Home Tags Walmart

Tag: Walmart

One-upping the NES Classic Edition with the Raspberry Pi 3 and...

NES Classic is no more, but luckily cheap hobbyist boards are great for little projects.

Theranos investors who pledge not to sue get Elizabeth Holmes’ shares...

After scandals and lawsuits, hobbling company is said to have $150 million left.

IBM announces enterprise-ready blockchain services that go beyond currency

The service is based on the Linux Foundation’s Hyperledger Fabric.

AMD’s Radeon memory business is slowing down

AMD's Radeon memory business has slowed down, with fewer products available in the U.S. and no new product releases since the introduction of the Polaris GPUs last year.Products are not being sold by key partners like Newegg, Best Buy, or TigerDirec...

What the end of net neutrality means for you

Now that Trump has taken office and is adorning his cabinet with fellow millionaires and billionaires, net neutrality is on the chopping block.

The principle that all internet traffic should be treated equally is all but dead. With net neutrality, Amazon, for example, can’t cut a deal with Time Warner to make its website come up faster than Walmart’s.

For all the talk of being for the common man, this administration won’t stand in the way of big businesses making deals. The internet was built on the very idea of net neutrality.
It has a history going back more than a century in “common carrier” laws, when Standard Oil was fined for creating a deal with a railroad (also a common carrier) in which it got a “rebate” whenever a competitor shipped oil on the line.

These kinds of deals create vertical monopolies to the disadvantage of consumers, escalating prices.

They also stifle innovation as they price access to the market out of the reach of startups and inventors.To read this article in full or to leave a comment, please click here

Biometrics leads to arrest of accused child molester on the lam...

Enlarge / Nearly two-decade-old photos of a suspected child molester matched a 2007 passport photo via a biometrics analysis by the FBI, leading to Charles Hollin's arrest in Oregon.FBI / Aurich Lawson reader comments 50 Share this story A fugitive suspected of molesting a 10-year-old Indiana girl 17 years ago has been arrested after the Federal Bureau of Investigation employed facial recognition technology, according to court documents.

The bureau said the suspect's US passport photo in December was run though a Facial Analysis, Comparison, and Evaluation (FACE) test, and it matched photos taken before he disappeared nearly two decades ago. Charles Hollin, 61, was arrested in Salem, Oregon last week at a Walmart where he works. He had both Minnesota and Oregon driver's licenses with his picture on them.

The agency said it did not perform a biometrics analysis with those databases because they have not opened up their DMV roles for the bureau to search.

The bureau noted in a court filing that the government maintains "top secret" databases containing biometric profiles. "The Department of Motor Vehicles for Minnesota and Oregon were not searched due to the fact that it was prohibited by law.

Additional searches were conducted in various federal secret and top secret databases.

All of these searches were negative," Todd Prewitt, an FBI agent, wrote in court documents (PDF). Hollin had vanished when Indiana authorities went to arrest him in February, 2000.

The authorities suspect Hollin abducted a 10-year-old girl, put a stocking mask over her head, drove to a secluded area, and then molested her.

They suspect he abandoned the girl naked on an isolated road, where she was found by a passerby. He went by the identity of Andrew David Hall, who was an 8-year-old boy killed in a 1975 Kentucky auto crash, the authorities said. The US Government Accountability Office (GAO) says the bureau has access to roughly 412 million images as part of its face-recognition database.

The bulk of those images are photographs of people who have committed no crime, according to the recent GAO report. The report says the bureau's FACE unit contains 30 million mug shots, has access to driver license photos from 16 states, the State Department's visa and passport database, and the biometric database maintained by the Defense Department.

The report did not mention any top secret database.

But it did fault the FBI for being lax about privacy and the accuracy of the photos in its database. The bureau has used facial recognition to capture other long-vanished suspects.

A US fugitive on the lam for 14 years in connection with child sex abuse and kidnapping charges was apprehended in Nepal in 2014 after authorities scanned his "wanted" poster with facial recognition tech.

Obama in Science: Clean energy will happen whether you like it...

Lawrence Berkeley Labreader comments 20 Share this story In Science’s Policy Forum column, President Barack Obama has penned an article arguing that the world is quickly replacing fossil fuel-based energy with clean energy.

That momentum, he asserts, will not be stopped by “near-term” policy changes from Donald Trump’s incoming administration. The current president writes that, although climate change is undeniable, the incoming administration might do nothing about it.

