{"id":38039,"date":"2020-11-05T15:45:08","date_gmt":"2020-11-05T15:45:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/"},"modified":"2020-11-05T15:45:08","modified_gmt":"2020-11-05T15:45:08","slug":"after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/","title":{"rendered":"After Cummings&#8217; Barnard Castle trip, cheeky Britons started using the word &#8216;vision&#8217; in their passwords"},"content":{"rendered":"<p>Britons began using the word &#8220;vision&#8221; in their passwords after <a target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/52828076\" rel=\"noopener noreferrer\">prime ministerial advisor Dominic Cummings<\/a> was caught travelling across the country from his parents&#8217; farm in Durham to Barnard Castle &#8220;to test&#8221; his eyesight, according to research from Pen Test Partners (PTP).<\/p>\n<p>Not only that but the words &#8220;covid&#8221;, &#8220;corona&#8221; and \u201clockdown\u201d all increased in popularity over time, according to the infosec biz.<\/p>\n<p>&#8220;We have an in-house developed software product called Papa that is used by our consultants, as well as our customers, to perform password audits of Windows domains. Papa can identify base words that are used within an organisation, and see how that trend changes over time,&#8221; PTP said in a post <a target=\"_blank\" href=\"https:\/\/www.pentestpartners.com\/security-blog\/password-choice\/\" rel=\"noopener noreferrer\">explaining<\/a> its findings.<\/p>\n<div class=\"CaptionedImage Center\" readability=\"9\"><a href=\"https:\/\/regmedia.co.uk\/2020\/11\/05\/shutterstock_barnard_castle.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/11\/05\/shutterstock_barnard_castle.jpg?x=648&amp;y=324&amp;infer_y=1\" alt=\"barnard castle\" title=\"barnard castle\" height=\"324\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Standard test for eyesight as per Dominic Cummings: Taking your wife and four year old child on an full hour&#8217;s drive to a castle, stopping at the &#8220;riverbank&#8221;&#8230;<\/p>\n<\/div>\n<p>Intriguingly, the use of the word &#8220;computer&#8221; in passwords declined substantially from peaks seen in October and November 2019, something PTP attributed to people associating the word with the desktop machines seen in their workplaces.<\/p>\n<p>Meanwhile, passwords based on the word itself (&#8220;password&#8221;) remained vastly more popular than other popular words this year, with PTP warning: &#8220;If you try &#8220;Password1&#8243; against every user on a large domain, there is a good chance you&#8217;d compromise a domain account. It&#8217;s just that common a mistake.&#8221;<\/p>\n<p>Password hygiene is one of those reliable staples of infosec that never goes away. Earlier this year password manager firm Logmein reckoned that two-thirds of people <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/05\/05\/logmein_password_survey\/\" rel=\"noopener noreferrer\">simply recycle the same password or use variations on a basic theme<\/a> (passw0rd, p4ssword, p455w0rd, etc), a finding that sits uneasily against the National Cyber Security Centre\u2019s advice <a target=\"_blank\" href=\"https:\/\/www.ncsc.gov.uk\/collection\/passwords\/updating-your-approach\" rel=\"noopener noreferrer\">not to bother expiring users&#8217; passwords<\/a> &#8211; though the spy agency offshoot&#8217;s logic is that regular expiry of old passwords merely encourages users to recycle variations of the old one when setting a new one.<\/p>\n<p>&#8220;Regular password changing harms rather than improves security. Many systems will force users to change their password at regular intervals, typically every 30, 60 or 90 days. This imposes burdens on the user and there are costs associated with recovering accounts,&#8221; said NCSC.<\/p>\n<p>Otherwise, use of a password manager product to generate and store reasonably secure passwords is the standard industry advice. Failing that, NCSC advocates the <a target=\"_blank\" href=\"https:\/\/xkcd.com\/936\/\" rel=\"noopener noreferrer\">three unique words<\/a> method, as popularised by web comic XKCD.<\/p>\n<p>Passwords themselves aren&#8217;t much good without multi-factor authentication backing them up, though, as US president Donald Trump <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/10\/23\/trump_twitter_account_no_mfa\/\" rel=\"noopener noreferrer\">may or may not have learned<\/a> earlier this year. Concerningly, though, some orgs still reckon <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/05\/07\/thales_password_survey\/\" rel=\"noopener noreferrer\">passwords alone are sufficient<\/a> for securing their networked kingdoms. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/11\/05\/passwords_ptp_study_vision_dominic_cummings\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>That was still dwarfed by clods using &#8216;password&#8217; itself, though Britons began using the word &#8220;vision&#8221; in their passwords after prime ministerial advisor Dominic Cummings was caught travelling across the country from his parents&#8217; farm in Durham to Barnard Castle &#8220;to test&#8221; his eyesight, according to research from Pen Test Partners (PTP).\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38040,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>After Cummings&#039; Barnard Castle trip, cheeky Britons started using the word &#039;vision&#039; in their passwords 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"After Cummings&#039; Barnard Castle trip, cheeky Britons started using the word &#039;vision&#039; in their passwords 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T15:45:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"After Cummings&#8217; Barnard Castle trip, cheeky Britons started using the word &#8216;vision&#8217; in their passwords\",\"datePublished\":\"2020-11-05T15:45:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/\"},\"wordCount\":459,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/\",\"name\":\"After Cummings' Barnard Castle trip, cheeky Britons started using the word 'vision' in their passwords 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg\",\"datePublished\":\"2020-11-05T15:45:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg\",\"width\":648,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"After Cummings&#8217; Barnard Castle trip, cheeky Britons started using the word &#8216;vision&#8217; in their passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"After Cummings' Barnard Castle trip, cheeky Britons started using the word 'vision' in their passwords 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/","og_locale":"en_US","og_type":"article","og_title":"After Cummings' Barnard Castle trip, cheeky Britons started using the word 'vision' in their passwords 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-05T15:45:08+00:00","og_image":[{"width":648,"height":324,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"After Cummings&#8217; Barnard Castle trip, cheeky Britons started using the word &#8216;vision&#8217; in their passwords","datePublished":"2020-11-05T15:45:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/"},"wordCount":459,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/","url":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/","name":"After Cummings' Barnard Castle trip, cheeky Britons started using the word 'vision' in their passwords 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg","datePublished":"2020-11-05T15:45:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords.jpg","width":648,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/after-cummings-barnard-castle-trip-cheeky-britons-started-using-the-word-vision-in-their-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"After Cummings&#8217; Barnard Castle trip, cheeky Britons started using the word &#8216;vision&#8217; in their passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38039"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38039\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38040"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}