Earlier this year we wrote about password-management tools that let you use encrypted passwords to prevent strangers from accessing your data.
But it discovered that the attackers may have stolen user names, email addresses and encrypted passwords belonging to 250, 000 users.
Twitter said that user names, encrypted passwords and e-mail addresses for as many as 250, 000 users were potentially grabbed by the hackers.
It said user names, email addresses and encrypted passwords were accessed.
As part of the spree of data breaches that the loose hacker movement Anonymous is calling AntiSec, the group announced Monday that it had penetrated a server belonging to the defense contractor Booz Allen Hamilton and released what it claims are 90, 000 military email addresses, encrypted passwords and an assortment of data related to other companies and government networks.
FORBES: Anonymous Hackers Breach Booz Allen Hamilton, Dump 90,000 Military Email Addresses
Twitter's own systems were hacked earlier this year, with attackers gaining access to usernames as well as encrypted and randomized passwords for about 250, 000 users.
The charges against Lewys Martin, 20, also relate to the theft and use of personal data and failing to disclose passwords to encrypted equipment.
BBC: Lewys Martin of Kent faces Oxbridge cyber attack charges
Unique among the tools mentioned below, 1Password allows users to store passwords in encrypted files on their hard drive meaning hackers can't find them by breaking into a website.
The passwords themselves were encrypted, meaning they couldn't be read without breaking the secret code that protected them.
That local data still needs to be encrypted and protected by strong passwords.
FORBES: SAPVoice: Goodbye Norton: in Post-PC Era, Need For Antivirus Software Wanes
After that, they can forget them all those different passwords are safely stored in an encrypted file on the user's computer.
Every cyber-criminal dreams about users on unsecured Wi-Fi networks, typing passwords into non-secure websites, and visiting domains that may not be encrypted.
应用推荐