That would be a political mistake, but it might not effect on the economics of clean energy, Obama argues. “Mounting economic and scientific evidence leave me confident that trends toward a clean-energy economy that have emerged during my presidency will continue,” he wrote, adding that “the trend toward clean energy is irreversible.” The president cites recent studies from national and international agencies showing that energy emissions are decoupling from economic growth, a trend that “should put to rest the argument that combatting climate change requires accepting lower growth or a lower standard of living.” And the potential damage to the economy is vast: a 4°C increase in global temperature could “lead to lost US federal revenue of roughly $340 billion to $690 billion annually.” Despite Trump’s baseless denial of climate science, local governments and businesses will be the ones dealing with climate change in the coming years. Obama predicts that these organizations will continue making the investments necessary to protect people and investments from the effects of climate change. He cites Google, Walmart, and GM as companies that have promised to move large portions, or all, of their energy consumption to renewable power. The president notes that momentum is also found on the labor side of the energy equation.

Approximately “2.2 million Americans are currently employed in the design, installation, and manufacture of energy-efficiency products and services,” he writes, as opposed to “roughly 1.1 million Americans who are employed in the production of fossil fuels and their use for electric power generation.” The president adds that fossil fuel industries receive nearly $5 billion in federal subsidies a year, “a market distortion that should be corrected on its own or in the context of corporate tax reform.” Obama then turns to the Paris Agreement—a global agreement to reduce emissions such that the globe stops short of a 2°C increase in global temperature.

Donald Trump has promised to back out of the Paris Agreement, but Obama argues that such a folly would only harm the US rather than help it: Were the United States to step away from Paris, it would lose its seat at the table to hold other countries to their commitments, demand transparency, and encourage ambition.

This does not mean the next Administration needs to follow identical domestic policies to my Administration’s.

There are multiple paths and mechanisms by which this country can achieve—efficiently and economically—the targets we embraced in the Paris Agreement.

The Paris Agreement itself is based on a nationally determined structure whereby each country sets and updates its own commitments. Regardless of U.S. domestic policies, it would undermine our economic interests to walk away from the opportunity to hold countries representing two-thirds of global emissions—including China, India, Mexico, European Union members, and others—accountable. This should not be a partisan issue.
It is good business and good economics to lead a technological revolution and define market trends.

And it is smart planning to set long-term emission-reduction targets and give American companies, entrepreneurs, and investors certainty so they can invest and manufacture the emission-reducing technologies that we can use domestically and export to the rest of the world. Ultimately the message is: deny climate science if you want, but regions, states, and businesses will still be moving to eliminate greenhouse gases to protect their own futures.

5 enterprise-related things you can do with blockchain technology today

Diamonds. Bitcoin. Pork. If you think you’ve spotted the odd one out, think again: All three are things you can track using blockchain technologies today. Blockchains are distributed, tamper-proof, public ledgers of transactions, brought to public attention by the cryptocurrency bitcoin, which is based on what is still the most widespread blockchain. But blockchains are being used for a whole lot more than making pseudonymous payments outside the traditional banking system. Because blockchains are distributed, an industry or a marketplace can use them without the risk of a single point of failure. And because they can’t be modified, there is no question of whether the record keeper can be trusted. Those factors have prompted a number of enterprises to build blockchains into essential business functions, or at least to test them there. Here are five ways your business could use blockchain technology today. Making payments Bitcoin introduced the first blockchain as a tool for making payments without going through the banks. But what if you work for a bank? Strangely, many of the features that made bitcoin distasteful to the banks are making the underlying blockchain technology attractive as a way to settle transactions among themselves in dollars or sterling. It’s public, so banks can see whether their counterparties can afford to settle their debts, and distributed, so they can settle faster than some central banks will allow. Ripple is one of the first such blockchain-based settlement mechanisms: Its banking partners include UBS, Santander, and Standard Chartered. But UBS and Santander are also working on another blockchain project called Utility Settlement Coin, which will allow them to settle payments in multiple currencies, with Deutsche Bank, BNY Mellon, and others. If these systems catch on, it’s surely only a matter of time before such blockchain payments trickle down to compete with traditional inter-bank transfer mechanisms such as SWIFT. Identity of Things On the internet, famously, no one knows if you’re a dog, and on the internet of things, identity can be similarly difficult to pin down. That’s not great if you’re trying to securely identify the devices that connect to your network, and it’s what prompted the U.S. Department of Homeland Security to fund a project by Factom to create a timestamped log of such devices in a blockchain, recording their identification number, manufacturer, available device updates, known security issues, and granted permissions. That could all go in a regular device-management database, but the DHS hopes that the immutability of the blockchain will make it harder for hackers to spoof known devices by preventing them from altering the records. Certifying certificates It’s not just devices that can be spoofed, but also qualifications. If you were looking to hire someone with blockchain expertise, and the applicant told you they had a professional certification, what would you do to check the certificate’s validity? Software developer Learning Machine hopes candidates will present their certificates in its mobile app, and that you will check their validity using Blockcerts. This is a way of storing details of a certificate in the blockchain, so that anyone can verify its content and the identity of the person to whom it was issued without the need to contact a central issuing authority. The certificates can be about educational qualifications, professional training, membership of a group, anything, so if your organization issues certificates, you could issue them on the blockchain, too. Learning Machine and co-developer MIT Media Lab have published details of Blockcerts as an open standard and posted the code to Github. Diamonds are forever Diamonds, they say, are forever, so that means whatever system you use to track them is going to have to stand the test of time too. Everledger is counting on blockchain technology to prove the provenance and ownership of diamonds recorded in its ledger. In fact, it’s using two blockchains: A private one to record information that diamond sellers need to share with buyers, but may not want widely known, and the public bitcoin blockchain to provide an indisputable timestamp for the private records. The company built its first diamond database on the Eris blockchain application platform developed by Monax but recently moved to a system running in IBM’s Bluemix cloud. Diamonds are eminently traceable as the uncut ones have unique physical characteristics and the cut ones are, these days, typically laser-etched with a tiny serial number. Recording each movement of such valuable items allows insurers to identify fraud and international bodies to ensure that trade in diamonds is not funding conflicts. Everledger CEO Leanne Kemp believes the system could transform trade in other valuable commodities, too. The company has identified luxury goods and works of art as possibilities. And finally, the pork But what about the pork? It may not be worth as much by weight as a diamond, but in China at least, it more than makes up for that in volume. And because pork is not forever, being able to demonstrate that a particular piece of it is fresh and fit for consumption can be vital. Pork is one of many products for which fine-grained tracking and tracing of inventory can be helpful, and happens to be the one Walmart is testing blockchain technology with. It’s using IBM’s blockchain to record where each piece of pork it sells in China comes from, where and how it is processed, its storage temperature and expected expiration date. If a product recall becomes necessary, it will be able to narrow down the batches affected and identify exactly where they are or, if they have already been sold, who bought them. The project may extend to other products: The company has just opened the Walmart Food Safety Collaboration Center (WFSCC) in China to work with IBM and industry partners to make food supplies safer and healthier using blockchain technology.

Court: It’s entirely reasonable for police to swipe a suspicious gift...

Enlarge401(K) 2012 reader comments 29 Share this story A federal appeals court has found that law enforcement can, without a warrant, swipe credit cards and gift cards to reveal the information encoded on the magnetic stripe.
It's the third such federal appellate court to reach this conclusion. Last week, the 5th US Circuit Court of Appeals found in favor of the government in United States v.

, establishing that it was entirely reasonable for Texas police officers to scan approximately 100 gift cards found in a car that was pulled over at a traffic stop. Like the previous similar 8th Circuit case that Ars covered in June 2016, the defendants challenged the search of the gift cards as being unreasonable. (The second case was from the 3rd Circuit in July 2015, in a case known as US v.

.) In this case, after pulling over the car and running the IDs of both men, police found that there was an outstanding warrant for the passenger, Courtland Turner. When Turner was told to get out of the car and was placed in the patrol car, the officer returned to the stopped car and noticed an “opaque plastic bag partially protruding from the front passenger seat,” as if someone had tried to push it under the seat to keep it hidden. The cop then asked the driver, Broderick Henderson, what was in the bag. Henderson replied that they had bought gift cards. When the officer then asked if he had receipts for them, Henderson replied that they had “bought the gift cards from another individual who sells them to make money.” As the 5th Circuit summarized: After conferring with other officers about past experiences with stolen gift cards, the officer seized the gift cards as evidence of suspected criminal activity. Henderson was ticketed for failing to display a driver’s license and signed an inventory sheet that had an entry for 143 gift cards.

