Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

10 Top Password Managers
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 5   >   >>
User Rank: Apprentice
3/27/2014 | 8:10:54 AM
re: 10 Top Password Managers
Password Depot deserves to be on top 10 list of password managers. I have been using it since a very long time now and it works great! I wonder why it was not included in this list. It provides so many features such as Security, Easy to Use, Easy to Understand, Clear Interface, Easy Pasword Generation, Facility to save personal Info, Super customer service, not only does it Import password list from other formats but also imports TAN lists...etc., I can go on and on about this tool because its a fantastic tool providing many features one can imagine. 

I think this link can explain much better about the features I mentioned above --> http://www.password-depot.com/overview.htm



User Rank: Apprentice
3/20/2014 | 2:06:02 AM
This article
LOL at the ELEVEN pages it took to write this article. You think I'm gonna click on 11 pages just to see a top 10 list of password managers? FFS, just put the article on ONE page. Won't be back.
User Rank: Apprentice
3/13/2014 | 10:15:40 PM
An alternative password manager
Try "Intuitive Password". It's a comprehensive online password manager that meets your needs. There is a free version available.
User Rank: Apprentice
2/19/2014 | 1:28:52 AM
re: 10 Top Password Managers
Thanks for your recommendation, Efficient Password Manager is really an excellent program! You deserve to own! http://www.efficientsoftware.net/passwordmanager/
User Rank: Apprentice
12/18/2013 | 1:10:52 AM
re: 10 Top Password Managers
I want to recommend Efficient Password Manager which is freeware yet very powerful. You only need to remember one password from now on. You can see more info at: http://www.efficientsoftware.net/passwordmanager/
User Rank: Apprentice
12/8/2013 | 5:23:00 AM
re: 10 Top Password Managers
PassVault is a easy and powerful app to manage password in a very reliable and secure way. Store in a cipher database all your passwords for Web, email, Social Media, Banking accounts, etc.
- All your data is fully encrypted with a strong, password-based, government-grade 256-bit AES cipher. This way your information is protected from unauthorized access by thieves, hackers and malware.
- FREE and without Ads.
- Backup your database to your favorite services (Google Drive, Dropbox, etc)

User Rank: Apprentice
11/28/2013 | 7:42:40 PM
Password Manager & Safe
I think, in article misses one interesting password manager - Sticky Password.

It is for PC and mobile too. (Google Play). On Google Play is free.
User Rank: Apprentice
10/5/2013 | 8:01:58 AM
re: 10 Top Password Managers
The description of SplashID safe is misleading as it confuses two different products. The basic SplashID safe requires no hardware and works in a similar way to the other products described. The image and description refer to SplashID Key Safe. Though the text does also mention mobile and desktop - where it does require installation.
User Rank: Apprentice
9/19/2013 | 9:47:09 PM
re: 10 Top Password Managers
Tried several, but, have settled on 1Password. Works seamlessly on every platform I own.
User Rank: Apprentice
9/12/2013 | 5:42:59 PM
re: 10 Top Password Managers
Thanks for the additional app ideas, all. We'll keep our eyes on doing a follow up. Let me know any other choices that should be considered.
<<   <   Page 2 / 5   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-12-07
Hidden functionality vulnerability in multiple Buffalo network devices allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and ea...
PUBLISHED: 2022-12-07
Authentication bypass vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to bypass authentication and access the device. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN fir...
PUBLISHED: 2022-12-07
Authentication bypass using an alternate path or channel vulnerability in bingo!CMS version1.7.4.1 and earlier allows a remote unauthenticated attacker to upload an arbitrary file. As a result, an arbitrary script may be executed and/or a file may be altered.
PUBLISHED: 2022-12-07
Improper neutralization of special elements used in an LDAP query ('LDAP Injection') vulnerability in ActiveDirectory and Sharepoint ActiveDirectory authority connectors of Apache ManifoldCF allows an attacker to manipulate the LDAP search queries (DoS, additional queries, filter manipulation) durin...
PUBLISHED: 2022-12-07
Use of hard-coded credentials vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to alter?configuration settings of the device. The affected products/versions are as follows: WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600...