Cybersecurity - Blue 789 News https://blue789news.online/tag/cybersecurity/ Latest News Updates Fri, 18 Oct 2024 15:37:17 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 ‘That must end’: U.S. government urges new practices as ransomware payments fuel endless cycle of cyberattacks https://blue789news.online/2024/10/18/that-must-end-u-s-government-urges-new-practices-as-ransomware-payments-fuel-endless-cycle-of-cyberattacks/ https://blue789news.online/2024/10/18/that-must-end-u-s-government-urges-new-practices-as-ransomware-payments-fuel-endless-cycle-of-cyberattacks/#respond Fri, 18 Oct 2024 15:37:17 +0000 https://blue789news.online/2024/10/18/that-must-end-u-s-government-urges-new-practices-as-ransomware-payments-fuel-endless-cycle-of-cyberattacks/ Anne Neuberger, deputy national security advisor for cyber and emerging technologies, speaks during a news conference in the James S.…

The post ‘That must end’: U.S. government urges new practices as ransomware payments fuel endless cycle of cyberattacks first appeared on Blue 789 News.

The post ‘That must end’: U.S. government urges new practices as ransomware payments fuel endless cycle of cyberattacks appeared first on Blue 789 News.

]]>

Anne Neuberger, deputy national security advisor for cyber and emerging technologies, speaks during a news conference in the James S. Brady Press Briefing Room at the White House in Washington, D.C., U.S., on Monday, May 10, 2021 amid the Colonial fuel pipeline ransomware attack.

Bloomberg | Bloomberg | Getty Images

With ransomware attacks surging and 2024 on track to be one of the worst years on record, U.S. officials are seeking ways to counter the threat, in some cases, urging a new approach to ransom payments.

Ann Neuberger, U.S. deputy national security adviser for cyber and emerging technologies, wrote in a recent Financial Times opinion piece, that insurance policies — especially those covering ransomware payment reimbursements — are fueling the very same criminal ecosystems they seek to mitigate. “This is a troubling practice that must end,” she wrote, advocating for stricter cybersecurity requirements as a condition for coverage to discourage ransom payments.

Zeroing in on cyber insurance as a key area for reform comes as the U.S. government scrambles to find ways to disrupt ransomware networks. According to the latest report by the Office of the Director of National Intelligence, by mid-2024 more than 2,300 incidents already had been recorded — nearly half targeting U.S. organizations — suggesting that 2024 could exceed the 4,506 attacks recorded globally in 2023.

Yet even as policymakers scrutinize insurance practices and explore broader measures to disrupt ransomware operations, businesses are still left to grapple with the immediate question when they are under attack: Pay the ransom and potentially incentivize future attacks or refuse and risk further damage.

For many organizations, deciding whether to pay a ransom is a difficult and urgent decision. “In 2024, I attended a briefing by the FBI where they continued to advise against paying a ransom,” said Paul Underwood, vice president of security at IT services company Neovera. “However, after making that statement, they said that they understand that it’s a business decision and that when companies make that decision, it is taking into account many more factors than just ethics and good business practices. Even the FBI understood that businesses need to do whatever it takes to get back to operations,” Underwood said.

The FBI declined to comment.

“There’s no black or white here,” said cybersecurity expert Bryan Hornung, CEO of Xact IT Solutions. “There’s so many things that go into play when it comes to making the decision on whether you’re even going to entertain paying the ransom,” he said.

The urgency to restore operations can push businesses into making decisions they may not be prepared for, as does the fear of increasing damage. “The longer something goes on, the bigger the blast radius,” Hornung said. “I’ve been in rooms with CEOs who swore they’d never pay, only to reverse course when faced with prolonged downtime.”  

In addition to operational downtime, the potential exposure of sensitive data — especially if it involves customers, employees, or partners — creates heightened fear and urgency. Organizations not only face the possibility of immediate reputational damage but also class-action lawsuits from affected individuals, with the cost of litigation and settlements in some cases far outweighing the ransom demand, and driving companies to pay just to contain the fallout.

“There are lawyers out there who know how to put together class-action lawsuits based on what’s on the dark web,” Hornung said. “They have teams that find information that’s been leaked — driver’s licenses, Social Security numbers, health information — and they contact these people and tell them it’s out there. Next thing you know, you’re defending a multimillion-dollar class-action lawsuit.”  

Ransom demands, data leaks, and legal settlements

A notable example is Lehigh Valley Health Network. In 2023, the Pennsylvania-based hospital refused to pay the $5 million ransom to the ALPHV/BlackCat gang, leading to a data leak affecting 134,000 patients on the dark web, including nude photos of about 600 breast cancer patients. The fallout was severe, resulting in a class-action lawsuit, which claimed that “while LVHN is publicly patting itself on the back for standing up to these hackers and refusing to meet their ransom demands, they are consciously and internationally ignoring the real victims.”

LVHN agreed to settle the case for $65 million.

