Blog Posts Tagged with "VPN"
For Cybersecurity, It’s That Time of the Year Again
October 17, 2019 Added by:Assaf Harel
It’s a race against time and a reactive security approach that waits for a vulnerability to be discovered and then issues patches is lacking, to put it lightly.
Comments (0)
Hackers Exploited Heartbleed Bug to Steal Patient Data from Community Health Systems
August 19, 2014 Added by:Mike Lennon
TrustedSec, citing sources familiar with the incident, said on Tuesday that the initial attack vector was through the infamous “Heartbleed” vulnerability in OpenSSL which provided the attackers a way in, eventually resulting in the compromise of patient data.
Comments (0)
A Closer Look at the Android VPN Flaw
February 17, 2014 Added by:Patrick Oliver Graf
The recent revelation from Ben Gurion University of malicious apps that can be used to bypass VPN configurations and push communications to a different network address changes the conversation entirely.
Comments (0)
Android VPN Vulnerability Allows Data Interception in Plain Text
January 20, 2014 Added by:Anthony M. Freed
Security researchers at Ben Gurion University in Israel have disclosed the discovery of a vulnerability in Android devices that would allow an attacker to bypass VPN configurations to intercept what are intended to be secure communications.
Comments (0)
Developing a Comprehensive Remote Access Security Framework: Network Health and Trust
November 14, 2013 Added by:Patrick Oliver Graf
The need for a comprehensive remote access security framework cannot be emphasized enough. Those looking for proof of this concept need look no further than the recent Adobe hacking, and the chilling implications it has on network security.
Comments (0)
Vehicle VPNs, Part Two: Business World Implications
November 05, 2013 Added by:Patrick Oliver Graf
Using a VPN to secure your car is no different than using one to safeguard the connections initiated from your smartphone or tablet. Any device, as small as an iPhone or as large as an SUV, should be equipped with the best security features before remotely accessing a corporate network.
Comments (0)
Do You Plan to Use the Per App VPN Feature in iOS 7?
September 24, 2013 Added by:Patrick Oliver Graf
Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any easier. However, with several new business-centric features now included in the upcoming iOS 7 release, that could all be about to change.
Comments (0)
Why Elliptic Curve Cryptography is Necessary for Secure Remote Access
August 26, 2013 Added by:Patrick Oliver Graf
Experts warn that within the next several years, the RSA public key cryptography system could even potentially become obsolete. If that is the case, how will enterprises be able to ensure secure remote access in the near-future?
Comments (1)
Infographic: Staying Safe While Using Public Wi-Fi
May 01, 2013 Added by:InfosecIsland News
To help users avoid online fraud and malware risks, ThreatMetrix provided the following infographic which highlights several scenarios of how cybercriminals can access sensitive transactions over public networks.
Comments (2)
Security Risks of Telecommuting
March 06, 2013 Added by:Allan Pratt, MBA
In today’s work environment, costs are skyrocketing, but one way to reduce costs is to offer a telecommuting option for employees. While it may be easier for telecommuting employees to perform their work at home or in the field, the process doesn’t happen without posing serious security risks.
Comments (5)
Making Sense of Split Tunneling
January 20, 2013 Added by:Patrick Oliver Graf
Split tunneling is not a new concept in the realm of remote access networking. The technology emerged in the 1990s to allow VPN users to access a public network and a LAN or WAN simultaneously. But despite this longevity, its merits and security continue to be disputed...
Comments (70)
Why doesn't your VPN work on the road?
October 29, 2012 Added by:Rainer Enders
With the ubiquity of mobile devices, staying securely connected to work - in theory - should require nothing more than an internet connection, and seemingly everywhere you travel, whether that be in hotels, airports, or conference trade shows, offer such connections. But the reality is more complicate...
Comments (0)
The Undervalued Security Benefits of IPsec
October 26, 2012 Added by:Rainer Enders
For too long, IPsec struggled with a reputation of being cumbersome to implement and manage. However, even amid the harshest of its critics, its ability to secure data has rarely, if ever, come into question. Now, through advancements in the technology's infrastructure, IPsec has become easy to use...
Comments (0)
Chapcrack and CloudCracker Unlock MS-CHAPv2-Based VPN Traffic
September 06, 2012 Added by:Dan Dieterle
A recently released article explains in detail how to crack MS-CHAPv2 communication used in many PPTP based VPNs with a 100% success rate. But that is not all, the protocol is also used in WPA2 enterprise environments for connecting to Radius authentication servers. Ouch...
Comments (0)
BYOD too Big for Twitter...
July 29, 2012 Added by:Boris Sverdlik
It's not a question of technology, it really isn't. The one problem that we keep running into is that user's don't want us installing things on their personal devices. It's the whole entitlement mentality that our users have somehow attained through all of our babying. That's the cost of using their resources...
Comments (1)
Security is Your Responsibility When Using Free Wi-Fi
July 17, 2012 Added by:Dale Rapp
Free wireless hot spots deliver a high-speed internet connection, but this convenient no hassle access to the internet comes with a lack of security. This doesn't mean you should avoid accessing a free wireless hot spot, it just means you need to be aware of how to protect your device when you do...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider