The dark side of remote maintenance

Another first for 2016: at the weekend, another unprecedented event occurred which left significant numbers of Deutsche Telekom customers with difficulties accessing the internet or no internet access at all. As is now widely known, the outage was caused by a malicious attack – which was not entirely successful ­­− rather than a technical fault. The attackers attempted to exploit the TR-069 protocol used on customer routers and add them to a bot net. 900,000 users are reported to have been affected.

read more

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, is still in its infancy and users are only just beginning to scratch the surface of its full potential. Even so, things are already heating up for dealers in Bitcoin. This year, the total value of Bitcoin transactions is expected to exceed $92bn – up around 240% from under $27bn in 2015. Bitcoin transactions typically make use of aliases or nicknames to disguise user identities but this does not make them anonymous. However, the combination of a virtual private network (VPN) and Bitcoin can guarantee privacy. The encrypted connection provides a cloak of invisibility for all transactional data and provides complete anonymity for buyers if they want it. This is especially true when purchasing digital goods like software, books, reports, databases and so on.

read more

Making IIoT Security More Robust

Once again Internet-connected gadgets, also known as the Internet of Things (IoT), are expected to be a gift for retailers this Christmas in helping them towards bumper sales. However, in many ways, the hyperbole surrounding consumer IoT is a mere side-show. According to McKinsey Global Institute, the real value of IoT lies with industry. McKinsey expects factories to be the top market for Industrial Internet of Things (IIoT), accounting for $3.7 trillion per year by 2025. Presently, IoT technology in general is relatively immature. Issues such as security and manufacturing standards are still the subject of much debate. However, the primary focus of the world’s professional engineering bodies is how to make IIoT more robust. In this respect, Virtual Private Network (VPN) technology has an important part to play by ensuring data traffic is secured at device-level and encrypted at all times.

read more

IT security in the health sector

More and more devices in doctor’s offices and hospitals are connected to networks. Diagnoses and therapies are now stored digitally at hospitals, laboratory reports are transmitted over the internet and hospitals and health insurance companies communicate digitally. As these systems process highly sensitive patient data, they must meet extremely high security requirements. This has not always worked in practice with incidents occurring on an annual basis (1). The cost of ransomware attacks – which have recently increased sharply in the health sector – are extremely high. In February 2016, blackmailers demanded USD 5.77 million from a hospital in California.

read more

Internet Security Programs for Students

The Internet is a wondrous place. The most convenient and massive source of information. You have the luxury of accessing any web-site with a simple mouse click. Particularly useful for students. It allows everyone to find and compile all the relevant information quickly; explore popular tourist destinations; find recipes for tasty meals or maybe even get some professional help from Australian assignment writers.

read more

Is Mobile Security Broken?

The way we work has changed. Our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also freely chat and collaborate with colleagues, customers or suppliers one-to-one or in groups using an array of cloud-based productivity apps. When it comes to mobile, the conventional security model is broken. Traditional detection and software patching techniques simply cannot keep pace. In its place, arguably one of the most reliable ways to keep sensitive proprietary data safe is mobile VPN.

read more

Vote of confidence for IT security made in Germany

Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden’s revelations, CEOs understandably feel uncomfortable when their IT infrastructure consists of routers and switches from different vendors. Some companies are known to have been affected by the efforts of the American National Security Agency (NSA) either through code manipulation or backdoors in certain products. In relation to these developments, the quality label of IT security made in Germany carries even more weight.

read more

Banking on VPNs

Almost everyone in business has reason to be grateful for the existence of SWIFT, the international banking and funds transfer network. VPNs have a crucial role in SWIFT’s security, but following a series of successful attacks over the past 12 months it appears that not all banks – especially ones in less developed economies – have made security their top priority. The answer may lie with regulators insisting that VPNs are used not just in the core of the SWIFT network, but also as part of improvements to security measures at its outer limits.

read more

Stay up to date

Subscribe for email updates

Connect With Us

Contributing Member

Want to contribute?

Want to contribute? Drop us a line at editor@vpnhaus.com