Turner was arrested pursuant to his warrant. The officer, without obtaining a search warrant, swiped the gift cards with his in-car computer. Unable to make use of the information shown, the officer turned the gift cards over to the Secret Service.

A subsequent scan of the gift cards revealed that at least forty-three were altered, meaning the numbers encoded in the card did not match the numbers printed on the card.

The investigating officer also contacted the stores where the gift cards were purchased—a grocery store and a Walmart in Bryan, Texas provided photos of Henderson and Turner purchasing gift cards. Turner's lawyers later challenged the scanning, arguing that this "search" of these gift cards went against their client's "reasonable expectation of privacy," an argument that neither the district court nor the appellate court found convincing. The 5th Circuit also noted that while users have the “ability to re-encode the cards,” citing a device for sale on Amazon, the “time and expense it takes to purchase and use a re-encoding device to change at most a few lines of characters means it will rarely be worth doing for a lawful purpose.”

Retail, Certification Delays Slow Chip-Card Changeover

NEWS ANALSYS: With slow retail adoption, long queues for certification and a few lawsuits, the transition to chip cards is proving to be challenging. In March, five months after credit-card companies mandated a "liability shift" for most retailers who had not adopted chip-card technology, a Florida supermarket chain and a liquor store filed a class-action suit against Visa, MasterCard and other credit card issuers as well as several large banks.The lawsuit alleges that the mandated "liability shift" made the retailers responsible for more than $10,000 in charge-backs because they could not quickly adopt the technology and processes for handling the Europay-MasterCard-Visa, or EMV, standard for chip cards. The stores maintain that the mandate requires that, not only do they have to buy expensive equipment to process the cards, but they also have to become certified, a process that is "lagging months—and maybe years—behind, with no relief in sight.""What you have is a massively unfair and intentional Catch 22, where the very people who benefit from making these merchants pay under the Liability Shift are the people who imposed it and now control when, if ever, the merchants can get out from under it," Patrick J. Coughlin, counsel for the plaintiffs with Robbins Geller Rudman & Dowd, said in a statement.In early October, almost exactly a year after the shift began, a federal judge in California ruled on initial motions in the lawsuit, upholding the retailers' right to sue the financials firms. Other retailers, such as big-box giant Walmart and supermarket chain Kroger, have launched their own legal actions against payment-card companies for not requiring PINs. The lawsuits represent the stores' financial pain made manifest. While consumers have often been confounded by the initially slow processing of chip-card transactions and confused by the uneven adoption of chip readers at retailers, merchants have had to shoulder the expense and effort required for adoption.For some, it made little sense, George Rice, senior director of payments at HPE Data Security, told eWEEK."Some businesses looked at their exposure to fraud, and they look at that as less of a cost than upgrading their environment," he said. "A convenience store with an average $6 transaction does not see a need to fight charge-backs."The delays have resulted in a skewed distribution in adoption. While 80 percent of credit cards are now EMV-compliant chip cards, only 44 percent of U.S. card-accepting merchants have EMV terminals, and only 29 percent actually use the chip-card functionality to accept secure transactions, according to a survey conducted by the Strawhecker Group, a management consulting firm. The firm had previously surveyed merchants in January and had estimated that half would have implemented the technology.The EMV liability shift continues to be controversial. The payment-card firms' directive mandates that the least-compliant link in the chain of transactions—from the bank, to the retailer, to the payment card processor, to the card issuer—will be responsible for any fraud. If issuers have not issued new chip cards to their consumers, they are held financially responsible for fraudulent transactions. If retailers do not accept chip cards, then they are held responsible for the fraudulent transactions.Most retailers delayed their transition until after the busy Christmas season. The resulting avalanche of requests for certification, which initially was a very slow process, resulted in a clogged pipeline for servicing the firms, Jose-Luis Rojas, head of cards practice for Capgemini, a management consulting firm, told eWEEK.

