Cisco business routers targeted after patch, at least 9,000 vulnerable
Attackers scope out two Cisco router bugs two days after patches were released.
Attackers scope out two Cisco router bugs two days after patches were released.
Governments must be held to higher standards than private enterprises, a former deputy head of the US National Security Agency has said as he backs user behaviour monitoring technology that might have helped his employer catch Edward Snowden before his infamous leaks.
David Braue | 14 Aug | Read more
Developers are demanding answers from Apple after a $400-a-month iPhone VPN become a top grossing app on the App Store.
On October 13, 2015, the Metadata Retention law came into play. On that sad and gloomy day, Australian Federal House of Representatives passed the law labeled “Metadata Retention Law.” The law forces internet service providers (ISPs) and telecommunications companies to keep track, collect and store the communication data of internet users.
Virtual private network (VPN) connections designed to keep data safe from snooping eyes may be vulnerable to two forms of network attacks by malicious parties with access to a local network, a research paper (PDF) explained on June 30. The founders of Cloak, a VPN service with native iOS and OS X apps, say that the more severe of the two vulnerabilities also exists in iOS's most deeply integrated VPN protocol, and can't be mitigated without Apple's involvement.
Glenn Fleishman | 03 Jul | Read more
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Katherine Noyes | 02 Jul | Read more
Despite criticisms and public outcry, Verizon isn't giving up on its UIDH "perma-cookie" advertising program--but the company will give subscribers a larger say in the matter. Verizon customers will soon have the ability to opt-out of the UIDH program.
We've talked before about the importance of virtual private networks (VPNs) to keep you safe and protected when using open Wi-Fi networks. The downside of VPN's, however, is that some need manual set-up, requiring you to muck around with the built-in VPN client in Windows or a third-party client like OpenVPN.
The Tor Project said on Friday that the online anonymity network may go dark in coming days due to an attempt to incapacitate it.
Verizon Wireless has kicked up something of a privacy scandal in recent days over how it tampers with user's web traffic sent via the company's wireless network. Hoping to cash in on lucrative advertising dollars from mobile devices, Verizon inserts a unique string of letters and numbers into individual users' HTTP requests that can be used to identify a specific device.
The fallout from the OpenSSL Heartbleed bug continues. Recently, personal virtual private network provider Mullvad said it was able to extract private encryption keys for OpenVPN from a test server.
Melanie, concerned about online privacy, asked the Antivirus & Security Software forum who can see her IP address and how serious a problem that is.
Lincoln Spector | 17 Mar | Read more
Increasing use of mobile and cloud-based services to store mission-critical data is raising the profile of enterprise data-encryption services, but a survey of Australian executives suggests that immature encryption-key management continues to compromise the technology's potential benefits.
David Braue | 27 Feb | Read more
A VPN bypass flaw discovered last week in Android Jelly Bean 4.3 also exists in the latest version of Google's mobile operating system, KitKat 4.4, Israeli researchers say.
Antone Gonsalves | 30 Jan | Read more
Cisco Systems has released security patches for authentication bypass, command execution and denial-of-service vulnerabilities affecting products that use its Adaptive Security Appliance (ASA) software, as well as the Cisco Catalyst 6500 series switches and Cisco 7600 series routers.
Lucian Constantin | 11 Oct | Read more