Technologies
What LastPass Subscribers Need to Do After the Latest Breach
Following the latest breach, you might want to find a new password manager.

LastPass, one of the world’s most popular password managers, is yet again under the microscope after its latest security breach.
In late December, LastPass CEO Karim Toubba acknowledged that a security incident the company first disclosed in August had ultimately paved the way for an unauthorized party to steal customer account information and vault data. This is the latest in a lengthy string of security incidents involving LastPass that date back to 2011.
It’s also the most alarming.
An unauthorized party now has access to unencrypted subscriber account information like LastPass usernames, company names, billing addresses, email addresses, phone numbers and IP addresses, according to Toubba. That same unauthorized party also has a copy of customer vault data, which includes unencrypted data like website URLs and encrypted data like the usernames and passwords for all the sites customers have saved in their vaults. If you’re a LastPass subscriber, the severity of this breach should have you looking for a different password manager because your passwords and personal data are at risk of being exposed.
What should LastPass subscribers do?
The company didn’t specify how many users were affected by the breach, and LastPass didn’t respond to CNET’s request for additional comment on the breach. But if you’re a LastPass subscriber, you need to operate under the assumption that your user and vault data are in the hands of an unauthorized party with ill intentions. Though the most sensitive data is encrypted, the problem is that the threat actor can run «brute force» attacks on those stolen local files. LastPass estimates it would take «millions of years» to guess your master password — if you’ve followed its best practices.
If you haven’t — or if you just want total peace of mind — you’ll need to spend some serious time and effort changing your individual passwords. And while you’re doing that, you’ll probably want to transition away from LastPass, too.
With that in mind, here’s what you need to do right now if you’re a LastPass subscriber:
1. Find a new password manager. Given LastPass’ history with security incidents and considering the severity of this latest breach, now’s a better time than ever to seek an alternative.
2. Change your most important site-level passwords immediately. This includes passwords for anything like online banking, financial records, internal company logins and medical information. Make sure these new passwords are strong and unique.
3. Change every single one of your other online passwords. It’s a good idea to change your passwords in order of importance here too. Start with changing the passwords to accounts like email and social media profiles, then you can start moving backward to other accounts that may not be as critical.
4. Enable two-factor authentication wherever possible. Once you’ve changed your passwords, make sure to enable 2FA on any online account that offers it. This will give you an added layer of protection by alerting you and requiring you to authorize each login attempt. That means even if someone ends up obtaining your new password, they shouldn’t be able to gain access to a given site without your secondary authenticating device (typically your phone).
5. Change your master password. Though this doesn’t change the threat level to the stolen vaults, it’s still prudent to help mitigate the threats of any potential future attack — that is, if you decide you want to stay with LastPass.
LastPass alternatives to consider
- Bitwarden: CNET’s top password manager is a highly secure and open-source LastPass alternative. Bitwarden’s free tier allows you to use the password manager across an unlimited number of devices across device types. Read our Bitwarden review.
- 1Password: Another excellent password manager that works seamlessly across platforms. 1Password doesn’t offer a free tier, but you can try it for free for 14 days.
- iCloud Keychain: Apple’s built-in password manager for iOS, iPadOS and MacOS devices is an excellent LastPass alternative available to Apple users at no additional cost. iCloud Keychain is secure and easy to set up and use across all of your Apple devices. It even offers a Windows client, too, with support for Chrome and Edge browsers.
How did it come to this?
In August 2022, LastPass published a blog post written by Toubba saying that the company «determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.»
At the time, Toubba said that the threat was contained after LastPass «engaged a leading cybersecurity and forensics firm» and implemented «enhanced security measures.» But that blog post would be updated several times over the following months as the scope of the breach gradually widened.
On Sept. 15, Toubba updated the blog post to notify customers that the company’s investigation into the incident had concluded.
«Our investigation revealed that the threat actor’s activity was limited to a four-day period in August 2022. During this timeframe, the LastPass security team detected the threat actor’s activity and then contained the incident,» Toubba said. «There is no evidence of any threat actor activity beyond the established timeline. We can also confirm that there is no evidence that this incident involved any access to customer data or encrypted password vaults.»
Toubba assured customers at the time that their passwords and personal data were safe in LastPass’s care.
However, it turned out that the unauthorized party was indeed ultimately able to access customer data. On Nov. 30, Toubba updated the blog post once again to alert customers that the company «determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information.»
Then, on Dec. 22, Toubba issued a lengthy update to the blog post outlining the unnerving details regarding precisely what customer data the hackers were able to access in the breach. It was then that the full severity of the situation finally came to light and the public found out that LastPass customers’ personal data was in the hands of a threat actor and all of their passwords were at serious risk of being exposed.
