What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in vpn

Stay safe online anywhere with this innovative decentralized VPN

Enjoy a better, safer browsing experience for the remote working world with this exceptional deal. Image: StackCommerce In our deeply online world, cybersecurity should be a primary concern for most businesses, especially those allowing employees to work remotely. While your employees might enjoy being able to work in a coffee . . . Read more

Cybercriminals Ramp Up Exploits Against Serious Zyxel Flaw

More than 100,000 Zyxel networking products could be vulnerable to a hardcoded credential vulnerability (CVE-2020-29583) potentially allowing cybercriminal device takeover. Security experts are warning hackers are ramping up attempts to exploit a high-severity vulnerability that may still reside in over 100,000 Zyxel Communications products. Zyxel, a Taiwanese manufacturer of networking . . . Read more

Leading Game Publishers Hit Hard by Leaked-Credential Epidemic

Over 500,000 leaked credentials tied to the top two dozen leading gaming companies are for sale online. Leading gaming companies, such as Ubisoft, have become big targets for cybercriminals that aim to turn a profit by selling leaked insider-credentials tied to the top game publishers. Over 500,000 stolen credentials tied . . . Read more

Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks

Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks. A recently uncovered zer0-click Apple zero-day flaw, used in a spyware campaign against Al Jazeera journalists, shed light this week on the impact of Apple security issues being . . . Read more

Think-Tanks Under Attack by APTs, CISA Warns

The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and more), using phishing and VPN exploits as primary attack vectors. The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a warning on what they say are persistent, continued cyberattacks by advanced persistent threat . . . Read more

Defining Security Policies to Manage Remote Insider Threats

This is the time to define the new normal; having well-defined policies in place will help businesses maintain its security posture while bolstering the security of the ever-increasing work-from-home population. Even as state and local governments begin to relax COVID-19-related stay-at-home orders, many businesses have adapted to having more people . . . Read more

Some Apple Apps on macOS Big Sur Bypass Content Filters, VPNs

Attackers can exploit the feature and send people’s data directly to remote servers, posing a privacy and security risk, researchers said. Security researchers are blasting Apple for a feature in the latest Big Sur release of macOS that allows some Apple apps to bypasses content filters and VPNs. They say . . . Read more

Election Systems Under Attack via Microsoft Zerologon Exploits

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.