Set as Homepage - Add to Favorites

精品东京热,精品动漫无码,精品动漫一区,精品动漫一区二区,精品动漫一区二区三区,精品二三四区,精品福利导航,精品福利導航。

【vintage eroticism】A popular password manager screwed up, but there's an easy fix

Password managers are vintage eroticisma vital line of defense in the battle for internet security — which makes it all the more painful when they shit the bed.

The Kaspersky Password Manager (KPM), a free tool used to generate and manage online passwords, has long been a popular alternative to the likes of LastPass or 1Password. Unfortunately, according to security researcher Jean-Baptiste Bédrune, a bad coding decision meant that the passwords it generated weren't truly random and as a result were relatively easy to brute force — a hacking technique using specialized tools to try hundreds of thousands (or millions) of password combinations in an attempt to guess the right one.

Bédrune, who is a security researcher for the cryptocurrency hard-wallet company Ledger, writes that when generating a supposedly random password, KPM used the current time as its "single source of entropy."

While that sounds super technical, it essentially boils down to KPM using the time as the basis for its pseudo random number generator. Knowing when the password was generated, even approximately, would therefore give a hacker vital information in an attempt to crack a victim's account.

"All the passwords it created could be bruteforced in seconds," writes Bédrune.

Bédrune's team submitted the vulnerability to Kaspersky through HackerOne's bug bounty program in June of 2019, and Ledger's blog post says Kaspersky notified potentially affected users in October of 2020.

When reached for comment, Kaspersky confirmed — but downplayed — the problem identified by Bédrune.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

"This issue was only possible in the unlikely event that the attacker knew the user's account information and the exact time a password had been generated," wrote a company spokesperson. "It would also require the target to lower their password complexity settings."

Kaspersky also published a security advisory detailing the flaw in April of 2021.

"Password generator was not completely cryptographically strong and potentially allowed an attacker to predict generated passwords in some cases," read the alert. "An attacker would need to know some additional information (for example, time of password generation)."

That alert also noted that, going forward, the password manager had fixed the issue — a claim echoed by the spokesperson.

"The company has issued a fix to the product and has incorporated a mechanism that notifies users if a specific password generated by the tool could be vulnerable and needs changing."

SEE ALSO: Why you need a secret phone number (and how to get one)

So what does this mean for the average KPM user? Well, if they've been using the same KPM-generated passwords for over two years (a habit that would typically be fine), they should create new ones.

Other than that? Keep using a password manager and enable two-factor authentication.

Topics Cybersecurity

0.1174s , 9922.96875 kb

Copyright © 2025 Powered by 【vintage eroticism】A popular password manager screwed up, but there's an easy fix,Info Circulation  

Sitemap

Top 主站蜘蛛池模板: 国产中文字幕高清在线观看 | 狠狠色噜噜狠狠狠 | 日韩欧美亚洲中文字幕 | 国产大片91精品免费观看 | 中文国产日韩欧美二视频 | 精品视频在线观看免费无码 | 东京热一区无码视频 | 99精品与95优品 | 久久久久成人 | 91精品久久详情在线观看 | 久久精品图片 | 中文字幕精品视频在线观看 | 久久国产亚洲精品av香蕉 | 毛片内射-百度 | 国产亚洲一区二区手机在线观看 | 美女丝袜av一区二区三区 | 91精品婷婷国产综合一区二区 | 国产熟女aa级毛片www古代片 | 亚洲欧美国产一区二区三区 | 中文字幕亚洲无码在线 | 成人AV免费网址在线观看 | aⅴ无码国产在线看 | 精品亚洲人伦一区二区三区 | av资源每日更新网站在 | 亚洲美女黄免费a | 欧美日韩制服一区二区 | 久久久久久尹人网香蕉 | 久久久精品国产sm最大网站 | 欧美日本高清视频一本通 | 丁香婷婷深情五月亚洲 | 国产亚洲欧洲日韩综合v | 日韩国产欧美精品在线 | 亚洲一卡2卡3卡4卡5卡新国色天香 | 亚洲精品久久久久久久久久久 | 99久久无码午夜体验区 | 精品婷婷色久一区二区三区 | 免费韩国一卡二卡三卡四卡 | 精品国产亚洲一区二区三区在线观看 | 欧美成人a片在线乱码视频久久久久久人妻一区二区三区 | 久久国产精品免费一区六九堂 | 波多野结衣在线视频观看 |