Similarly, background-check giant National Public Data is facing multiple class-action lawsuits, along with more than 20 states levying civil rights violations and possible fines by the Federal Trade Commission, after a hacker posted NPD’s database of 2.7 billion records on the dark web in April. The data included 272 million Social Security numbers, as well as full names, addresses, phone numbers and other personal data of both living and deceased individuals. The hacker group allegedly demanded a ransom to return the stolen data, though it remains unclear whether NPD paid it.

What is clear, though, is that the NPD did not immediately report the incident. Consequently, its slow and incomplete response — especially its failure to provide identity theft protection to victims — resulted in a number of legal issues, leading its parent company, Jerico Pictures, to file for Chapter 11 on Oct. 2.

NPD did not to respond to requests for comment.

Darren Williams, founder of BlackFog, a cybersecurity firm that specializes in ransomware prevention and cyber warfare, is firmly against paying ransoms. In his view, paying encourages more attacks, and once sensitive data has been exfiltrated, “it is gone forever,” he said.

Even when companies choose to pay, there’s no certainty the data will remain secure. UnitedHealth Group experienced this firsthand after its subsidiary, Change Healthcare, was hit by the ALPHV/BlackCat ransom group in April 2023. Despite paying the $22 million ransom to prevent a data leak and quickly restore operations, a second hacker group, RansomHub, angry that ALPHV/BlackCat failed to distribute the ransom to its affiliates, accessed the stolen data and demanded an additional ransom payment from Change Healthcare. While Change Healthcare hasn’t reported if it paid, the fact that the stolen data was eventually leaked on the dark web indicates their demands most likely were not met.

The fear that a ransom payment may fund hostile organizations or even violate sanctions, given the links between many cybercriminals and geopolitical enemies of the U.S., makes the decision even more precarious. For example, according to a Comparitech Ransomware Roundup, when LoanDepot was attacked by the ALPHV/BlackCat group in January, the company refused to pay the $6 million ransom demand, opting instead to pay the projected $12 million to $17 million in recovery costs. The choice was primarily motivated by concerns about funding criminal groups with potential geopolitical ties. The attack affected around 17 million customers, leaving them unable to access their accounts or make payments, and in the end, customers still filed class-action lawsuits against LoanDepot, alleging negligence and breach of contract.

American companies are behind the curve in defending against cyber hacks, says Binary's David Kennedy

Regulatory scrutiny adds another layer of complexity to the decision-making process, according to Richard Caralli, a cybersecurity expert at Axio.

On the one hand, recently implemented SEC reporting requirements, which mandate disclosures about cyber incidents of material importance, as well as ransom payments and recovery efforts, may make companies less likely to pay because they fear legal action, reputational damage, or shareholder backlash. On the other hand, some companies may still opt to pay to prioritize a quick recovery, even if it means facing those consequences later.

“The SEC reporting requirements have certainly had an effect on the way in which organizations address ransomware,” Caralli said. “Being subjected to the consequences of ransomware alone is tricky to navigate with customers, business partners, and other stakeholders, as organizations must expose their weaknesses and lack of preparedness.” 

With the passage of the Cyber Incident Reporting for Critical Infrastructure Act, set to go into effect around October 2025, many non-SEC regulated organizations will soon face similar pressures. Under this ruling, companies in critical infrastructure sectors — which are often small and mid-sized entities — will be obligated to disclose any ransomware payments, further intensifying the challenges of handling these attacks.

Cybercriminals changing nature of data attack

As fast as cyber defenses improve, cybercriminals are even quicker to adapt.

“Training, awareness, defensive techniques, and not paying all contribute to the reduction of attacks. However, it is very likely that more sophisticated hackers will find other ways to disrupt businesses,” Underwood said.

A recent report from cyber extortion specialist Coveware highlights a significant shift in ransomware patterns.

While not an entirely new tactic, hackers are increasingly relying on data exfiltration-only attacks. That means sensitive information is stolen but not encrypted, meaning victims can still access their systems. It’s a response to the fact that companies have improved their backup capabilities and become better prepared to recover from encryption-based ransomware. The ransom is demanded not for recovering encrypted files but to prevent the stolen data from being released publicly or sold on the dark web.

New attacks by lone wolf actors and nascent criminal groups have emerged following the collapse of ALPHV/BlackCat and Lockbit, according to Coveware. These two ransomware gangs were among the most prolific, with LockBit believed to have been responsible for nearly 2,300 attacks and ALPHV/BlackCat over 1,000, 75% of which were in the U.S.

BlackCat executed a planned exit after pilfering the ransom owed to its affiliates in the Change Healthcare attack. Lockbit was taken down after an international law-enforcement operation seized its platforms, hacking tools, cryptocurrency accounts, and source codes. However, even though these operations have been disrupted, ransomware infrastructures are quickly rebuilt and rebranded under new names.