Cops arrest hundreds of people allegedly involved in IRS phone scam

EnlargeBrendan Smialowski / Getty Images News reader comments 27 Share this story Hundreds of people in Mumbai, India have been detained in relation to a massive telephone scam where fake callers "from the IRS" targeted Americans.
In said calls, scammers tried to convince recipients that they were from the IRS in order to con victims into forking over thousands of dollars payable via prepaid credit cards. According to The Guardian, 200 Indian police officers raided nine locations across one of India’s largest cities. "Seventy workers have been formally arrested and around 630 others are being investigated," Paramvir Singh, the police commissioner of Thane, told the British newspaper. "We expect that many more people will be arrested." Typically, the phone representatives would call Americans and claim to be calling from the IRS, saying that the recipient owed "back taxes," and police are "on their way right now." The callers then would give precise instructions as to how to avoid this situation, which would inevitably involve withdrawing large amounts of cash and going to a store like Target or Walmart to buy a prepaid cash card or using a service like MoneyGram to transfer the money to a particular account. In May 2016, NPR’s Planet Money spoke with a representative from MoneyGram, who said that he gets "20 calls like this a day"—people calling MoneyGram to check to see if they received a fake call. "We had a mole go in to the call centres to verify.

The best part is that they were actually recording all their calls. We have recovered 851 hard disks on which the calls were recorded, so we’re going through those now," Singh told The Guardian. Reuters cited local police and reported that "callers were paid between 10,000 rupees ($150) and 70,000 rupees ($1,050) every month."

Trend Micro Password Manager 3.7

People these days are just as likely to place an online order from a smartphone or tablet as from a Windows or Mac computer.

That being the case, a password manager that's locked into a single device isn't much use. Recognizing that need, Trend Micro Password Manager 3.7 syncs your passwords and personal data across all of your Windows, macOS, iOS, and Android devices, with almost exactly the same appearance and functionality on all platforms.
It performs all the basic functions of a password manager, but it lacks the advanced features found in top products. You can take it for a test drive at no charge, but the free edition stores only five passwords and five secure notes.

At $14.95 per year, it's not expensive. You pay $39.99 per year for Dashlane 4.

But I do suggest taking advantage of that free, feature-limited trial to see if this is the service for you. During the installation process you must create a Trend Micro online account, or log into an existing account.
In addition to the overall account password, you must create a master password specifically for the password manager.

As always, it should be something complex that you can remember, but that nobody would guess.

Don't rely on the built-in password strength meter.

Any password of eight or more characters that includes all character types is accepted.
Something like "1Monkey!" gets the top rating for strength.
It shouldn't. Next you install the browser extensions for Chrome, Firefox, and Internet Explorer. Under Windows, this product is completely browser-centric.

The browser extension handles things like password capture and replay, and when you open the management console, it opens as a page inside your default browser. You can also log in to the console without installing the extension, perhaps when using a friend's computer. All three browsers have the built-in capacity to capture and replay passwords, but they're not as secure as an actual password manager.

Trend Micro offers to hoover up the insecure browser passwords, delete them from the browser, and turn off the browser's internal password management. Hoping to import your data from another password utility? That's not so easy.

Trend Micro only imports from LastPass 4.0 Premium. Capture and ReplayTo start using the password manager, you just log into secure sites as usual.

Trend Micro pops up a little window offering to save the credentials you've entered, with smaller links that let you skip that step once or always. LastPass, Dashlane, RoboForm Everywhere 7, and many others let you enter a friendly name for the entry at this time, and assign it to a folder. With Trend Micro, you must click a link to edit the new entry if you want to put it in a folder or choose something other than the default name. In testing, I found a number of sites for which Trend Micro simply would not capture my login credentials. LastPass, Sticky Password Premium, RoboForm, and a few others include specialized tools for handling non-standard login pages.

Trend Micro does not. When you return to one of the sites for which you captured credentials, the password manager offers to fill in that data.
If you've saved more than one set, you get to pick the one you want from a drop-down list. New in this edition, the most recently used is selected by default in that list. When you click the browser extension's toolbar button, it displays a colorful list of your saved sites. You can sort the list by name or by recent usage, with any items related to the current site automatically placed at the top.

Alternatively, each character you type in the search box narrows the displayed list to items that contain what you've typed.

And of course clicking an item navigates to the site and logs you in. Password GeneratorSince you have Trend Micro to remember passwords for you, there's no need to think up a password when you create a new account. Just let the password generator do it for you. The generator defaults to using all four character types (uppercase letters, lowercase letters, digits, and symbols), which is good. However, you should crank up the password length from its default of eight characters to at least 12, or 16, or even more. Hey, you don't have to remember the password.

Dashlane defaults to 12, and KeePass 2.34 creates 20-character passwords by default. Password DoctorGetting Trend Micro to remember all of your passwords is a good thing, but if those passwords all consist of your schnauzer's name, you've got more work to do. When you open Trend Micro's management console it displays two big stats at the top—the total number of passwords, and the number of unsafe passwords.
If the latter is non-zero, a link to the Password Doctor appears. Following that link gets you two lists, one of weak passwords and one of passwords you've used more than once.

