Connect with us

Technologies

If You Use LastPass, You Need to Change All of Your Passwords ASAP

You’ll probably also want to find a different password manager, considering the severity of the latest LastPass data breach.

LastPass, one of the world’s most popular password managers, suffered a major data breach in December, putting customers’ online passwords at risk and endangering their personal data.

On Dec. 22, LastPass CEO Karim Toubba acknowledged in a blog post that a security incident the company first disclosed in August eventually led to an «unauthorized party» stealing customer account information and sensitive vault data. The breach is the latest in a lengthy and troubling string of security incidents involving LastPass that date back to 2011.

It’s also the most alarming.

An unauthorized party was able to gain access to unencrypted subscriber account information like LastPass usernames, company names, billing addresses, email addresses, phone numbers and IP addresses, according to Toubba. That same unauthorized party was also able to steal customer vault data, which includes unencrypted data like website URLs as well as encrypted data like the usernames and passwords for all of the sites customers have stored in their vaults.

If you’re a LastPass subscriber, the severity of this breach should have you looking for a different password manager, because your passwords and personal data are at serious risk of being exposed.

What should LastPass subscribers do?

The company didn’t specify how many users were affected by the breach, and LastPass didn’t respond to CNET’s request for additional comment on the breach. But if you’re a LastPass subscriber, you need to operate under the assumption that your user and vault data are in the hands of an unauthorized party with ill intentions. Though the most sensitive data is encrypted, the problem is that the threat actor can run «brute force» attacks on those stolen local files. LastPass estimates it would take «millions of years» to guess your master password — if you’ve followed its best practices.

If you haven’t — or if you just want total peace of mind — you’ll need to spend some serious time and effort changing your individual passwords. And while you’re doing that, you’ll probably want to transition away from LastPass, too.

With that in mind, here’s what you need to do right now if you’re a LastPass subscriber:

1. Find a new password manager. Given LastPass’ history with security incidents and considering the severity of this latest breach, now’s a better time than ever to seek an alternative.

2. Change your most important site-level passwords immediately. This includes passwords for anything like online banking, financial records, internal company logins and medical information. Make sure these new passwords are strong and unique.

3. Change every single one of your other online passwords. It’s a good idea to change your passwords in order of importance here too. Start with changing the passwords to accounts like email and social media profiles, then you can start moving backward to other accounts that may not be as critical.

4. Enable two-factor authentication wherever possible. Once you’ve changed your passwords, make sure to enable 2FA on any online account that offers it. This will give you an added layer of protection by alerting you and requiring you to authorize each login attempt. That means even if someone ends up obtaining your new password, they shouldn’t be able to gain access to a given site without your secondary authenticating device (typically your phone).

5. Change your master password. Though this doesn’t change the threat level to the stolen vaults, it’s still prudent to help mitigate the threats of any potential future attack — that is, if you decide you want to stay with LastPass.

LastPass alternatives to consider

  • Bitwarden: CNET’s top password manager is a highly secure and open-source LastPass alternative. Bitwarden’s free tier allows you to use the password manager across an unlimited number of devices across device types. Read our Bitwarden review.
  • 1Password: Another excellent password manager that works seamlessly across platforms. 1Password doesn’t offer a free tier, but you can try it for free for 14 days.
  • iCloud Keychain: Apple’s built-in password manager for iOS, iPadOS and MacOS devices is an excellent LastPass alternative available to Apple users at no additional cost. iCloud Keychain is secure and easy to set up and use across all of your Apple devices. It even offers a Windows client, too, with support for Chrome and Edge browsers.

How did it come to this?

In August 2022, LastPass published a blog post written by Toubba saying that the company «determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.»

At the time, Toubba said that the threat was contained after LastPass «engaged a leading cybersecurity and forensics firm» and implemented «enhanced security measures.» But that blog post would be updated several times over the following months as the scope of the breach gradually widened.

On Sept. 15, Toubba updated the blog post to notify customers that the company’s investigation into the incident had concluded.

«Our investigation revealed that the threat actor’s activity was limited to a four-day period in August 2022. During this timeframe, the LastPass security team detected the threat actor’s activity and then contained the incident,» Toubba said. «There is no evidence of any threat actor activity beyond the established timeline. We can also confirm that there is no evidence that this incident involved any access to customer data or encrypted password vaults.»

Toubba assured customers at the time that their passwords and personal data were safe in LastPass’s care.

However, it turned out that the unauthorized party was indeed ultimately able to access customer data. On Nov. 30, Toubba updated the blog post once again to alert customers that the company «determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information.»

Then, on Dec. 22, Toubba issued a lengthy update to the blog post outlining the unnerving details regarding precisely what customer data the hackers were able to access in the breach. It was then that the full severity of the situation finally came to light and the public found out that LastPass customers’ personal data was in the hands of a threat actor and all of their passwords were at serious risk of being exposed.

Still, Toubba assured customers who follow LastPass’s best practices for passwords and have the latest default settings enabled that no further action on their part is recommended at this time since their «sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture.»

However, Toubba warned that those who don’t have LastPass’s default settings enabled and don’t follow the password manager’s best practices are at greater risk of having their master passwords cracked. Toubba suggested that those users should consider changing the passwords of the websites they have stored.

What does all of this mean for LastPass subscribers?

The initial breach ended up allowing the unauthorized party to access sensitive user account data as well as vault data, which means that LastPass subscribers should be extremely concerned for the integrity of the data they have stored in their vaults and should be questioning LastPass’s capacity to keep their data safe.

If you’re a LastPass subscriber, an unauthorized party may have access to personal information like your LastPass username, email address, phone number, name and billing address. IP addresses used when accessing LastPass were also exposed in the breach, which means that the unauthorized party could also see the locations from which you used your account. And because LastPass doesn’t encrypt users’ stored website URLs, the unauthorized party can see all of the websites for which you have login information saved with the password manager (even if the passwords themselves are encrypted).

Information like this gives a potential attacker plenty of ammunition for launching a phishing attack and socially engineering their way to your account passwords. And if you have any password reset links stored that may still be active, an attacker can easily go ahead and create a new password for themselves.

LastPass says that encrypted vault data like usernames and passwords, secure notes and form-filled data that was stolen remains secured. However, if an attacker were to crack your master password at the time of the breach, they would be able to access all of that information, including all the usernames and passwords to your online accounts. If your master password wasn’t strong enough at the time of the breach, your passwords are especially at risk of being exposed.

Changing your master password now will, unfortunately, not help solve the issue because the attackers already have a copy of your vault that was encrypted using the master password you had in place at the time of the breach. This means the attackers essentially have an unlimited amount of time to crack that master password. That’s why the safest course of action is a site-by-site password reset for all of your LastPass-stored accounts. Once changed at the site level, that would mean the attackers would be getting your old, outdated passwords if they managed to crack the stolen encrypted vaults.

For more on staying secure online, here are data privacy tips digital security experts wish you knew and browser settings to change to better guard your information.

Technologies

Today’s NYT Connections Hints, Answers and Help for May 24, #713

Hints and answers for Connections for May 24, #713.

Looking for the most recent Connections answers? Click here for today’s Connections hints, as well as our daily answers and hints for The New York Times Mini Crossword, Wordle, Connections: Sports Edition and Strands puzzles.


Today’s Connections puzzle has a fun variety of categories. The purple one appeals to my English major heart. Read on for clues and today’s Connections answers.

The Times now has a Connections Bot, like the one for Wordle. Go there after you play to receive a numeric score and to have the program analyze your answers. Players who are registered with the Times Games section can now nerd out by following their progress, including number of puzzles completed, win rate, number of times they nabbed a perfect score and their win streak.

Read more: Hints, Tips and Strategies to Help You Win at NYT Connections Every Time

Hints for today’s Connections groups

Here are four hints for the groupings in today’s Connections puzzle, ranked from the easiest yellow group, to the tough (and sometimes bizarre) purple group.

Yellow group hint: Goo-goo.

Green group hint: Not shirts.

Blue group hint: City that never sleeps.

Purple group hint: Acclaimed writers.

Answers for today’s Connections groups

Yellow group: Baby gear.

Green group: Kinds of pants minus «s.»

Blue group: New York sports team members.

Purple group: Black women authors.

Read more: Wordle Cheat Sheet: Here Are the Most Popular Letters Used in English Words

What are today’s Connections answers?

The yellow words in today’s Connections

The theme is baby gear. The four answers are bib, bottle, monitor and stroller.

The green words in today’s Connections

The theme is kinds of pants minus «s.» The four answers are capri, jean, jogger and slack.

The blue words in today’s Connections

The theme is New York sports team members. The four answers are Jet, Met, Net and Ranger.

The purple words in today’s Connections

The theme is black women authors. The four answers are Butler, Gay, Hooks and Walker.

Continue Reading

Technologies

Today’s NYT Mini Crossword Answers for Tuesday, May 20

Here are the answers for The New York Times Mini Crossword for May 20.

