World Library  
Flag as Inappropriate
Email this Article




Developer(s) LastPass
Initial release August 22, 2008 (2008-08-22)
Stable release 3.1.54/55[1] / August 20, 2014 (2014-08-20)
Operating system Cross-platform
Available in Multilingual
Type Password manager
License Proprietary software
Website .comlastpass

LastPass is a freemium password management service which seeks to resolve the password fatigue problem by centralising user password management in the cloud.[2] LastPass is standard with a web interface but also includes plugins and apps for many modern web browsers and includes support for bookmarklets.[2][3] LastPass could also refer to the trade name under which the developer of the LastPass service, Virginia-based technology company Marvasol, Inc., does business.[4]


  • Overview 1
  • Features 2
  • Reception 3
  • Security breach 4
    • XSS vulnerability 4.1
  • See also 5
  • References 6
  • External links 7


Passwords in LastPass are protected by a master password, encrypted locally, and synchronized to any other browser. LastPass has a form filler that automates password entering and form filling. It also supports password generation, site sharing and site logging.

On December 2, 2010, it was announced that LastPass acquired the bookmark synchronizer Xmarks.[5] LastPass password management technology was integrated into the “Identity and Privacy” feature of Internet security company Webroot’s newest security suite. Full terms of the licensing deal were not disclosed.[6] Although it is closed source, Sameer Kochhar (one of the developers of LastPass), has argued that, theoretically, the integrity of the software could be verified without making it open source, and mentioned that the developers may be open to the future possibility of making the user interface of LastPass open source.[7]


  • One master password
  • Cross-browser synchronization
  • Secure password generation
  • Password encryption
  • Form filling
  • Importing and exporting passwords
  • Portable access (using browsers)
  • Multifactor authentication
  • Passwort-Fingerprint verification (using local certificates or YubiKey)
  • Cross-platform availability (mobile versions available for premium accounts)
  • Mobile access available[8]
  • Free and premium credit monitoring (USA only)[9]


In March 2009, PC Magazine awarded LastPass their "Editors' Choice" for password management.[10] LastPass has a rating of 4 out of 5 stars at the Firefox Add-ons web site with over 900 reviews,[11] and it has been featured on Download Squad,[12] Lifehacker,[13] and MakeUseOf.[14]

In July 2010, LastPass's security model was extensively covered and approved of by Steve Gibson in his Security Now podcast episode 256.[15] He also revisited the subject and how it relates to the NSA in Security Now podcast episode 421.[16]

Security breach

On Tuesday, May 3, 2011, LastPass discovered an anomaly in their incoming network traffic, and then another, similar anomaly in their outgoing traffic.[17] Administrators found none of the hallmarks of a classic security breach (for example, database logs showed no evidence of a non-administrator user being elevated to administrator privileges), but neither could they determine the root cause of the anomalies. Furthermore, given the size of the anomalies, it is theoretically possible that data such as email addresses, the server salt, and the salted password hashes were copied from the LastPass database. To address the situation, LastPass decommissioned the "breached" servers so they could be rebuilt, and on May 4, 2011, they requested all users to change their master password. However, the resulting user traffic overwhelmed the login servers and, temporarily, administrators were asking users to refrain from changing their password until further notice, having judged that the possibility of the passwords themselves being compromised to be trivially small. LastPass also stated that while there was no direct evidence any customer information was directly compromised, they preferred to err on the side of caution.[18] There have been no verified reports of customer data loss or password leaks since these precautions were taken. In comment 6, Joe Siegrist committed to a third-party audit, saying one "is certainly prudent". However, no audit results have been published to date.

XSS vulnerability

In February 2011, a cross-site scripting (XSS) security hole was discovered, reported by security researcher Mike Cardwell, and closed within hours.[19] There was disagreement over severity. Cardwell stated that people should be "very concerned." The company reported that a log search showed no evidence of exploitation (other than by Cardwell). However in addition to closing the hole, LastPass took additional steps to improve security, including implementing HTTP Strict Transport Security (HSTS), as Cardwell had suggested, implementing X-Frame-Options, and a Content Security Policy-like system in order to provide defense in depth.[19][20]

See also


  1. ^ "Recent changes to LastPass". Retrieved September 2, 2014. 
  2. ^ a b "Features". LastPass. Retrieved 27 April 2014. 
  3. ^ "Bookmarklets". LastPass. Retrieved 27 April 2014. 
  4. ^ Michael Riley (5 May 2011). "LastPass says hackers may have stolen passwords for 1.25 million customers".  
  5. ^ "LastPass Acquires Xmarks!". LastPass blog. 2010-12-02. 
  6. ^ Automation, partnerships drive Webroot revamp 2010-07-26.
  7. ^ Sameer's commentary on making lastpass open source
  8. ^ mobileLastPass
  9. ^ LastPass Credit Monitoring
  10. ^ LastPass 1.50 Review & Rating |
  11. ^ LastPass Password Manager:: Add-ons for Firefox
  12. ^ Is Lastpass as good as they make it sound?
  13. ^ LastPass Adds Form Filler, Syncs Form Profiles and Passwords
  14. ^ Securely Synchronize Your Browser Passwords With LastPass
  15. ^ Security Now 256: LastPass Security or jump straight to review of LastPass at 0:52:44
  16. ^ Security Now 421: The Perfect Accusation
  17. ^ LastPass Security Notification
  18. ^ LastPass Security Notification(Archive)
  19. ^ a b LastPass Vulnerability Exposes Account Details (Archived by WebCite®)
  20. ^ Cross Site Scripting vulnerability reported, fixed (Archived by WebCite®)

External links

  • Official website
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.