vpn

  1. Father

    Google's Proprietary VPN Goes to the Digital Graveyard

    What is the reason for the company's decision to bury its next service? No sooner did we tell you about the problems with Windows network adapters that were caused by the incorrect operation of Google's proprietary VPN, Dobra Corporation suddenly announced the imminent termination of this...
  2. Father

    Not a bug, but a feature: why Google's VPN service breaks network adapter settings

    The problem has been around since November, but no one seems to be planning to fix it. As you know, Google has long provided its own VPN service as part of a monthly Google One subscription. It was initially only available on mobile devices, but was later rolled out to desktop platforms as...
  3. Teacher

    Brutus attacks VPN products en masse: what are hackers trying to achieve?

    A dangerous botnet changes IP addresses like gloves, just to avoid detection by security systems. Cisco published recommendations for its customers on how to protect against password-guessing attacks targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices. The...
  4. Teacher

    Zuckerberg wanted to know everything: Facebook spied on competitors using a VPN service

    The company's MitM attack is disclosed in court documents. In 2016, Facebook launched a secret project called "Project Ghostbusters," which aimed to intercept and decrypt traffic between Snapchat users and its servers. The information came to light thanks to documents disclosed in a...
  5. Teacher

    VPN trap for Android: how apps turn smartphones into zombies

    The malicious library makes the user an accomplice in online fraud. 28 free VPN apps on Google Play used a malicious SDK, turning Android devices into resident proxies, probably used for cybercrime and bots. The HUMAN found that malicious apps used the LumiApps SDK, which contained the...
  6. Teacher

    What should I ask my VPN provider before buying?

    Hello! Choosing a VPN service may cause some problems. You may not trust your Internet service provider to protect your privacy (and, as the US FTC recently concluded, you really shouldn't). Perhaps you don't trust your government. You may not even trust all governments and corporations. Be that...
  7. Teacher

    Cisco выпускает исправление для серьезной ошибки перехвата VPN в защищенном клиенте

    Cisco выпустила исправления для устранения серьезной ошибки безопасности, влияющей на ее программное обеспечение Secure Client, которое может быть использовано субъектом угрозы для открытия сеанса VPN с целевым пользователем. Компания, производящая сетевое оборудование, описала уязвимость...
  8. Brother

    Disable can't be fixed: China uses 0day in Ivanti VPN to spy on the whole world

    The massive exploitation of Ivanti vulnerabilities caused panic among federal agencies. Cybersecurity company Censys has discovered that hackers allegedly working for the Chinese government are massively exploiting critical vulnerabilities in Ivanti's virtual private networks (VPNs), gaining...
  9. Brother

    To prison for VPN: the forum administrator signed a guilty verdict

    Pompompurin incarcerated himself in just a few clicks. Conor Brian Fitzpatrick, also known as Pompompurin, violated the conditions of pre-trial parole by using a computer without the necessary monitoring service. FBI agents arrested the former administrator of the liquidated hacking forum...
  10. Brother

    Be careful with pirated games: how malicious VPN extensions steal data from Google Chrome

    The programs have already received more than 1.5 million downloads in the Chrome Web Store. Experts from ReasonLabs found three malicious extensions for the Google Chrome browser masquerading as virtual private network (VPN) services. These programs, which were used to intercept sessions, hack...
  11. Carding 4 Carders

    South of Russia faces difficulties in accessing VPN and Telegram

    Is there a complete VPN blackout in Russia? Recently, residents of the southern regions of Russia have encountered problems accessing VPN services, including those based on the Shadowsocks proxy protocol. This protocol allows you to bypass the blockages set by Internet service providers. It is...
  12. V

    Matrix Personal Messenger / Personal VPN | Личный мессенджер Matrix / Личный VPN

    Предоставляю услуги: 1. Подниму свой личный мессенджер Matrix на личном сервере Хотите свой собственный мессенджер? Без проблем! Я создам его для вас. Конфиденциальность и безопасность. (по завершении заказа все данные передаются вам) 2. персональный VPN на личном сервере Устали от блокировок...
  13. Carding 4 Carders

    Programmer fined 14 million rubles for using VPN

    This is probably the largest fine for trying to circumvent state censorship. In northern China, a programmer was issued a penalty notice worth more than 1 million yuan for using a virtual private network (VPN). This is probably the largest individual financial penalty for circumventing the...
  14. Carding

    VPN and Privacy: what's really going on?

    More than 60% of users violate laws on the protection of user data. VPN services have become an essential tool for ensuring user privacy. However, a study by PrivacyTutor showed that VPN services designed to provide privacy on the network are not always such. Of the 144 services analyzed, more...
  15. Carding

    VPN in stealth mode: Disguised servers as the next level of privacy

    Why regular private networks are not so secure. VPNs are useful for maintaining anonymity on the Internet. When traveling, they give you access to content that is blocked on the territory of another country. People who use unwanted services such as torrents are helped to circumvent the...
  16. Carding

    A series of TunnelCrack attacks aimed at intercepting VPN traffic

    A group of researchers from New York University has developed two methods of attacking VPNs, presented under the name TunnelCrack. The identified vulnerabilities allow an attacker who controls the victim's wireless access point or local network to redirect requests to the target host to their...
  17. pepepotato

    Recommended Startup Capital for pursuing Carding

    Hello! My name's Pepepotato, passionate learner & beginner carder. I would like to ask a simple question to the professionals. You see, I've been planning on formally starting my journey as a carder. however, because of my financial state, I'm currently unable to pursue it with confidence. I've...
  18. Lord777

    VPN: what is it and how to use it

    With the transition to remote control, even more users thought about how to protect themselves not only on the street and from the virus, but also on the network. In the article below, we will analyze in detail such a tool as VPN: What is a VPN? Why is it needed What is the difference between...
  19. Lord777

    Anonymous VPN+TOR+VPN Chain

    As you probably know, the VPN-TOR-VPN chain provides very good anonymity on the network. In today's article, you will learn how to install this chain on your computer. I wish you a pleasant reading! We will need a computer or laptop with Windows installed, VirtualBox, a whonix-Gateway image, a...
  20. Lord777

    The difference between VPN, Socks, SSH, Tor and PPT. Which is better?

    Today's topic will help clarify the minds of beginners, as well as anyone who is just starting to learn the basics of anonymity on the Web. We'll look at the differences between anonymity tools such as VPN, SOCKS, SSH, TOR, and PPT. 1) VPN: VPN - encrypts all traffic from prying eyes, hides our...
Top