Reply to post: Cool find and all, but for the all the bad scenarios...

Password managers may leave your online crown jewels 'exposed in RAM' to malware – but hey, they're still better than the alternative

canthinkofagoodname

Cool find and all, but for the all the bad scenarios...

Should be fairly straight forward:

- Identify risks / threats

- Assess risks / threats (inc. existing mitigations, and predisposing conditions for risk realisation)

- Accept and/or mitigate risks / threats

- Manage risks / threats

It's what we do for just about any other vulnerability or flaw in a system, why should this finding be any different?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon