Finding passwords saved in Chrome is surprisingly easy, Google security lead sees no issue

Finding passwords saved in Chrome is surprisingly easy

Most browsers will ask if you want your passwords saved so when you’re next jumping around the web, logging into sites is that bit easier. Of course, you’d like think those passwords are squirreled away where no one can dig them up, but in Chrome they’re pretty easy to find. As highlighted by software developer Elliott Kember recently, getting access to the list of saved passwords requires only that you point the browser at “chrome://settings/passwords” (or simply find the password management option in advanced settings) and click on one of the saved entries. A small “show” button will then appear next to the hidden password — hit that and it’ll be revealed.

Calling this a major security flaw, as some have, is obviously a tad sensationalistic. Nevertheless, recent attention has shown that making saved password access so simple is a concern for some. Several other browsers give users the option to protect that list with a master password, but Chrome does not — even if you sign out of the browser, data linked to your Google account remains visible on that computer. Justin Schuh, Chrome security tech lead, has responded to internet chatter on the topic, saying that once past the OS login stage, someone can theoretically find your passwords and all manner of other browser info out anyway, using various underhand means. His statement isn’t likely to calm those who’d like to see their passwords more secure, but perhaps the fact people are talking will force Google to consider some changes.

Update: This post has been edited with some additional context and commentary.

Filed under: ,

Comments

Via: Business Insider

Source: Elliott Kember

Finding passwords saved in Chrome is surprisingly easy

Finding passwords saved in Chrome is surprisingly easy

Most browsers will ask if you want your passwords saved so when you’re next jumping around the web, logging into sites is that much easier. Of course, you’d like think those passwords are squirreled away where no one can dig them up, but in Chrome it’s actually very easy to find them. As highlighted by software developer Elliott Kember, getting access to the list of saved passwords requires only that you point the browser at “chrome://settings/passwords” (or simply find the password management option in advanced settings) and click on one of the saved entries. A small “show” button will then appear next to the hidden password — hit that and it’ll be revealed. Justin Schuh, Chrome security tech lead, has responded to various comments on this, saying that once someone’s gotten past the OS login stage, they could theoretically find your passwords and all manner of other info out anyway, using various underhand means. No doubt the attention this is bound to receive will force an update from Google that actually hides users’ passwords. Until then, keep your laptop away from any malicious friends that, given half the chance, would wreak havoc to your Facebook account.

Filed under: ,

Comments

Via: Business Insider

Source: Elliott Kember

A hack has exposed the e-mail addresses and login details for every registered user of the Ubuntu Fo

A hack has exposed the e-mail addresses and login details for every registered user of the Ubuntu Forums—that’s almost 2 million accounts. Time to change your password.

Read more…

    

Tumblr for iOS receives critical security update, users urged to change passwords

Tumblr for iOS receives critical security update, users urged to change passwords

A fresh version of Tumblr just hit iOS devices less than a week ago, but now the Yahoo-owned service is pushing out a newer release with “a very important security update.” Not only is the outfit recommending that users download the tweaked app immediately, but it’s also asking folks to change their password on Tumblr and on any other service they use the same passphrase. There’s no mention of a breach or exactly what the new code patches up, but we’ll keep you in the proverbial loop as we learn more.

Update: We’ve gotten word from Tumblr that it was notified of a security vulnerability and immediately dispatched the update to remedy the issue. Hit the break to read the outfit’s entire statement.

Comments

Via: The Next Web

Source: Tumblr, iTunes

PSA: You can now use your Amazon account to log into Lovefilm

PSA You can now use your Amazon account to log into LOVEFiLM

You might be able to knock one password off your list, as you now have the option to log in to your Lovefilm account using Amazon credentials. The changeover is part of the online retail giant’s recently announced Login With Amazon initiative, intended to let you use a universal ID for its other websites or those of third party developers. To switch, you’ll need to follow the link at the source and enter both your Lovefilm and Amazon details, and may need to re-enter payment info as well. The company promised that your private data will remain “completely safe,” and said that any rental lists, bookmarks, viewing history and watchlists will stay put. On the off-chance you’re on Lovefilm but don’t have an Amazon account, the company wouldn’t be adverse to your creating one at the same time, in case you fancy physical disc media to go along with the streaming variety. That’s not the only change Lovefilm users may notice however, as the service has rolled out versions of its next generation streaming app — first seen on the PS3 — for the Xbox 360 as well as Sony Bravia TVs, Blu-ray players and home theater systems.

