TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»Top risks and symptoms that stronger security is needed –
    Cyber Security

    Top risks and symptoms that stronger security is needed –

    February 28, 2019Updated:February 28, 2019No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Virtual private networks, or VPNs, were created to provide a secure tunnel in which user activity can be carried out in privacy. In this way, VPNs have been utilized by individual users, as well as to support business processes for several years, and their use is only growing.

    According to current statistics, nearly 25 percent of all users have leveraged a VPN for some type of online activity within the last month. This includes 17 percent who access a VPN through their desktop, 15 percent who use a mobile smartphone and 7 percent who connect with the private network through a tablet. Those that do utilize VPNs are also leveraging these networks more frequently than ever before – 35 percent of those that access a VPN through their desktop do so on a daily basis.

    While users hope and expect that VPNs will live up to their name and truly support a virtual and private connection, research shows that this is not always the case.

    How does a VPN work?

    As ZDNet contributor Steven J. Vaughan-Nichols explained, traditional VPNs leverage a combination of security techniques – including robust encryption, IP security, Layer 2 Tunneling Protocol, as well as Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Bringing these technologies together, a VPN can then provide a “virtual encrypted ‘tunnel,’” between end-user devices and the VPN server, supporting security and providing a shield against prying eyes or unauthorized access.

    “Worried about your ISP snooping on you? Is someone on your coffee shop’s Wi-FI looking [over] your network shoulder? Or, is Joe A. Hacker bugging your internet?” Vaughan-Nichols wrote. “A virtual private network (VPN) can help protect your privacy.”

    This promise of privacy and security has made VPNs a popular option for individual users, as well as enterprise employees. Particularly in cases where remote employees must be able to securely access company infrastructure platforms and applications, a VPN can offer an encrypted and protected path for access and user activity.

    In order to leverage a VPN, users must either set up a VPN server themselves – a time-consuming and complex process – or make use of one of the many VPN services available today. However, as Trend Micro researchers discovered, not all of these solutions make good on VPN’s main tenets of privacy, security and encryption.

    A malware-infected VPN can create security issues for your connection.

    When is a VPN not secure?

    There are several scenarios which can result in unsecure VPNs, which fail to provide a protected and anonymous user connection:

    Malware infection

    Rather obviously, a VPN that is infected with malware puts the security and privacy of the connection in jeopardy. In some cases, VPNs are infected after the fact. However, one study of more than 200 VPN apps within the Google Play Store discovered that malware can also come as part of the package – more than one-third of the VPN apps studied by researchers contained malware that included the capability to track users’ online activity, directly contradicting the purpose of a VPN.

    As Vaughan-Nichols noted, this issue is more common than some might assume.

    “There’s one fundamental concern with VPN services: Can you trust them not to track you?” Vaughan-Nichols wrote. “Some VPNs keep records of where you go on the net. If privacy is a real concern for you, check your VPN’s terms and policies to see if they keep logs of your online activities. If they do, look for another VPN.”

    Lack of proper security

    In other cases, it’s not malware that presents the issue, but insufficient security techniques. VPNs in this category don’t include the type of robust encryption or other protection technologies that enable the creation of a secure and private connection.

    What an insecure VPN looks like: Real-world case

    Researchers have also found instances where VPNs simply leak user information, including sensitive data like IP addresses. Such was the case with the popular service, HolaVPN by Hola Networks Ltd. This network service not only exposed users’ IP addresses through their individual web browsers, but also stole user bandwidth, further complicating the security issues associated with it.

    As CNET contributor Claire Reilly explained, Hola was not transparent with users about its peer-to-peer VPN operation, which could enable users to browse through other users’ internet connections. Experts urged users to avoid the platform, calling its operations similar to that of a “poorly secured botnet.”

    “Hola’s VPN service features ‘vulnerabilities’ which allows third parties to execute code on a user’s system, track them online and ultimately ‘take over your entire computer, without you even knowing,’” Reilly wrote.

    The case of HolaVPN is a staunch example of the issues that can emerge with an insecure VPN. Current data shows that Hola Networks’ is being utilized by 8 million Google Chrome extension users.

    What an insecure VPN means for enterprise security

    While the consequences of using a substandard VPN may be dangerous for the individual user, these issues are only compounded in an enterprise setting.

    As Trend Micro researchers noted, if an end user is leveraging an insecure VPN as part of their professional, corporate work, this connection could put the entire enterprise at risk of compromise.

    “HolaVPN could enable attackers to circumvent corporate firewalls and allow them to explore the internal network of a company for nefarious purposes,” our Trend Micro researchers explained.

    What’s more, cybercriminals could also utilize VPN vulnerabilities to carry out malicious, dangerous and even illegal activities, which then appear to be stemming from a VPN user’s device.

    Selecting the right VPN

    These vulnerabilities and security issues connected with certain VPNs does not mean that organizations must abandon the practice of using them. As Trend Micro noted in our recent white paper, “Illuminating HolaVPN and the Dangers It Poses,” it’s imperative to stay away from VPNs that are known to be insecure.

    When selecting a VPN, it’s important to find a platform that does not track user activity. As noted, reading closely through the VPN’s terms and conditions can help illuminate these practices.

    In addition, ConsumerReports recommended finding a VPN provider that includes a large volume of servers within its network infrastructure. TunnelBear, for instance, boasts connection locations in more than 20 countries, and automatically connects users to the closest point. This not only helps bolster security, but can also help enhance performance.

    To find out more about the risks that an insecure VPN can pose to your organization, check out the research in our white paper, and connect with our Trend Micro security experts today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.