“Ransomware has one of the lowest barriers to entry for any type of crime,” said BlackFog’s Williams. “Other forms of crime carry significant risks, such as jail time and death. Now, with the ability to shop on the dark web and leverage the tools of some of the most successful gangs for a small fee, the risk-to-reward ratio is quite high.”

Making ransom a last resort

One point on which cybersecurity experts universally agree is that prevention is the ultimate solution.

As a benchmark, Hornung recommends businesses allocate between one percent and three percent of their top-line revenue toward cybersecurity, with sectors like health care and financial services, which handle highly sensitive data, at the higher end of this range. “If not, you’re going to be in trouble,” he said. “Until we can get businesses to do the right things to protect, detect, and respond to these events, companies are going to get hacked and we’re going to have to deal with this challenge.”

Additionally, proactive measures such as endpoint detection — a type of “security guard” on your computer that constantly looks for signs of unusual or suspicious activity and alerts you — or response and ransomware rollback, a backup feature that kicks in and will undo damage and get you your files back if a hacker locks you out of your system, can minimize damage when an attack occurs, Underwood said.

A well-developed plan can help ensure that paying the ransom is a last resort, not the first option.

“Organizations tend to panic and have knee-jerk reactions to ransomware intrusions,” Caralli said. To avoid this, he stresses the importance of developing an incident response plan that outlines specific actions to take during a ransomware attack, including countermeasures such as reliable data backups and regular drills to ensure that recovery processes work in real-world scenarios.

Hornung says ransomware attacks — and the pressure to pay — will remain high. “Prevention is always cheaper than the cure,” he said, “but businesses are asleep at the wheel.”

The risk is not limited to large enterprises. “We work with a lot of small- and medium-sized businesses, and I say to them, ‘You’re not too small to be hacked. You’re just too small to be in the news.'”

If no organization paid the ransom, the financial benefit of ransomware attacks would be diminished, Underwood said. But he added that it wouldn’t stop hackers.

“It is probably safe to say that more organizations that do not pay would also cause attackers to stop trying or perhaps try other methods, such as stealing the data, searching for valuable assets, and selling it to interested parties,” he said. “A frustrated hacker may give up, or they will try alternative methods. They are, for the most part, on the offensive.”



Новости Blue 789

The post ‘That must end’: U.S. government urges new practices as ransomware payments fuel endless cycle of cyberattacks first appeared on Blue 789 News.

The post ‘That must end’: U.S. government urges new practices as ransomware payments fuel endless cycle of cyberattacks appeared first on Blue 789 News.

]]>
https://blue789news.online/2024/10/18/that-must-end-u-s-government-urges-new-practices-as-ransomware-payments-fuel-endless-cycle-of-cyberattacks/feed/ 0 15219
Historic bitcoin theft tied to Connecticut kidnapping, luxury cars, $500K bar bills https://blue789news.online/2024/10/18/historic-bitcoin-theft-tied-to-connecticut-kidnapping-luxury-cars-500k-bar-bills/ https://blue789news.online/2024/10/18/historic-bitcoin-theft-tied-to-connecticut-kidnapping-luxury-cars-500k-bar-bills/#respond Fri, 18 Oct 2024 00:07:38 +0000 https://blue789news.online/2024/10/18/historic-bitcoin-theft-tied-to-connecticut-kidnapping-luxury-cars-500k-bar-bills/ Jakub Porzycki | NurPhoto via Getty Images Two young men accused of committing one of the largest person-to-person crypto thefts…

The post Historic bitcoin theft tied to Connecticut kidnapping, luxury cars, $500K bar bills first appeared on Blue 789 News.

The post Historic bitcoin theft tied to Connecticut kidnapping, luxury cars, $500K bar bills appeared first on Blue 789 News.

]]>

Jakub Porzycki | NurPhoto via Getty Images

Two young men accused of committing one of the largest person-to-person crypto thefts in U.S. history went on a brazen spending spree that included buying exotic cars and a $2 million wristwatch, renting mansions and running up nightclub tabs of hundreds of thousands of dollars apiece, new court records reveal.

The Aug. 18 cyber heist swindled a Washington, D.C., resident out of $230 million in cryptocurrency. To date, at least $100 million in bitcoin stolen from the victim remains unaccounted for, prosecutors said in a recent court filing in District of Columbia federal court.

Police now say that another crime, the mysterious Aug. 25 kidnapping of a Connecticut couple in broad daylight while they were house hunting, may be connected to the Washington crypto theft.

The couple was driving a Lamborghini they said was rented by their son at the time they were carjacked and abducted.

The accused kidnappers “targeted” the couple “because the co-conspirators believed the victims’ son had access to significant amounts of digital currency,” an indictment against the six defendants in that case says.

Those men, all from Florida, “planned to kidnap the victims … and hold the victims against their will at a house rented” by one of the men “and then demand payment in the form of digital currency from the son of [the couple] in return for the safety,” the indictment in Connecticut federal court says.