Filed under: , , ,

Comments

Source: Lovefilm

Researchers able to predict iOS-generated hotspot passwords in less than a minute

Anyone who’s tried to tether to their iPhone or iPad will recall how iOS manages to craft its own passwords when used as a personal hotspot. The aim is to ensure that anyone sharing a data connection will get some degree of security, regardless of whether or not they tinker with the password themselves. However, three researchers from FAU in Germany have now worked the structure behind these auto-generated keys — a combination of a short English word and a series or random numbers — and managed to crack that hotspot protection in under a minute. To start, the word list contains about 52,500 entries, and once the testers were able to capture a WiFi connection, they used an AMD Radeon HD 6990 GPU to cycle through all those words with number codes, taking just under 50 minutes to crack with rote entry. Following that, they realized that only a small subset (just 1,842) of the word list was being used.

With an even faster GPU — a cluster of four AMD Radeon HD 7970s — they got the hotspot password cracking time to 50 seconds. The Friedrich-Alexander University researchers added that unscrupulous types could use comparable processing power through cloud computing. “System-generated passwords should be reasonably long, and should use a reasonably large character set. Consequently, hotspot passwords should be composed of completely random sequences of letters, numbers, and special characters,” says the report, which outlines the trade-off between security and usability. However, as ZDNet notes, Apple’s cycled password approach still offers more protection than static options found elsewhere. Check out the full paper at the source.

Filed under: , , ,

Comments

Via: ZDNet

Source: Department of Computer Science, Friedrich-Alexander University (PDF)

Biostamps: You’ll Never Be Without Your Password Again

If you can’t remember your passwords no matter how hard you try, then you might find the concept of Biostamps interesting. It’s Motorola’s idea of an alternative to the traditional password or pin code by doing away with them completely.

Biostamps can be described as a tattoo of sorts that contains flexible electronic circuits.

Biostamps

These circuits will send a signal to your phone to unlock it or give you access, eliminating the need to enter any codes or passwords. The phone will only work if it’s within range of the tattoo, ensuring that no one else but its rightful owner can use it or access the data stored in it.

The tattoos are being developed by Massachusetts engineering firm MC10.

[via The Telegraph via Dvice]

Passwords Of The Future Require You To Make A Funny Face

Think you’ve got a mean funny face that nobody else can replicate? Good, as that is what Google wants to use for future passwords.

Like It , +1 , Tweet It , Pin It Original content from Ubergizmo.

    

Motorola Considers Pills, Tattoos To Allow You To Become A Walking Password

Motorola is coming up with a way for you to wear a tattoo or swallow a pill to help authenticate your passwords.

Like It , +1 , Tweet It , Pin It Original content from Ubergizmo.

    

Amazon announces new ‘Login with Amazon’ service for apps, games and websites (video)

Amazon announces new 'Login with Amazon' service for apps, games and websites video

In an effort to reducing keyboard wear-and-tear, Amazon is opening up its own login service to both app developers and websites. Login With Amazon taps into your account credentials to login, with the ability to even share parts of your profile through apps, games and sites. It uses the retailer’s existing trusted sign-in security and has already been tested on both Zappos and Woot, with both trials apparently noting “significant” pickup from customers. The service is free to use and if you’re thinking of adding it to your own site (and tapping into those 200 million registered Amazon users), you can find all the technical details at the source — or a gentler explanation in a video after the break.

Filed under: ,

Comments

Source: Amazon (1), (Login with Amazon)