Still, Toubba assured customers who follow LastPass’s best practices for passwords and have the latest default settings enabled that no further action on their part is recommended at this time since their «sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture.»
However, Toubba warned that those who don’t have LastPass’s default settings enabled and don’t follow the password manager’s best practices are at greater risk of having their master passwords cracked. Toubba suggested that those users should consider changing the passwords of the websites they have stored.
What does all of this mean for LastPass subscribers?
The initial breach ended up allowing the unauthorized party to access sensitive user account data as well as vault data, which means that LastPass subscribers should be extremely concerned for the integrity of the data they have stored in their vaults and should be questioning LastPass’s capacity to keep their data safe.
If you’re a LastPass subscriber, an unauthorized party may have access to personal information like your LastPass username, email address, phone number, name and billing address. IP addresses used when accessing LastPass were also exposed in the breach, which means that the unauthorized party could also see the locations from which you used your account. And because LastPass doesn’t encrypt users’ stored website URLs, the unauthorized party can see all of the websites for which you have login information saved with the password manager (even if the passwords themselves are encrypted).
Information like this gives a potential attacker plenty of ammunition for launching a phishing attack and socially engineering their way to your account passwords. And if you have any password reset links stored that may still be active, an attacker can easily go ahead and create a new password for themselves.
LastPass says that encrypted vault data like usernames and passwords, secure notes and form-filled data that was stolen remains secured. However, if an attacker were to crack your master password at the time of the breach, they would be able to access all of that information, including all the usernames and passwords to your online accounts. If your master password wasn’t strong enough at the time of the breach, your passwords are especially at risk of being exposed.
Changing your master password now will, unfortunately, not help solve the issue because the attackers already have a copy of your vault that was encrypted using the master password you had in place at the time of the breach. This means the attackers essentially have an unlimited amount of time to crack that master password. That’s why the safest course of action is a site-by-site password reset for all of your LastPass-stored accounts. Once changed at the site level, that would mean the attackers would be getting your old, outdated passwords if they managed to crack the stolen encrypted vaults.
For more on staying secure online, here are data privacy tips digital security experts wish you knew and browser settings to change to better guard your information.
Technologies
Today’s NYT Mini Crossword Answers for Thursday, Aug. 14
Here are the answers for The New York Times Mini Crossword for Aug. 14

Looking for the most recent Mini Crossword answer? Click here for today’s Mini Crossword hints, as well as our daily answers and hints for The New York Times Wordle, Strands, Connections and Connections: Sports Edition puzzles.
Today’s Mini Crossword isn’t too tough, and it has some fun movie and TV references. Just remember that «poster» can mean a couple of different things — it’s not always that photo of Def Leppard hanging on the wall. Want help with today’s NYT Mini Crossword? Read on. And if you could use some hints and guidance for daily solving, check out our Mini Crossword tips.
The Mini Crossword is just one of many games in the Times’ games collection. If you’re looking for today’s Wordle, Connections, Connections: Sports Edition and Strands answers, you can visit CNET’s NYT puzzle hints page.
Read more: Tips and Tricks for Solving The New York Times Mini Crossword
Let’s get to those Mini Crossword clues and answers.
Mini across clues and answers
1A clue: Animals holding «Eat Mor Chikin» signs, in a classic ad campaign
Answer: COWS
5A clue: Suffix with Beatle or Wrestle
Answer: MANIA
6A clue: «Au revoir!»
Answer: ADIEU
7A clue: Ugly poster?
Answer: TROLL
8A clue: Be likely (to)
Answer: TEND
Mini down clues and answers
1D clue: Core group
Answer: CADRE
2D clue: Vegetable combined with celery and carrot to form «mirepoix»
Answer: ONION
3D clue: Handle, as a sword
Answer: WIELD
4D clue: «Better Call ___» («Breaking Bad» spinoff)
Answer: SAUL
5D clue: Damon of «Oppenheimer»
Answer: MATT
Technologies
The iPhone 17 Hasn’t Been Announced Yet, but There’s Already a Case for It
The new case makes a bold style statement, but there’s no official confirmation that it correctly reflects Apple’s upcoming phone.

One of the first cases for the iPhone 17 has made its appearance. Canadian tech accessory company Dbrand announced its Tank Case for the iPhone 17 is set to go on sale in September, the same month we’re expecting Apple to announce the eagerly awaited iPhone 17.
