There are other considerations besides the recent revelations about recovery 
tools being discussed in this thread...

http://arstechnica.com/security/2014/11/citadel-attackers-aim-to-steal-victims-master-passwords/

The 
research<http://securityintelligence.com/cybercriminals-use-citadel-compromise-password-management-authentication-solutions/>
 found that a configuration file, which attackers use to tailor the Citadel 
trojan for specific campaigns, had been modified to start up a keylogger when 
the user opened either Password Safe or KeePass, two open-source password 
managers. While malware has previously targeted the credentials stored in the 
password managers included in popular Web browsers, third-party password 
managers have typically not been targeted.
While the current impact of the attack is low, the implications of the 
attacker's focus is that password managers will soon come under more widespread 
assault,

From: [email protected] [mailto:[email protected]] On 
Behalf Of John Gwinner
Sent: Friday, December 12, 2014 11:42 AM
To: [email protected]
Subject: RE: [NTSysADM] Did you think your KeePass Master Passwords were safe? 
PWSafe follow up

How about PWSafe? 
(http://pwsafe.org<https://urldefense.proofpoint.com/v2/url?u=http-3A__pwsafe.org_&d=AAQFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=cgY5KFatybgsA9RzBafEwGficJfBtl-IEye8NuElUtg&e=>)
 I'm thinking of rolling that out to my DBA's.

The files would stay on the company intranet, and I'd use Yubico for THEM to 
access, keep the sw password to just 2 people (IT guy and myself).

Having an issue getting Yubico to work, that's a separate issue.
                 == John ==
John Gwinner | Director of Technology
DAZSI /Oracle Business Applications
310.640.1300 (office) | 310.227.9140 (cell)
880 Apollo Street - Ste. 201 | El Segundo CA 90245

[Description: 
cid:[email protected]]<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.dazsi.com_&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=GjZRQ4raQi5i6lyfpj28BDeEIxLVPapOz9shFpRVyX0&e=>

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Andrew S. Baker
Sent: Wednesday, December 10, 2014 3:52 PM
To: ntsysadm
Subject: Re: [NTSysADM] Did you think your KeePass Master Passwords were safe?

Too true...








ASB
http://XeeMe.com/AndrewBaker<https://urldefense.proofpoint.com/v2/url?u=http-3A__xeeme.com_AndrewBaker&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=591UUFMOyj9QXaPQWHtVP0XIaa9w7UDXb6qo2hKOfqs&e=>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...




On Tue, Dec 9, 2014 at 7:05 PM, Jon Harris 
<[email protected]<mailto:[email protected]>> wrote:
Too bad the company does not work to de-encrypt CryptoWall encrypted files!

Jon

________________________________
From: [email protected]<mailto:[email protected]>
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] Did you think your KeePass Master Passwords were safe?
Date: Tue, 9 Dec 2014 23:58:17 +0000

No longer....



http://www.lostpassword.com/news/pnl74.htm<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.lostpassword.com_news_pnl74.htm&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=ERU4RReY5pr28Xg0DQ0aNO8ec6qyn5eais78Ivl4gqM&e=>



(h/t Susan Bradley - who was more concerned about QuickBooks.) :)



PG&E is committed to protecting our customers' privacy. 
To learn more, please visit http://www.pge.com/about/company/privacy/customer/

Reply via email to