HomeTech NewsThe most popular password manager "LastPass" has been hacked

The most popular password manager “LastPass” has been hacked

Used by 25 million Internet users and 80,000 companies, LastPass allowed you to store and encrypt your passwords in a safe place. Unfortunately, this American company was hacked.

It’s been a long time since we used a notebook and pen to remember our ever-growing passwords. Today, browsers save our usernames and passwords, and there is even software dedicated to “password management”. One of the most used is LastPass, which is used by 85 million users and 80,000 companies.

Bloomberg reveals that LastPass has been the victim of a massive hacking attack. The application, in which millions of Internet users entrust their passwords, was hacked. According to the company that admitted to the attack, a hacker hacked the account of one of its developers and used this path to access sensitive data.

Lastpass Company confirmed the attack

“We have determined that an unauthorized entity has gained access to parts of the LastPass development environment through a single compromised developer account, and has obtained portions of the source code and certain proprietary technical information from LastPass. According to him, customer data was not stolen: ” After launching an investigation, we have seen no evidence that this incident has compromised access to customer data or passwords”.

For the security of your passwords, it may be safer for you to keep a backup of your passwords by saving them in the note section on your personal computer or phone, or keeping your passwords by writing them down in an old-fashioned notebook and paper is seen as a much safer method in such cases.

Image: Unsplash

SOURCEbloomberg
Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!

12FansLike
15,848FollowersFollow
13FollowersFollow
676SubscribersSubscribe

Related Articles

Future trends and innovations in Healthcare app development

IntroductionList of Future trends and Innovations in Healthcare app development●    Advantages●    DisadvantagesConclusionIntroductionAs technology continues to rapidly evolve, healthcare app development is also experiencing some...

Intel Publishes 12-Qubit Chip new Quantum processor

Intel on the 15th announced the latest quantum processor called "Tunnel Falls", which is a 12-qubit (quantum bit, qubit) silicon chip, which is a...

Apple’s Vision Pro battery appears to be replaceable

Apple unveiled the long-rumored new Vision Pro at last week's WWDC conference. It is not difficult to see from the design of the product...

The world’s first manned “UFO” was tested in Shenzhen

Many companies are currently developing pure electric vertical take-off and landing vehicles, but this Chinese company had a sudden idea to create this "flying...

Explore More Articles

Starfield How to use Scanner-min

Starfield: How to use Scanner?

0
Scanner is a tool that you'll be needing a lot of in Starfield. It allows you to see which resources and materials a planet...
Starfield How to Sell from Ship Inventory main

Starfield: How to Sell from Ship Inventory?

0
There's a bunch of different places you can sell your hard-earned items and gears. The only thing is there's no maps in this game....
OpenAI Will there be GPT-5

OpenAI’s first developer conference: Will there be GPT-5?

0
OpenAI will hold its first developer conference, OpenAI DevDay, on November 6, two months later. During the full-day event, the OpenAI team will lead...
Proofing Your World 8 Best Strategies for Ultimate Technology Security-min

Proofing Your World: 8 Best Strategies for Ultimate Technology Security

0
Expanding the size of the attack surface inevitably amplifies the risk of cybersecurity breaches. Consequently, reducing the attack surface logically diminishes cybersecurity risk. It...