Remove tag 1password
article thumbnail

Humans are Bad at URLs and Fonts Don’t Matter

Troy Hunt

Yet in the dev tools we see the href attribute of the hyperlink referring to an unrecognisable string of characters and the domain name within the <a> tag almost looking like a very familiar one, albeit for the fourth character. Specifically #1password ?? It won't match the faked domain, hence no password gets entered.

Phishing 145
article thumbnail

Weekly Vulnerability Recap – October 9, 2023 – Zero-Days Strike Android, Microsoft, Apple, Cisco & More

eSecurity Planet

Researchers from Google’s Threat Analysis Group (TAG) and Project Zero uncovered the weakness, which is connected to unauthorized access to freed memory, possibly allowing attackers to corrupt or change sensitive data. Arm also published two additional vulnerabilities, CVE-2023-33200 and CVE-2023-34970.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dashlane vs. 1Password: Compare Top Password Managers for 2021

eSecurity Planet

Dashlane and 1Password are two of our top picks for password managers in 2021. Dashlane and 1Password comparison. Although Dashlane and 1Password are similar, there are a few distinctions worth making when it comes to: Mobility Security Administrative controls User friendliness Pricing Customer support. Image: 1Password iOS app.

article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

I was reminded of this just yesterday when my friend from Cloudflare, Junade Ali, posted this: Now @LastPass has added breached password notifications using the k-Anonymity API design by me and @troyhunt - joining @1Password , Okta PassProtect, Apple, Google, etc. As soon as it got popular, I wrote about how I optimised it for performance.

Passwords 145
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Later in 2018, I did the same thing with the email address search feature used by Mozilla, 1Password and a handful of other paying subscribers. Every time this very blog loads Font Awesome from Cloudflare's CDN, for example, it's verified against the hash in the integrity attribute of the script tag (view source for yourself).

Passwords 123
article thumbnail

Add-ons, Extensions and CSP Violations: Playing Nice with Content Security Policies

Troy Hunt

Some brief background first as I'll be sharing this post with a bunch of folks for which this may be new: A CSP is a response header or meta tag that allows you to declare a policy for your website declaring what sorts of content can be loaded from where. So I install it and am immediately taken to the signup page.

article thumbnail

Gab Has Been Breached

Troy Hunt

For example, when I wrote about the Dropbox hack in 2016 , I was able to verify my own record simply by hashing the password I had stored in 1Password and comparing the output to the one in the breach. It matched, therefore verifying the legitimacy of the breach. " You login with your email address. Coincidence? Or real breach?

Passwords 145