Looking for the most recent Mini Crossword answer? Click here for today’s Mini Crossword hints, as well as our daily answers and hints for The New York Times Wordle, Strands, Connections and Connections: Sports Edition puzzles.


Today’s NYT Mini Crossword is a fun one, and now I’m singing the song from 1-Across in my head. Need some help with today’s Mini Crossword? Read on. And if you could use some hints and guidance for daily solving, check out our Mini Crossword tips.

The Mini Crossword is just one of many games in the Times’ games collection. If you’re looking for today’s Wordle, Connections, Connections: Sports Edition and Strands answers, you can visit CNET’s NYT puzzle hints page.

Read more: Tips and Tricks for Solving The New York Times Mini Crossword

Let’s get at those Mini Crossword clues and answers.

Mini across clues and answers

1A clue: «Pink ___ Club» (Chappell Roan hit)
Answer: PONY

5A clue: Instrument that might be made with a comb and wax paper
Answer: KAZOO

6A clue: How bedtime stories are often read
Answer: ALOUD

7A clue: On edge
Answer: TENSE

8A clue: Short Instagram video
Answer: REEL

Mini down clues and answers

1D clue: Less colorful
Answer: PALER

2D clue: Layer of the upper atmosphere
Answer: OZONE

3D clue: Totally pointless
Answer: NOUSE

4D clue: Hit a high note in a high place, perhaps
Answer: YODEL

5D clue: Kit ___ bar
Answer: KAT

How to play more Mini Crosswords

The New York Times Games section offers a large number of online games, but only some of them are free for all to play. You can play the current day’s Mini Crossword for free, but you’ll need a subscription to the Times Games section to play older puzzles from the archives.

Continue Reading

Technologies

Want to Speak to Dolphins? Researchers Won $100,000 AI Prize Studying Their Whistling

The scientists studied a bottlenose dolphin community in Sarasota, Florida, uncovering evidence of language-like communications.

If any dolphins are reading this: hello!

A team of scientists studying a community of Florida dolphins has been awarded the first $100,000 Coller Dolittle Challenge prize, set up to award research in interspecies communication algorithms.

The US-based team, led by Laela Sayigh of the Woods Hole Oceanographic Institution, found that a type of whistle that dolphins employ is used as an alarm. Another whistle they studied is used by dolphins to respond to unexpected or unfamiliar situations. The team used non-invasive hydrophones to perform the research, which provides evidence that dolphins may be using whistles like words, shared with multiple members of their communities.

Capturing the sounds is just the beginning. Researchers will use AI to continue deciphering the whistles to try to find more patterns. 

«The main thing stopping us cracking the code of animal communication is a lack of data. Think of the 1 trillion words needed to train a large language model like ChatGPT. We don’t have anything like this for other animals,» said Jonathan Birch, a professor at the London School of Economics and Politics and one of the judges for the prize.

«That’s why we need programs like the Sarasota Dolphin Research Program, which has built up an extraordinary library of dolphin whistles over 40 years. The cumulative result of all that work is that Laela Sayigh and her team can now use deep learning to analyse the whistles and perhaps, one day, crack the code,» he said.

The award was part of a ceremony honoring the work of four teams from across the world. In addition to the dolphin project, researchers studied ways in which nightingales, marmoset monkeys and cuttlefish communicate.

The challenge is a collaboration between the Jeremy Coller Foundation and Tel Aviv University. Submissions for next year open up in August. 

Dolphins are just the beginning

Researching animals and trying to learn the secrets of their communication is nothing new; but AI is speeding up the creation of larger and lager datasets.

«Breakthroughs are inevitable,» says Kate Zacarian, CEO and co-founder of Earth Species Project, a California-based nonprofit that also works in breaking down language barriers with the animal world.

«Just as AI has revolutionized the fields of medicine and material science, we see a similar opportunity to bring those advances to the study of animal communication and empower researchers in this space with entirely new capabilities,» Zacarian said.

Zacarian applauded Sayigh’s team and their win and said it will help bring broader recognition to the study of non-human animal communication. It could also bring more attention to ways that AI can change the nature of this type of research.
«The AI systems aren’t just faster — they allow for entirely new types of inquiry,» she said. «We’re moving from decoding isolated signals to exploring communication as a rich, dynamic, and structure phenomenon — whish is a task that’s simply too big for our human brains, but possible for large-scale AI models.»

Earth Species recently released an open-source large audio language model for analyzing animal sounds called NatureLM-audio. The organization is currently working with biologists and ethologists to study species including carrion crows, orcas, jumping spiders and others and plans to release some of their findings later this year, Zacarian said.

Continue Reading

Trending

Copyright © Verum World Media