LastPass, Blur, 1Password – hacking password managers?

LastPass, Blur, Dashlane, 1Password – hacking password managers?

Here at Abine, we operate Blur, an app to help everyone with their Passwords, Payments, and Privacy. A core part of Blur is its password manager, so, naturally when LastPass announced they were potentially hacked last week, many millions of people started asking questions about password managers:

– Are password managers safe to use?
– Is it really better to use a password manager than just a few common passwords I remember and don’t write down anywhere?
– If hackers can steal my passwords from LastPass, is there any hope any company can keep my data safe?
– Is there anything safe out there, anything convenient? Should I just continue to do what I’ve been doing..?

Password Vault

People want answers – so here is what we believe at Abine, distilled down to a few tweetable bullet points:

1. It’s more important than ever to not re-use the same passwords because there are more hackers out there in 2015 than ever before. Saying this is not just a scare-tactic, it’s true and there is ample evidence out there.

Hacking password manager

Hacker

 

 

2. Password managers generally make using unique passwords easier and more convenient – and they are getting better and better. Check out Blur’s password generation feature.

3. Abine never stores your unencrypted password data, and Abine never has the ability to de-crypt your passwords. That said, hackers won’t get your passwords even if they get access to the data on our servers.

Different leading password managers like Blur, LastPass, Dashlane, 1Password, and Keeper tend to use different approaches to storing your passwords – check out which one you are most comfortable with before you choose.

At Abine one of our closely held beliefs is that no one can truly secure your data in the cloud so you should give less of your personal data out. This is what Blur lets you do – with Masked Emails, Masked Credit Cards, and more that no other password manager today does. Don’t blame the web sites for getting hacked – it’s going to happen – just make sure the web sites have less of your information so when they get hacked, your account isn’t valuable to the hackers.



Stop! Before You Post on Facebook

Facebook tracks you by browsing historyHow careful are you about what you share on Facebook and other social networks? Probably not very. But in light of a new initiative Facebook is launching, you may want to give more thought to what you post on the social web.

Under Facebook’s new program, select data-analysis companies will be able to harvest the vast quantities of content that Facebook’s 1 billion-plus users produce. The real beneficiaries will be those data companies’ clients – large consumer brands like Procter & Gamble, ConAgra, General Mills and others.

As Advertising Age describes, Facebook (by way of a company called DataSift) will give its data partners access to a treasure trove of user data. Read More



5 steps to help protect yourself from the NSA

nsa_spyingNearly 9 out-of-10 Americans have heard of Edward Snowden and the NSA leaks, but only 34% of people have taken at least one step to shield their information, according to a Pew Research Center study released today.

Almost two years after Snowden made his initial revelations, Pew has published a study in which they asked Americans what they thought of the government surveillance programs that Snowden revealed, and whether they have altered their online activities and communication habits since they have learned details of the surveillance.

Read More



Europe Takes Online Privacy Seriously. You Can Too.

14618899974_92f08e26c9_nThe Netherlands is known for its elaborate flood-control system, excellent soccer and a very tall populace. And it may one day have a reputation as a world leader in online privacy. Read More



Privacy News of the Week

2603529812_da66a9be8e_nLots to cover since our last privacy report. First up…

Outdated encryption tech leaves millions of devices, websites vulnerable

A decision made decades ago to use a weak form of encryption on devices exported to other countries is having present-day consequences. Read More