In addition to federal conspiracy and carjacking charges, the six men also face state criminal charges related to the kidnapping, which occurred a week after the heist of 4,100 bitcoins from the victim in Washington, D.C.

“I’ve never seen anything like this in 20 years,” Detective Sgt. Steven Castrovinci of the Danbury Police Department in Connecticut told CNBC.

The six Florida men charged in the kidnapping have not been charged in connection with the cryptocurrency theft. Nor has the unidentified son of the couple who was abducted.

“It’s amazing to see how this thing has grown legs,” Castrovinci said.

Danbury, Conn., police booking photos of suspects in Aug. 25, 2024, carjacking and kidnapping of local couple.

Source: Danbury Police Department

On Sept. 19, just a month after the crypto heist, the U.S. Attorney’s Office for the District of Columbia announced that the FBI had arrested two men — Malone Lam, 20, and Jeandiel Serrano, 21 — on conspiracy charges related to the alleged theft and subsequent laundering of the stolen bitcoin.

Serrano, who uses the online monikers “VersaceGod” and “@SkidStar,” was wearing a $500,000 watch at the time of his arrest in Los Angeles, where he lives, according to prosecutors.

Both men, who are being held without bail, admitted their role in the heist, prosecutors have said in court filings.

Serrano’s lawyer, Paulette Pagan, had no immediate comment on his case. CNBC has requested comment from a lawyer for Lam, a Singapore resident who had been living in L.A. and Miami after overstaying by months a visa waiver that allowed him to visit the U.S. as a tourist for just 90 days.

The scheme at the center of the bizarre case is “one of the largest cryptocurrency thefts from a private individual … in the history of the United States,” according to a federal court filing.

A cyber heist in Washington

A month before they were arrested, Serrano, Lam and other, unnamed, co-conspirators targeted a man in Washington “because they believed he held a considerable amount of virtual currency” after they “identified him as a high net-worth investor from the early days of cryptocurrency,” court filings say.

In early August, one co-conspirator caused an “unauthorized Google account access” notification to be sent to the victim, making it appear that the purported access attempts had occurred overseas, a court filing said.

“In reality, this was just the conspirators laying the groundwork for their imminent theft through sophisticated social engineering,” prosecutors wrote in a filing.

On Aug. 18, members of the conspiracy called the man, claiming they were from Google’s security team, and asking him about the recent unauthorized access attempts.

“Through a series of prompts and misrepresentations,” the co-conspirators managed to manipulate the man into giving them enough information to access his Google drive, “where they quickly located personal financial information, including the location of his virtual currency holdings with Gemini,” a crypto exchange, a filing said.

Serrano and other scheme participants then called the man back and Serrano posed as a member of Gemini’s support team, prosecutors said.

While he talked to the victim, Serrano and his co-conspirators were communicating with each other on the Discord and Telegram messaging apps, strategizing on ways to “manipulate the victim into providing private keys to his virtual currency holdings and enough computer access for the conspirators to steal his entire savings,” the filing said.

Screengrab of chat messages by alleged co-conspirators during August 2024 theft of $230 million in bitcoin of Washington, D.C. man.

United States District Court for the District of Columbia

The schemers then duped the man into downloading a program onto his computer to protect his Gemini holdings.

But the program actually gave the co-conspirators real-time access to the victim’s desktop, according to prosecutors.

“Serrano was eventually able to manipulate the victim into opening files with private keys
to over 4,100 Bitcoin,” the court filing said.

“While Serrano continued to manipulate the victim, his co-conspirator used this access to quickly steal the entirety of the victim’s virtual currency holdings.”

Prosecutors said the co-conspirators split the theft’s proceeds five ways.

The schemers then used “sophisticated money laundering techniques to hide the proceeds and mask their identities,” a court filing alleges.

Serrano created an account on TradeOgre.com and deposited $29 million worth of cryptocurrency, “believing it to be clean and successfully laundered,” the filing said.

A spending spree in Los Angeles

While he used a virtual private network, or VPN, to mask his location when he accessed his account, Serrano had failed to use a VPN when he created the account.

“Records from TradeOgre show that the account was created from an IP address registered to Serrano’s $47,500 per month rental home in Encino, California,” the filing said.

By the time Serrano was identified by federal authorities, “he was already out of the country, vacationing in the Maldives,” the filing said.

“Meanwhile, his co-conspirator Malone Lam was spending hundreds of thousands of dollars per night at Los Angeles night clubs and amassing an impressive collection of custom Lamborghinis, Ferraris, and Porsches,” prosecutors wrote.

Encino, California, home rented by Jeandiel Serrano, defendant in $230 million bitcoin theft case.

United States District Court for the District of Columbia

Lam, a Singapore native who was arrested in Miami after traveling there from Los Angeles on a private jet, was renting multiple homes in Miami, according to the filing.

One mansion he rented there cost $68,000 per month, the filing said.

