Researchers uncover attack to ‘decloak’ VPN traffic

A novel network technique that bypasses VPN encryption has been revealed by security researchers at Leviathan Security. Dubbed "decloaking," the technique allows an attacker to force a target's traffic off their VPN tunnel by exploiting DHCP (Dynamic Host Configuration Protocol) functionality built into operating systems.  

The result is that the user's traffic is transmitted unencrypted, enabling an attacker on the same network to snoop on their activity—despite their...

The key to complete online independence is through crowdsourced VPNs

Geolocation is a key pillar of how the internet functions. Previously founded on the egalitarian principle of complete transparency and total openness is now routinely altered by geolocation services. Simply put, this means that users can access various sets of websites based on where they are surfing the web from. This results in online information silos, which have negative consequences such as restricting knowledge sharing, limiting cultural interchange, and allowing political discourse...

Asavie: Telecoms sector reports being targeted most by cyberattacks

A study conducted by Asavie into the challenges presented by COVID-19 to businesses has found that cyberattacks are the leading concern.

While an increase in home working has opened up new opportunities and productivity benefits, it’s also added new security challenges. Hackers are taking advantage of security gaps.

30 percent of the businesses in the study declared that enabling remote work and secure VPNs was a challenge. Many employees have become their own IT...