The Best Password Manager to Secure Your Data

Managing your account passwords is not a simple task, using a good password manager where to register access keys is the best choice.

One password for Facebook, the other for Twitter, an access key for Dropbox and for the mail account. Every day we are “forced” to enter dozens and dozens of passwords to make access to the various services offered by the network. But, unless you always use the same, remember them all is really hard.

Luckily for us there are programs that allow you to save the various keys that have been used during the registration process: the password manager. These software are one of the best tools on the market to protect our data from hackers and attackers. In fact, they allow you to diversify your password without fear of forgetting it. Many use the same access key for all their accounts, which is not recommended to do so because it facilitates the work of crackers that, by decrypting only a password, can freely access your personal data.

Which password Manager to choose

Password managers are divided into three large families: those built into the browser, online and desktop-based ones. Everyone has their own features and functionality, but not all of them offer the same level of protection. We start with the Password Manager integrated in the browser: Chrome and Firefox (but not only) offer the possibility to save the access keys that are used to access the mail or social networks directly in an encrypted database inside the computer. This way, every time you open the page of your mail (or any other service for which you need an access key), the user name and password field will already be filled in. Very convenient to use, the Password Manager integrated in the browser is not as safe: Some malware know perfectly where to trace the encrypted database and in a few minutes manage to have access to your accounts.

Online password managers, however, work in a slightly different way: The user can save all the access keys he wants and will be stored in the servers or in the cloud of the company that provides the service. Passwords are protected by a Master password set by the user. Desktop-based password managers have a very similar operation: After installing the software on your personal computer you will need to set up a Master password to protect all access keys. Among the three different types of password managers, those desktop based are most likely among the most secure: even if the hackers take possession of the computer, will always have to overcome the last rock, the Master password.

Probably the best password manager on the market. Dashlane 4 offers all services that a user concerned about the security of their personal data market research: 500 supported sites, two-step authentication to access the most important accounts, the ability to make secure payments with the Dashlane payments feature. But let’s go with order: Dashlane 4 has a totally revamped interface compared to the previous version, much easier to use and user-friendly. Support has been added to over 300 websites, bringing the final number to 500: In practice you can save the password of the most visited portals by users every day. In addition, you can “test” your passwords through the “Safety Level” service offered by the password Changer: If you are not satisfied with the result you can ask for help to Dashlane 4 that will automatically generate a safe and proven access key of hackers. In addition, the program will warn the user when it will use the same password on two or more websites. The program supports seven languages (including Italian) and is available for Windows, Mac, Android and IOS platforms.

LastPass 4.0

It is a challenge equal to that between LastPass 4.0 and Dashlane 4 for the throne of best password manager. LastPass 4.0 has a much lower price than its more direct competitors ($12 for the Premium version) and many useful features to safeguard its data. The main feature of the program is certainly the ability to set a Master Password very effective: if some hacker tries to sneak into the servers of the company, very difficult to pass the “Security gate”. However, in the event that you are unable to create a secure password, LastPass 4.0 offers the ability to generate an access key directly within the application. To secure your account, LastPass 4.0 scans all saved access keys and notifies you which two or more times have been used. Finally, in the free version, you can synchronize passwords on a same type of device to have the ability to access your accounts even from different computers and smartphones.


If you are looking for a free and reliable password manager one of the possible choices is KeePass, open source software that allows users to save the access keys not only of online services but also of other software installed on the personal computer. Passwords are not saved on a cloud space, but directly on a local database (if you want to share the access keys online you can do it through Google Drive or Dropbox). The service does not have many features, but thanks to its open source, some users have developed plugins that allow you to enrich the program with other services such as a tool to know the security and robustness of your password.

Sticky Password

Sticky Password is another all-in-one password manager that offers many features, including AES-256 technology to encrypt access keys and secure our personal data. It also allows you to synchronize passwords between all the user’s devices so that you can enter at any time in your email or in your Facebook account. In addition, the software also analyzes password security and reports those that have been used several times. For the mobile version, to unlock the application you can set the biometric recognition through the fingerprint sensor: in this way no one can infiltrate your device to steal passwords.

Android App with Pornographic Advertising, Google Deletes Them

The Israeli software house Check Point discovers 60 video games for children with advertising pornography. Google deletes them but the problem of controls remains.

That the controls for the apps being published on the Google Play Store were to be incremented you knew for a long time. Over and over again, in fact, hackers and various cyber-criminals had managed to publish Android apps containing malicious code and able to steal data and information present on the smartphones of users.

A phenomenon that does not seem to have brakes, according to the latest discovery made by the experts of Check Point, Israeli company producing network peripherals and security systems. Israeli researchers have in fact discovered in the Google Play Store 60 apps containing malware, in most cases “disguised” as a children’s video game. This allowed to quickly grow the number of downloads of the apps involved, so that some have reached and exceeded the million installations (such as, for example, “McQueen Car Racing Game”, which sees among the protagonists some characters of the Disney cartoon Cars).

AdultSwine, triple action malware

The 60 applications in question have been called by the Israeli experts “AdultSwine” and are characterized by a triple malevolent action. Each time they are used, the video games in question show pornographic advertisements and other content that is not appropriate for the users they are facing (remember that they are games for children or teenagers). The pornographic advertisements are functional at the second and third stages, which induces first users to download false applications and security suites (actually of the backdoor used to lead other attacks and to steal data from the smartphone) and then to subscribe Subscriptions and paid features designed to improve the security of your device.

In short, a combined action that not only tries to pin money to unwitting parents, but installs malware and backdoor within the devices, endangering the data stored inside the smartphone.
The reaction of Google

Before making its discovery public, the Check Point experts alerted Google, who stepped in and eliminated the applications and deleted the developers ‘ accounts that had uploaded and published video games with advertising.

How To Protect Computers And Smartphone’s From The Processor Bug

Present in almost all computers and smartphones today on the market, allow hackers to steal our data by accessing directly to the processor.

Discovered by computer security experts from the Google Project Zero Group and university researchers from various parts of the world, Meltdown and Spectre aspire to win the palm of 2018 ‘s worst vulnerability. All although they were made known in the very first days of the year. I mean, some kind of record.

What are Meltdown and Spectre

Unlike the many software bugs that are (unfortunately) accustomed to, Meltdwon and Spectre are two hardware vulnerabilities born from design errors made decades ago. According to the information released by the authors of the discovery, all the processors – or almost – for PCs and Smartphones made from 1995 onwards would be affected. In short, it does not matter that you have a Windows computer or an IMAC, an Android smartphone or an iPhone: the data contained within them would still be a danger.

Both attacks exploit flaws in the design of CPUs and SoC and allow a hacker to access the present memory cells of the processors (theoretically inaccessible and hyper-secure) and to steal the data stored within them. Although it is a very complex hacking technique, it strips two of the worst vulnerabilities ever discovered for a long series of reasons. Two on all: affects everyone regardless of the device used (smartphone or PC) and the operating system mounted (Windows, MacOS, Android and IOS); From a theoretical point of view, there is no way for the user to defend against the Meltdown and Spectre attacks.

How to defend yourself from Meltdown and Spectre

As just mentioned, there is no way for users to defend themselves against attacks: because of two hardware vulnerabilities, there is no software (such as antivirus or firewalls, for example) that can restrain hackers. The only solution is to download and install all the updates that the manufacturers and developers are releasing: For a few days, in fact, the various Google, Apple, Microsoft and Intel are working on patches able to circumscribe the problem and put To secure user data.

How to protect Windows computers from Meltdown and Spectre

Microsoft has already prepared – and is releasing – a security patch for all its operating systems. Windows 10 users should automatically download security updates, so all they have to do is wait for the computer to install the whole thing. If you are using Windows 8 and Windows 7, you still have to wait a bit. It is to be said, however, that the update could lead to some compatibility issue with some antivirus, so much so that Microsoft recommends disabling them and relying on the security of Windows Defender, at least in these early days of release.

How to protect IPhone and Mac from Meltdown and Spectre

Apple also released a security update for all its devices, both PC and smartphone and tablet. Mac users and owners of IPhone and IPad need only check the availability of system updates, download and install them.

How to protect Intel PC from Meltdown and Spectre

As mentioned, the processors and chip manufacturers themselves have been activated to make firmware and kernel upgrades that protect computers and smartphones. Intel should be the first to do so: as stated during the CES 2018 in Las Vegas, within February will be available patches that can protect over 90% of computers today in circulation.