VPN Privacy & Security
Latest about VPN Privacy & Security

Devious new cyberattack leaks secrets from LCD screen noise on air-gapped computers
By Sead Fadilpašić published
An LCD display can emit frequencies that can be translated to secrets.

Ivanti patches serious endpoint management software security bugs, so update now
By Sead Fadilpašić published
The company fixed a maximum severity flaw allowing for remote code execution through its Endpoint Management tools

Barely any businesses are really that confident about their security protection
By Sead Fadilpašić published
While cyberattacks rise, confidence is at a low, survey finds.

Manufacturing sector AI and cloud app adoption is giving hackers even more ways in
By Sead Fadilpašić published
The adoption of cloud and AI apps in the manufacturing sector is on the rise, giving hackers new ways in.

SEO poisoning and VPN spoofing used to target anything and everything with WikiLoader malware
By Sead Fadilpašić published
Palo Alto saw its VPN tool being spoofed to spread malware through fake websites.

Post-quantum encryption standards are here – a new era for VPN security begins
By Chiara Castro published
It's only a matter of time before quantum computers can break traditional encryption. NIST's new standards mean the cat-and-mouse game of cybersecurity continues.

3 cybersecurity threats that could rock the Olympics
By River Hart published
The Olympics is a celebration of physical achievement – but that doesn't mean there aren't digital dangers. Here's what you need to know.

The AT&T data breach can still trace back to you directly - here's how to stay safe
By River Hart last updated
"Nearly all" AT&T customers impacted by 2022 leak revealing call and text records - here's what you need to know.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.