While we don’t know the price of the Tank Case yet, Dbrand has certainly made some striking design choices in the hard black shell case, including plenty of number codes, the Freemason Eye of Providence in what looks like a center designed for MagSafe connections and what appears to be Braille. Dbrand is light on details for now, but you can sign up with your email address to get notifications about the case.
A representative for Dbrand did not immediately respond to a request for comment.
Patrick Holland, CNET managing editor and mobile guru, cautions that these early-announced phone designs don’t always end up making it to the release date. Holland saw that happen just last year, when some manufacturers were forced to push quick redesigns to make room for the iPhone 16’s surprise camera control button.
«It’s become a yearly tradition,» Holland said. «We see companies try to be the first out with a new case design for the latest iPhone, even though the phone hasn’t been announced by Apple.»
«For Dbrand, it’s unclear whether the Tank case is designed based on rumors, or if the company got an early look at the iPhone 17 series, or were given a dummy model,» Holland said. «The case does feature a full body width camera bump that has been heavily leaked for the iPhone 17 Pro and 17 Pro Max. There’s one thing that’s for certain: Dbrand’s Tank case looks chunky and busy, especially for a sleek new iPhone.»
That’s why we’re also keeping a close eye on all the latest reports of iPhone 17 features, including rumors of a redesigned camera bump and a movable lens that could throw a curveball for third-party cases like this.
Social media buzz
Commenters on X shared a variety of opinions about the case. While one person wrote, «that case looks fire,» another wrote, «that case looks hideous.»
Commenters also wondered if the case design was revealing some previously unknown details about the iPhone 17.
«So the second button is basically confirmed?» one X commenter wrote. «Why would the case sport an area that looks pressable or ‘slideable’ otherwise?»
Another wrote, «Am I seeing that correctly? Three cameras on a base iPhone model finally.»
Others zeroed in on the idea that Apple likely does not want case manufacturers to reveal details about a phone before the company announces it, noting that Dbrand also unveiled a case for the Nintendo Switch 2 before that console came out.
«First the Switch 2, now the iPhone 17,» the one commenter wrote. «Yeahh, they’re never getting shit early to make cases anymore.»
Technologies
Apple Reportedly Planning AI Comeback, Complete With a Tabletop Robot
Home security cameras and a standalone smart display are also coming, the report says.

Apple wants a bigger place in your home, according to a report posted Wednesday from Bloomberg’s Mark Gurman. While you might think of Apple primarily because it provides your iPhone, Apple Watch, iPad, MacBook, AirPods and more, the tech giant reportedly hopes to use artificial intelligence to sell you a number of new smart home devices. Those devices may include a tabletop robot, home security cameras and a smart speaker with a screen.
A representative for Apple did not immediately respond to a request for comment.
Tabletop robot
According to Bloomberg, it’s the tabletop robot, reportedly coming in 2027, that is the center of the plan. Bloomberg — and CNET — have reported on this plan before. At that time, the company reportedly had two concepts in mind: a robot that can move around the home, and a tabletop robotic device.
Now, Bloomberg says the robot «will feature a lifelike version of Siri and the ability to engage with users throughout the day.» It reportedly resembles an iPad mounted on a movable limb that can reposition itself to face you.
Former CNET senior editor Lisa Eadicicco wrote in 2024 that «perhaps the biggest challenge when it comes to a home robot is that the market is unproven.» We’ve all seen the robot maid Rosie on the old Jetsons cartoon, but do we really need or want a robotic helper in our homes?
Standalone smart display
Another item Apple is reportedly working on is essentially a smart speaker with a screen. Bloomberg calls this a «stripped-down version of the robot.»
It won’t have a robotic arm or conversational Siri, but it should be able to do such things as music playback, note taking, control home devices and video conferencing. Bloomberg says it will run a new operating system called Charismatic.
Home security cameras
Home security cameras are becoming more and more popular, and Apple wants to move into that realm as well. The company will make cameras that will anchor an Apple security system, the report says.
-
Technologies3 года ago
Tech Companies Need to Be Held Accountable for Security, Experts Say
-
Technologies2 года ago
Best Handheld Game Console in 2023
-
Technologies2 года ago
Tighten Up Your VR Game With the Best Head Straps for Quest 2
-
Technologies4 года ago
Verum, Wickr and Threema: next generation secured messengers
-
Technologies4 года ago
Google to require vaccinations as Silicon Valley rethinks return-to-office policies
-
Technologies4 года ago
Black Friday 2021: The best deals on TVs, headphones, kitchenware, and more
-
Technologies4 года ago
Olivia Harlan Dekker for Verum Messenger
-
Technologies4 года ago
iPhone 13 event: How to watch Apple’s big announcement tomorrow