Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
6 Ways Passwords Fail Basic Security Tests
Newest First  |  Oldest First  |  Threaded View
boholuxe
0%
100%
boholuxe,
User Rank: Strategist
11/7/2020 | 1:05:39 PM
Re: Password managers can be hacked
Password manager means that password is stored on some thid party server. Does not sound like very safe
TravisEcc
50%
50%
TravisEcc,
User Rank: Apprentice
10/29/2020 | 6:27:45 PM
Re: Password managers can be hacked
Yes they can but the better ones do encryption on the device.
Also some level of protection is better than none.
Considering most users have 3-5 Social media accounts, at least 1 bank account, at least one email, not to mention government services, mobile logins, work logins, online shopping, insurance accounts, home computer that makes 11 at a minimum.
Statistics show most users have 1 password protecting 5+ accounts.
A password manager, implemented properly, with MFA is better than reuse or simple passwords relied on by memory.
semitad
0%
100%
semitad,
User Rank: Strategist
10/28/2020 | 4:58:59 PM
Password managers can be hacked
I understand the need to manage passwords in some way, but as with all security, the more convenient something is, the less secure it is. With the breach at LastPass not long ago, many are reluctant to put all their eggs in a basket in the cloud. Writing passwords in a notebook is scoffed at, but a paper notebook can't be hacked over the internet. I always tell people to use what works for them. Some people love online password managers, others love writing them down, and still others just have a great memory. Everyone is different and should use what works best for them. 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25159
PUBLISHED: 2020-11-24
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
CVE-2020-25654
PUBLISHED: 2020-11-24
An ACL bypass flaw was found in pacemaker before 1.1.24-rc1 and 2.0.5-rc2. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went throu...
CVE-2020-28329
PUBLISHED: 2020-11-24
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
CVE-2020-29053
PUBLISHED: 2020-11-24
HRSALE 2.0.0 allows XSS via the admin/project/projects_calendar set_date parameter.
CVE-2020-25640
PUBLISHED: 2020-11-24
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.