麻豆蜜桃精品无码视频-麻豆蜜臀-麻豆免费视频-麻豆免费网-麻豆免费网站-麻豆破解网站-麻豆人妻-麻豆视频传媒入口

Set as Homepage - Add to Favorites

【eroticism of the 70s】A popular password manager screwed up, but there's an easy fix

Source:Global Perspective Monitoring Editor:synthesize Time:2025-07-03 12:43:07

Password managers are eroticism of the 70sa vital line of defense in the battle for internet security — which makes it all the more painful when they shit the bed.

The Kaspersky Password Manager (KPM), a free tool used to generate and manage online passwords, has long been a popular alternative to the likes of LastPass or 1Password. Unfortunately, according to security researcher Jean-Baptiste Bédrune, a bad coding decision meant that the passwords it generated weren't truly random and as a result were relatively easy to brute force — a hacking technique using specialized tools to try hundreds of thousands (or millions) of password combinations in an attempt to guess the right one.

Bédrune, who is a security researcher for the cryptocurrency hard-wallet company Ledger, writes that when generating a supposedly random password, KPM used the current time as its "single source of entropy."

While that sounds super technical, it essentially boils down to KPM using the time as the basis for its pseudo random number generator. Knowing when the password was generated, even approximately, would therefore give a hacker vital information in an attempt to crack a victim's account.

"All the passwords it created could be bruteforced in seconds," writes Bédrune.

Bédrune's team submitted the vulnerability to Kaspersky through HackerOne's bug bounty program in June of 2019, and Ledger's blog post says Kaspersky notified potentially affected users in October of 2020.

When reached for comment, Kaspersky confirmed — but downplayed — the problem identified by Bédrune.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

"This issue was only possible in the unlikely event that the attacker knew the user's account information and the exact time a password had been generated," wrote a company spokesperson. "It would also require the target to lower their password complexity settings."

Kaspersky also published a security advisory detailing the flaw in April of 2021.

"Password generator was not completely cryptographically strong and potentially allowed an attacker to predict generated passwords in some cases," read the alert. "An attacker would need to know some additional information (for example, time of password generation)."

That alert also noted that, going forward, the password manager had fixed the issue — a claim echoed by the spokesperson.

"The company has issued a fix to the product and has incorporated a mechanism that notifies users if a specific password generated by the tool could be vulnerable and needs changing."

SEE ALSO: Why you need a secret phone number (and how to get one)

So what does this mean for the average KPM user? Well, if they've been using the same KPM-generated passwords for over two years (a habit that would typically be fine), they should create new ones.

Other than that? Keep using a password manager and enable two-factor authentication.

Topics Cybersecurity

0.1582s , 10022.953125 kb

Copyright © 2025 Powered by 【eroticism of the 70s】A popular password manager screwed up, but there's an easy fix,Global Perspective Monitoring  

Sitemap

Top 主站蜘蛛池模板: 亚洲国产精品午夜电影 | 精品你懂的 | 不卡在线播放一 | 高潮喷水白浆精品女神网站 | 亚洲日韩一页精品发布 | 成人免费A片 喷 | 日韩久久综合 | 精品91 海角乱在线观看 | 成年人A片 | 天天看片手机在线电影 | 国产高清在线观看91了 | 国产热成一区二区精品 | 无码免费一区二区三区 | 欧美成年人视频 | 亚洲午夜视频 | 一区二区免费电影 | 国产福利在线看 | 午夜高清免费在线观看 | 三级片在线网站 | 精彩视频一区二区 | 国产亚洲精品久久久美女 | 最新欧美日韩在线 | 日韩人妻无码精品无码中文字 | 亚洲熟妇自拍偷拍 | 亚洲伦理一区二区三区 | 午夜福利麻| 激情五月婷婷 | 亚洲人成网线 | 欧美午夜精 | 午夜无码一区 | 国产中文亚洲日 | 日日日日做夜 | 国产三级片在线免费观看 | 午夜不卡影 | 日韩亚洲国产欧美在线看片 | 国产精品成人一区二区三区电影 | 亚洲国产日韩欧美综合字幕 | 午夜免费啪视 | 国产呦小泬泬一区二区三区视频 | 麻豆蜜桃红杏91含羞草 | 久久成人国产精 |