Lam, who used the online handles “Anne Hathaway” and “$$$,” had also purchased a watch for $2 million, and a Lamborghini Revuelto for more than $1 million, prosecutors said.

But “many of Lam’s vehicles have not been located as of yet, such as his Pagani Huayra that he purchased for $3,800,000,” prosecutors wrote.

In all, Lam “admitted to purchasing 31 luxury automobiles, 22 of which have yet to be recovered by law enforcement,” prosecutors wrote.

Lam “also admitted to doing additional hacks and making millions from those separate cryptocurrency fraud schemes, which he states have supported his entire lifestyle since arriving in the United States in October 2023,” prosecutors wrote.

Luxury automobiles owned by Malone Lam, defendant in $230 million bitcoin theft case.

United States District Court for the District of Columbia

“The three vehicles Serrano admitted to purchasing have also not yet been located.”

Federal government surveillance captured Lam on “a spending spree of the victim’s assets,” which included sightings of him “at Los Angeles nightclubs … and gifting handbags valued at tens of thousands of dollars,” a court filing says.

Management at L.A. nightclubs told investigators that Lam tried to pay his tabs in cryptocurrency “and was spending approximately $400,000-$500,000 per night,” the filing said. One receipt from an L.A. club showed Lam spent “$569,528.39 in one night,” the filing said.

After Serrano was arrested at Los Angeles International Airport on Sept. 18, when he returned from the Maldives with his girlfriend, an FBI agent interviewed that woman, who denied knowledge of Serrano’s involvement in crimes, according to a court filing.

“The interviewing FBI Agent told her that the only way to make the situation worse would be for her to call Serrano’s associates and tip them off to the arrest,” the filing noted.

“Immediately after leaving the interview, Serrano’s girlfriend promptly called his criminal associates, tipped them off to his arrest, and these associated in turn deleted their Telegram accounts and all incriminating evidence included in saved chats,” the filing said.

“To date, approximately $70,000,000 has been recovered or frozen on various exchanges,” prosecutors wrote in a court filing.

“Even considering the millions of dollars that Serrano and his co-conspirators spent on automobiles and jewelry, well over $100,000,000 remains unaccounted for.”

Serrano had about $20 million of the victim’s stolen bitcoin on his phone, and agreed to transfer those funds back to the FBI, according to a court filing.

A kidnapping in Connecticut

On Aug. 25, three weeks before Serrano and Lam were arrested, police in Danbury received multiple 911 calls reporting the abduction of a couple.

Court records and Castrovinci said the victims were driving a 2024 Lamborghini Urus, which they said had been rented by their son, when they were rear-ended by a white Honda Civic.

A work van then cut in front of the Lamborghini, and a half-dozen or so men wearing black masks surrounded the car.

The perpetrators pulled the two victims out of the car. The husband resisted, and the kidnappers punched him in the face and hit him with a baseball bat, authorities said.

“The suspects repeatedly told [the couple] that they would ‘kill them,'” FBI Agent Matthew Loucks wrote in an affidavit supporting a criminal complaint against the alleged kidnappers filed in U.S. District Court in Connecticut.

“The victims were pushed into the back of the work van and held down. The suspects then bound both victims’ arms and feet with silver duct tape, which they also used to cover [the husband’s] face. The suspects forced [his wife] to lie face down and ordered her not to look at them,” according to Loucks’ affidavit.

“The couple heard police sirens shortly after the van began moving, and heard one of the suspects yell, ‘Call Rick … we are in deep s—,'” according to the FBI agent. Shortly afterward, the van crashed and the suspects fled on foot, leaving the victims behind.

Police arrested four suspects later that day, and two more the following day. All six suspects are from the Miami area.

The couple, who were briefly hospitalized after the incident, had no idea why they had been targeted in the kidnapping, Castrovinci told CNBC.

“They kept asking us, ‘Why?'” Castrovinci said.

A family connection

Danbury police were already familiar with the couple who were abducted, Castrovinci said, because their home had been targeted by “swatting” calls.

Swatting is the practice of calling police and falsely reporting that a crime is occurring at someone else’s residence or business, often causing police to descend upon that location.

Read more CNBC politics coverage

Castrovinci said they had suspected the swatting calls were being made by people who knew the couple’s son from his online gaming.

The Danbury News-Times first reported Oct. 11 that Danbury police had planned to interview the couple’s son but held off at the request of the FBI.

“We were contacted by the FBI and told there’s an ongoing investigation into the son in regards to a cryptocurrency theft that occurred,” Castrovinci told the newspaper.

“That’s how we knew — and even at that time, we didn’t really know to what extent he was involved in it. We just knew that there was an investigation into him regarding a crypto heist,” he said.

“I don’t know how (the six Florida men) knew this kid had that type of money, but everything leads to them going after the parents because of what this kid was involved in,” he told the newspaper.

A spokesman for the U.S. Attorney’s Office in Connecticut declined to comment when asked about the possible connection between the carjacking and kidnapping of the couple, and their son’s potential role in the August crypto heist.

