Flaw in popular VPN service may have exposed customer data

NordVPN praised its bug bounty program and said that a fix had been shipped within two days. NordVPN, one of the most popular virtual private network (VPN) services, has fixed a security flaw that is said to have exposed customers’ email addresses and other information. The security hole was linked to three payment platforms used by NordVPN … More Flaw in popular VPN service may have exposed customer data

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

In the early days of the internet, it was quite common for local networks to run their own domain name service (DNS). DNS was invented as a solution for allowing internet users to query remote servers via friendly, easy-to-remember names like google.com. Names are much easier to remember compared to more abstract IP numbers like … More The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

Majority of the world’s top million websites use HTTPS

The adoption of the protocol’s secure variant has continued its growth spurt in recent months, crossing the 50-percent milestone for the first time ever. More than one-half (51.8 percent) of the one million most visited websites worldwide now actively redirect to HTTPS, the secure version of the HTTP protocol over which data between a device … More Majority of the world’s top million websites use HTTPS

All HTTP websites to soon be marked as “not secure” by Google Chrome

If you’re still running a website that is still using insecure HTTP then it’s time to wake up and drink the coffee. Because unless you take action soon, you’re going to find many of your visitors are going to distrust your website. The reason? Google is pushing ahead with its plan for the Chrome browser … More All HTTP websites to soon be marked as “not secure” by Google Chrome

Homograph attacks: Don’t believe everything you see

Just as attackers are finding new, increasingly sophisticated ways to try and evade the detection techniques used by antiviruses, they are also improving their methods designed to trick the user or at least evade the main techniques that tend to be taught in standard IT security training. Despite this, we can always take another step forward to strengthen … More Homograph attacks: Don’t believe everything you see