As noted earlier, this program sets a pretty low bar for defining a strong password.
If it says your password is weak, it's really weak.

Clicking the Improve Now button logs in to the site, leaving you to make the necessary change.

The same is true of sites that use the same password. You get a more substantial security report from Dashlane's Security Dashboard or LastPass's Security Challenge.

The resulting reports list all of your passwords, with a percent-based strength rating for each.

These two products can also automatically update you to stronger passwords for many popular websites. LogMeOnce Password Management Suite Ultimate also has the ability to update passwords automatically. Web Form FillingThere's not a huge difference between filling in your credentials on a login page and filling in your address and contact details on a Web form. Like many password managers, Trend Micro lets you enter your personal details and use them to automatically fill in address, contact, and payment information. LastPass lets you define multiple identities and multiple credit card entries. With Dashlane you can define multiple entries of each data type, perhaps entering three phone numbers and four emails, for example. When you click in a field, it offers a menu of available choices.
I'm especially impressed with its handling of credit cards, which display as images using the color and bank logo you specify. RoboForm also allows multiples of all field types.

Trend Micro, by contrast, limits you to just a single profile, and a single entry for each field. When you click in a field it recognizes, it displays a button that you can click to fill the form automatically. Hovering over the button offers a preview of just which fields it can fill. New in this edition, you can turn off this feature if you don't want to see that button. To test this feature, I selected items on the Target website and went to check out as a guest, but Trend Micro didn't fill the form.

The same happened on a Walmart website, and on a site designed to test form-fill products.

Given that other products do fill in these forms, I figured that this feature wasn't working in Trend Micro. With help from my company contacts, I learned that was incorrect.

They showed me some sites where it did fill in most of the fields. My contacts confirmed that, as with filling login credentials, Trend Micro doesn't handle nonstandard forms.

Those are major retailers, however—their omission feels like an oversight.

For a sanity check, I tried those sites using LastPass and Dashlane; both of them filled the Web forms correctly. Bonus FeaturesWhen the browser extension detects that you're about to visit a known financial site, it offers to open that site in a secure browser. Presuming you accept, it captures your login credentials as always.

Thereafter, it opens the financial site in the secure browser without asking. The secure browser is based on Chrome, but doesn't support extensions other than Trend Micro, doesn't let you change settings, and offers a bare minimum of controls.

There's no Address Bar, just forward, back, refresh, zoom, and print.
It also reportedly has a feature to derail man-in-the-middle attacks, but my hacking skills aren't honed enough to put that feature to the test. You wouldn't know it without reading the documentation, but this product also comes with a Keystroke Encryption Tool.
I found it by tapping the Windows key and typing "keystroke." To use it, you type in your password, click a button to copy that password to the clipboard, and paste it into the password field before a timer runs out.
I verified that it prevented a popular keylogger from capturing keystrokes, but that same keylogger snagged the password out of the clipboard, unfortunately. Your best bet is to employ powerful antivirus software to keep the keylogger from loading in the first place. As noted, the product's interface and features are almost identical on Windows, macOS, iOS, and Android.

The Keystroke Encryption Tool is Windows-only, but that's not a big deal. Previously the mobile editions were stuck in portrait mode. Now the more-readable landscape mode is available for Android and iOS tablets.

Adding to the existing Touch ID support for iOS, fingerprint support is now available on Android as well. A Basic Password ManagerTrend Micro Password Manager 3.7 handles all the basics.
It captures passwords as you log in, plays them back when needed, and offers a browser menu of all your saved logins.
It keeps secure notes for you, and helps you fill Web forms.
It even offers a secure browser for your financial sites. On the downside, it's baffled by unusual login pages and Web forms, and it lacks advanced features such as two-factor authentication, secure credential sharing, automatic password update, and digital legacy (naming someone to inherit your passwords). If you get this password manager free as part of Trend Micro Maximum Security, by all means use it.

But if you're a paying customer, consider our Editors' Choice password manager utilities, Dashlane 4, LastPass 4.0 Premium, and Sticky Password Premium. Back to top PCMag may earn affiliate commissions from the shopping links included on this page.

These commissions do not affect how we test, rate or review products.

To find out more, read our complete terms of use.