The U.S. Attorney’s Office in the District of Columbia did not immediately respond to requests for comment.



Новости Blue 789

The post Historic bitcoin theft tied to Connecticut kidnapping, luxury cars, $500K bar bills first appeared on Blue 789 News.

The post Historic bitcoin theft tied to Connecticut kidnapping, luxury cars, $500K bar bills appeared first on Blue 789 News.

]]>
https://blue789news.online/2024/10/18/historic-bitcoin-theft-tied-to-connecticut-kidnapping-luxury-cars-500k-bar-bills/feed/ 0 14857
The best password manager for 2024 https://blue789news.online/2024/10/14/the-best-password-manager-for-2024/ https://blue789news.online/2024/10/14/the-best-password-manager-for-2024/#respond Mon, 14 Oct 2024 09:00:37 +0000 https://blue789news.online/2024/10/14/the-best-password-manager-for-2024/ Think about your digital footprint. How many accounts have you created online since you first started using the internet? How…

The post The best password manager for 2024 first appeared on Blue 789 News.

The post The best password manager for 2024 appeared first on Blue 789 News.

]]>

Think about your digital footprint. How many accounts have you created online since you first started using the internet? How many of those use the same passwords, so you have an easier time logging in? It’s a habit we’ve all fallen into, but it greatly weakens our ability to stay secure online. Just one password leak can compromise dozens of accounts.

Password managers can help you break that habit. It’ll do the tedious work of creating and storing various passwords to up your security posture without testing your memorization skills. But there are dozens of password managers available now — that’s why we tested out nine of the best services available now to help you choose the right one for your needs. 1Password remains our top pick for the best password manager, thanks to its zero-knowledge policy, numerous security features and general ease of use, but there are other top password managers out there to consider as well.

1Password

Number of tiers: 4 | Pricing: $3/month for Individual, $5/month for Families, $20/month for Teams Starter Pack, $8/month per user for Business | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Brave, Edge, Command Line

Many security experts trust 1Password with their private information and, after testing it out, it’s clear why. The service includes industry standard encryption, a “secret key” that only you know on top of your master password, a zero-knowledge policy that means it keeps no data, and other security features like frequent audits, two-factor authentication and a bug bounty program. That said, 1Password did fall victim to a recent cybersecurity incident that’s worth noting. 1Password detected suspicious activity on its Okta instance, but an investigation “concluded that no 1Password user data was accessed.” 1Password now also supports passkeys, which are credentials stored in your most used devices that are protected by biometric authentication (like fingerprints or facial recognition) or PINs.

1Password has a pretty intuitive user interface across its desktop and mobile apps. A tutorial at download helps you import passwords from other managers onto 1Password so that you don’t feel like you’re starting over from scratch. It also clearly rates the strength of each password and has an “open and fill” option in the vault so that you can get into your desired site even more quickly. We also liked the user-friendly option to scan a set up code to easily connect your account to your mobile devices without too much tedious typing.

At $3 per month, the individual subscription comes with unlimited passwords, items and one gigabyte of document storage for your vault. It also lets you share passwords, credit card information and other saved credentials. If you upgrade to the family plan for $5 each month, you’ll get to invite up to five people (plus more for $1 each per month) to be a part of the vault.

Pros

  • Zero-knowledge policy
  • Intuitive user interface
  • Available across most platforms

$3 at 1Password

Bitwarden

Number of tiers: 3 | Pricing: Free, $3/month per user for Teams Organization, $5/month per user for Enterprise Organization | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Brave, Edge, Vivaldi, Opera, Tor, DuckDuckGo for Mac, Command Line

Bitwarden’s free plan includes unlimited passwords on an unlimited number of devices, which is more than we’ve seen from some of its competitors. There are drawbacks like you can only share vault items with one other user, but we think that’s a fair tradeoff.

Bitwarden is based on open-source code, meaning anyone on GitHub can audit it, which is a good measure of security. On a personal level, it includes security audits of your information, like a data breach report, that can keep you in the know about when your passwords have been leaked and when it’s time to change them. Plus, it’s widely available across the platforms we tested, including Windows and iOS, with a level of customization, options to access your password vault and more. It also recently added passkeys to its vault and two-factor authentication options as a secure way to sign in.

Bitwarden may be the best free password manager, but it does have a paid version and we do think it’s worth it. At $10 annually for individuals or $40 for families, you unlock encrypted file storage, emergency access, unlimited sharing and more additional features. But the free version comes with the basics that can get anyone set up on password management easily.

Pros

  • Robust free version
  • Based on open-source code
  • Available across a wide variety of platforms
Cons

  • Free version can only share a vault with one other user

$0 at Bitwarden

NordPass

Number of tiers: 3 | Pricing: Free, $2/per month for Premium, $4/month for Family | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Opera, Edge

Across password managers we tested, cross-platform availability was relatively similar. Most are widely available across web browsers and different operating systems, including our other top picks on this list. But we wanted to give a nod to NordPass here because of how easy the service makes it to access your vault from any platform while keeping your data safe. NordPass even lets you use biometric data to sign in now, like your fingerprints or face, making it even easier to get into accounts across devices.

