Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Post-Heartbleed: When Not To Change Your Password
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
4/30/2014 | 12:20:47 PM
Change passwords between sites, not over time.
Given the limited capacity of our wetware, better to put the effort into remembering a different password for each site, rather than having to remember a new password every few months.
dak3
50%
50%
dak3,
User Rank: Moderator
4/30/2014 | 12:55:55 PM
Re: Change passwords between sites, not over time.
Exactly. Tools like LastPass become very useful.
ChrisMurphy
50%
50%
ChrisMurphy,
User Rank: Strategist
4/30/2014 | 2:55:43 PM
Re: Change passwords between sites, not over time.
My phone has a 7-digit password, and I have to change it every few months. I'm running out of phone numbers to use.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/30/2014 | 3:23:22 PM
Re: Change passwords between sites, not over time.
My phone has a thumbprint scanner and I love it! Much better than trying to remember a different password for every site I visit. Three cheers for biometrics.
ChrisMurphy
50%
50%
ChrisMurphy,
User Rank: Strategist
4/30/2014 | 3:29:06 PM
Re: Change passwords between sites, not over time.
I would like that. Only problem i can see is I'll often ask my kids to check messages while I'm driving -- I can tell them my password, can't so easily pass them my thumb!  
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/30/2014 | 3:37:56 PM
Re: Change passwords between sites, not over time.
You can still enter the password manually! I had to figure that out when my husband borrowed my phone. No thumbs involved...
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2014 | 6:24:06 PM
Re: Change passwords between sites, not over time.
Also, to the end of a thumb print scanner I would be careful. I have the iPhone 5S and use the thumb print but I hear that there lies a security vulnerability within the Galaxy S5 thumbprint function. I'll have more details soon.
red-dot-black-circle
50%
50%
red-dot-black-circle,
User Rank: Apprentice
4/30/2014 | 8:34:53 PM
Re: Change passwords between sites, not over time.
If it comes down to having my password stolen or my thumbprint, I'll give up the password everytime.  Never underestimate the abilities of a truly motivated thief, especially if what you're protecting is truly valuable.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2014 | 9:10:08 PM
Re: Change passwords between sites, not over time.
Agreed.

And @Marilyn, to expand on my previous statement, after doing more research the vulnerability lies with Apple's touch print as well. However, the person would need a finger print mold such as with other touch print vulnerabilities so this is not specific to the mobile platforms. Though possible, it is a very detailed and therefore difficult attack vector.
dak3
50%
50%
dak3,
User Rank: Moderator
4/30/2014 | 10:59:08 PM
Re: Change passwords between sites, not over time.
There is no perfect security, unless you disconnect from the 'net
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...
CVE-2020-13758
PUBLISHED: 2020-06-01
modules/security/classes/general.post_filter.php/post_filter.php in the Web Application Firewall in Bitrix24 through 20.0.950 allows XSS by placing %00 before the payload.
CVE-2020-9291
PUBLISHED: 2020-06-01
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
CVE-2019-15709
PUBLISHED: 2020-06-01
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
CVE-2020-13695
PUBLISHED: 2020-06-01
In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.