Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Heartbleed: A Password Manager Reality Check
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/18/2014 | 4:34:38 PM
Re: RoboForm Password Manager
Ditto on your questions, Ryan. I know people who swear by password managers, but I wonder if it is as simple and easy to manager as people say...
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/18/2014 | 3:12:38 PM
Re: RoboForm Password Manager
For those of you who use a password manager I have a few questions. Does the password manager act as a single sign-on? Meaning that they will automatically log you into the portal based on a splash page. Also, I imagine they use some type of complex algorithm to generate your passwords but then you have to remember these complex passwords everywhere you go. So my question to the previous statement is does the password manager go onto multiple devices? The reason I ask is, if my password is changing after a certain amount of time and is complex as soon as I move away from the device with the password manager. If I do not have the manager on the other device there is a decent chance I might not remember it due to the complexity. Someone please shead some light on these questions. Thanks,
itsec9987
50%
50%
itsec9987,
User Rank: Apprentice
4/18/2014 | 1:43:02 PM
RoboForm Password Manager
I couldn't agree more that it is essential to have a password manager to not only create unique passwords, but to safely store and remember them for you as well.  I have been using RoboForm for about five years now, after trying out a few others, and I absolutely love it!  It even has a safe notes section to store additional information securly and I only have to remember one password now which makes my life so much easier. 
anon5030740074
50%
50%
anon5030740074,
User Rank: Apprentice
4/18/2014 | 10:33:51 AM
Why Password Management is a Must
Now enterprise companies have a new password management to choose from.  Ilantus Password Express can be deployed in a cloud or on-premise mode.  Learn more at http://ilantusexpress.com/ and get a free 30 day trial.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19551
PUBLISHED: 2021-09-21
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
CVE-2020-19553
PUBLISHED: 2021-09-21
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
CVE-2021-40847
PUBLISHED: 2021-09-21
The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by ...
CVE-2021-41084
PUBLISHED: 2021-09-21
http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`&Atilde;&yen;), Header values (`Header.value`), Status r...
CVE-2021-23443
PUBLISHED: 2021-09-21
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.