Card fraud including shoulder surfing, card cloning, key logging
The differences between strong and weak passwords