reused between websites, the time needed to crack it drops dramatically, as shown below.

Password table if your password has been previously stolen, uses dictionary words, or if you reuse it between websites. (Password table if your password has been previously stolen, uses dictionary words, or if you reuse it between websites.)

New safety features are increasingly required

If you want to test the strength of your passwords, the website How secure is my password?, as the name suggests, can tell you if you need to change it.

While longer passwords offer better protection, managing them can be a challenge, which is why password managers that securely store and encrypt login credentials are a popular solution.

In addition, a password manager favours using unique, complex logins that limit the security exposure in case of a data breach.

Even if your password is weak, websites usually have security features to prevent hacking using brute force, like limiting the number of trials.

Portals leading to sensitive information also often use an additional layer of security, such as two-factor authentication, to prevent fraud.

While frequent password changes were previously advised, experts now emphasise creating strong, unique passwords and sticking with them unless they are compromised.

This approach is considered more effective than frequent modifications, which can lead to weaker passwords and the reuse of similar ones.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.