AWS wants to replace VPNs with Verified Access
AWS introduced Verified Access. The service allows users to set conditions that devices must meet to access applications. AWS positions Verified Access as a more effective alternative to virtual private networks (VPNs).
During the announcement, the tech giant pointed out the disadvantages of VPN... Read more
Windows 11 may get a VPN indicator in the taskbar
Windows 11 may soon have a system tray indicator that alerts you whether your machine is linked to a VPN, allowing users who want to surf secretly to verify they are connected.
When you connect to a VPN server, your Internet connections flow through the provider's IP addresses, keeping the websi... Read more
German security authority certifies the security of iPhones and iPads
The German Federal Office for Information Security (BSI) investigated the overall security of iOS and iPadOS smartphones and tablets. The analysis confirmed the efficacy of Apple's integrated security functions.
The BSI concluded that the applications for e-mail, calendar and contacts incorporat... Read more
Google Play plans to ban Android VPN apps that block ads
Google will prevent Android VPN apps listed on the Play Store from tampering with or restricting advertising beginning in November. The shift may cause issues for privacy applications.
The revised Google Play policy, which was revealed last month, will go into force on November 1. It specifies t... Read more
Microsoft Edge to bring VPN-style encryption to users via Cloudflare
Microsoft Edge will soon be able to encrypt an internet connection to safeguard user privacy and data. Even for Insiders, Microsoft Edge Secure Network is a preview functionality that is not yet accessible. However, Microsoft's website has a help page for it.
The partnership between Microsoft an... Read more
DNS data is a gold mine, but integration is necessary
The DDI market displays strong growth. The importance of good and thorough DNS, DHCP and IP address management has been well established by now. Now it's time to take the next steps. How do you get even more value out of DNS data? We discussed this this with Martin van Son, Senior Account Executive... Read more
Hackers use unknown user accounts to attack Zyxel firewalls and VPNs
Network device manufacturer Zyxel, is warning customers of active and ongoing attacks targetted at a range of the company’s firewalls and other types of security devices. In an email, the company said that the targeted devices include appliances fitted with remote management or are SSL VPN enable... Read more
IoXt expands mobile and VPNs security compliance program
Mobile security has never really been standardized. Now, 20 companies are coming together to collaborate with the Internet of Security Things Alliance, to provide a new set of security and privacy requirements for VPNs and mobile applications.
The companies include NowSecure, Google, Amazon, DE... Read more
Microsoft bets on zero trust using identity, compliance and skills
Microsoft is betting big on the zero-trust, an approach to computer security pioneered by Google. Many updates will be available to customers after an announcement at Ignite 2021. The updates are aimed at offering protection for devices, data, platforms, identities, and clouds.
Zero Trust is a s... Read more
Law enforcement taskforce takes down cybercriminals in ‘Operation Nova’
In a joint law enforcement operation that comprised of the US Federal Bureau of Investigation, the European Union Agency for Law Enforcement Cooperation, and other national police forces, three virtual private network services and web hosting provisions used by cybercriminals were taken down.
Th... Read more