NordPass has a free option with unlimited passwords and syncs across devices. A $2-per-month premium plan keeps you logged in when switching devices, comes with security notifications and allows for item sharing. A family subscription comes with six premium accounts and only costs $4 per month. This makes it an excellent budget option as well. Besides the pairing code to connect accounts, NordPass is a pretty standard password manager. Scanning a code gets me from my laptop to mobile device to work computer super easily. If you’re constantly switching devices and those extra few seconds save your sanity, it’s worth considering.

Pros

  • Available across a wide variety of platforms
  • Relatively affordable
  • Allows for biometric logins

$2 at NordPass

Dashlane

Number of tiers: 4 | Pricing: Free, $3/month for Advanced, $5/month for Premium, $7/month for Friends and Family | Compatibility: macOS, iOS, Android, Chrome, Firefox, Safari, Brave, Edge, Opera

Dashlane has four subscription options: A free user gets access to a single device with unlimited passwords; an advanced user pays $3 per month to get upgraded to unlimited devices and dark web monitoring; for $5 per month, a premium user also gets VPN access and an $7.49-per-month family plan includes access for up to 10 subscribers.

It met all the criteria we looked for, but with a clear emphasis on sharing credentials. Dashlane highlights “secure sharing” starting at its free level, which is a functionality that some competitors keep behind a paywall. Other free features, however, recently took a hit. Dashlane limited the number of passwords users of the free version could store. Access for up to 10 members in a family plan is one of the bigger plans we’ve seen as well. While we were testing it, password sharing seemed front of mind with a tab dedicated to it in Dashlane’s browser extension. Arguably the biggest caveat here, though, is lack of Linux support.

Pros

  • Easy to securely share information with others
  • Free version includes robust sharing features
Cons

  • Free version supports a limited number of passwords
  • No Linux support

$3 at Dashlane

It seems counterintuitive to store all your sensitive information in one place. One hack could mean you lose it all to an attacker and struggle for months or even years to rebuild your online presence, not to mention you may have to cancel credit cards and other accounts. But most experts in the field agree that password managers are a generally secure and safe way to keep track of your personal data, and the benefits of strong, complex passwords outweigh the possible risks.

The mechanics of keeping those passwords safe differs slightly from provider to provider. Generally, you have a lengthy, complex “master password” that safeguards the rest of your information. In some cases, you might also get a “security key” to enter when you log in to new devices. This is a random string of letters, numbers and symbols that the company will send you at sign up. Only you know this key, and because it’s stored locally on your device or printed out on paper, it’s harder for hackers to find.

These multiple layers of security make it difficult for an attacker to get into your vault even if your password manager provider experiences a breach. But the company should also follow a few security basics. A “zero-knowledge” policy means that the company keeps none of your data on file, so in the event of an attack, there’s nothing for hackers to find. Regular health reports like pentests and security audits are essential for keeping companies up to par on best practices, and other efforts like bug bounty programs or hosting on an open source website encourage constant vigilance for security flaws. Most password managers now also offer some level of encryption falling under the Advanced Encryption Standard (AES). AES 256-bit is the strongest, because there are the most number of possible combinations, but AES 128-bit or 192-bit are still good.

You likely already use a password manager, even if you wouldn’t think to call it that. Most phones and web browsers include a log of saved credentials on the device, like the “passwords” keychain in the settings of an iPhone. That means you’ve probably seen the benefits of not having to memorize a large number of passwords or even type them out already.

While that’s a great way in, the downfall of these built-in options are that they tend to be device specific. If you rely on an Apple password manager, for example, that works if you’re totally in the Apple ecosystem — but you become limited once you get an Android tablet, Lujo Bauer, professor of electrical and computer engineering, and of computer science, at Carnegie Mellon University, said. If you use different devices for work and personal use and want a secure option for sharing passwords with others, or just don’t want to be tied to one brand forever, a third-party password manager is usually worth it.

We tested password managers by downloading the apps for each of the nine contenders on iPhone, Android, Safari, Chrome and Firefox. That helped us better understand what platforms each manager was available on, and see how support differs across operating systems and browsers.

As we got set up with each, we took note of ease of use and how they iterated on the basic features of autofill and password generators. Nearly all password managers have these features, but some place limits on how much you can store while others give more control over creating easy-to-type yet complex passwords. From there, we looked at extra features like data-breach monitoring to understand which managers offered the most for your money.

Finally, we reviewed publicly available information about security specs for each. This includes LastPass, which more experts are shying away from recommending after the recent breach. For the sake of this review, we’ve decided not to recommend LastPass at this time as fallout from the breach still comes to light (The company disclosed a second incident earlier this year where an unauthorized attack accessed the company’s cloud storage, including sensitive data. Since then, hackers have stolen more than $4.4 million in cryptocurrency using private keys and other information stored in LastPass vaults.)

These are the password managers we tested:

For a while, security experts considered LastPass a solid choice for a password manager. It’s easy to use, has a slew of helpful extra features and its free version gives you a lot. But we decided not to include LastPass in our top picks because of the high profile data breaches it has experienced over the past couple of years.

Keeper met a lot of the basic criteria we tested for, like autofill options and cross-platform availability. We liked its family plan options, too, that can keep your whole household secure. But we didn’t think its extra features, like the encrypted messaging app, added much value. Plus, it has a self-destruct feature after five incorrect login attempts which, despite adding extra protection, could be a recipe for disaster for casual users.

Enpass works well as an affordable password manager. That includes an inflation-beating “lifetime” access pass instead of a monthly payment for users really committed to the service. Still, it was confusing to set up across devices and because Enpass stores data locally, as opposed to in the cloud, we struggled to get started with it on mobile.

A familiar name in security, we were excited to test out Norton’s password manager. While it’s free, its features seem underdeveloped. It lacked password sharing, account recovery and complex form-filing tools that come standard in many of the other password managers we tested.

LogMeOnce comes with a wide range of premium tiers, from professional to family, that include different levels of storage and features. But when we tested, it lacked some basic cross-platform availability that other password managers had already, like compatibility with Mac and Safari.

Using a password manager can enhance your online security. They store all of your complex passwords and autofill them as needed, so that you can have unique, good passwords across the web without remembering each of them yourself. In many cases, unique passwords are your first defense against attack, and a reliable manager makes it easier to keep track of them all.

Password managers are a secure way to store your credentials. Experts in the field generally agree that the benefits of accessibility when storing complex passwords outweigh the possibility of attack, like what happened with LastPass. But with any service, it can vary from provider to provider. You should look out for zero-knowledge policies, regular security audits, pentests, bug bounty programs and encryption when choosing the right secure password manager for you.

Think of password managers like virtual safe deposit boxes. They hold your valuables, in this case usually online credentials, in a section of the vault only accessible to you by security key or a master password. Most of these services have autofill features that make it convenient to log in to any site without needing to remember every password you have, and they keep your credit card information close for impulse purchases.

But given that passwords are one of the top ways to keep your online identity secure, the real value of password managers is staying safe online. “It’s just not possible without a password manager to have unique, long and hard-to-guess passwords,” Florian Schaub, an associate professor of information and of electrical engineering and computer science at the University of Michigan, said.

Common guidance states that secure passwords should be unique, with the longest number of characters allowed and uppercase letters, lowercase letters, numbers and special characters. This is the exact opposite of using one password everywhere, with minor variations depending on a site’s requirements. Think of how many online accounts and sites you have credentials for — it’s an impossible task to remember it all without somewhere to store passwords safely (especially in instances when you need to create a new password for any given account). Password managers are more readily accessible and offer the benefit of filling in those long passwords for you.

Given their universal benefit, pretty much everyone could use a password manager. They’re not just for the tech-savvy people or businesses anymore because so much sensitive information ends up online behind passwords, from our bank accounts to our Netflix watch history.

That’s the other perk of password managers: safe password sharing. Families, friends or roommates can use them to safely access joint accounts. Texting a password to someone isn’t secure, and you can help your family break the habit by starting to use one yourself, Lisa Plaggemier, executive director at National Cyber Security Alliance, said. Streaming is the obvious use case, but consider the shared bills, file storage and other sites you share access with the people around you as well.

Forgetting a master password won’t necessarily lock you out for good, but the recovery process varies from provider to provider. Some services give you a “security key” at sign up to enter when you log into new devices. It can also be used to securely recover your account because it’s a random string of keys stored locally that only you have access to. Other services, however, have no way to recover your vault. So creating a master password that you won’t forget is important.

A good master password should be unique, with the longest number of characters allowed and uppercase letters, lowercase letters, numbers and special characters. Experts often recommended thinking of it like a “passphrase” instead of a “password” to make it easier to remember. For example, you can take a sentence like “My name is Bob Smith” and change it to “Myn@m3isB0b5m!th” to turn it into a secure master password that you won’t forget.

A passkey is a sort of digital identification that’s interlocked to your account on a given app or website. While that sounds like a password, there’s an important distinction: Passkeys are bilateral authenticators that have two separate components: a private key stored locally on your device and a public key belonging to the website or application. When logging in with a passkey, these two keys pair and give you access to your account. You can read more about passwords versus passkeys here.



Новости Blue 789

The post The best password manager for 2024 first appeared on Blue 789 News.

The post The best password manager for 2024 appeared first on Blue 789 News.

]]>
https://blue789news.online/2024/10/14/the-best-password-manager-for-2024/feed/ 0 13201