VPN apps

AppWizard
September 29, 2024
A new strain of malware called Octo2 is spreading across Europe, targeting Android phone users. Discovered by ThreatFabric, Octo2 disguises itself as popular applications like Google Chrome and NordVPN. Once installed, it allows hackers to control the device, capture on-screen activity, intercept messages, and log keystrokes, facilitating identity theft and phishing schemes. The malware is primarily distributed through unofficial app stores and currently affects users in Italy, Poland, Moldova, and Hungary, with potential for global spread. Octo2 is believed to be a successor to the original Octo trojan, which had a wide reach before its source code was leaked, prompting the development of Octo2. Users are advised to download apps only from the Google Play Store and remain vigilant about app permissions and developer credentials. Google Play Protect automatically protects Android users from known versions of this malware.
AppWizard
July 12, 2024
- VPNs for Android create an encrypted tunnel to protect personal information on public Wi-Fi and bypass geo-restrictions. - Top features for Android VPN apps include AES-256 encryption, no-logs policy, kill switch, split tunneling, and a broad network of servers. - Top VPN picks for Android in 2024 include NordVPN, ExpressVPN, Surfshark, and ProtonVPN. - Modern VPNs for Android focus on performance, usability, privacy, and security advancements. - Using a VPN is essential for Android users in 2024 to ensure privacy and security online.
AppWizard
June 19, 2024
- Private Internet Access (PIA) plans to launch an Arm version of its app, waiting on Microsoft for driver signing certificate. - ExpressVPN also working on a build for Windows Arm PCs, excited about Arm chips' performance. - Most VPN apps won't work on Copilot Plus PCs or Windows on Arm machines unless they have a native Arm build. - Workarounds for VPN problem include using browser extensions, Windows' built-in VPN system, or using a VPN on the entire network.
AppWizard
June 5, 2024
- HTTP Injector and Phone Guardian were the most concerning VPNs in terms of encryption. - HTTP Injector sometimes used outdated and insecure TLSv1 before switching to TLSv1.3. - Phone Guardian only encrypts HTTP sites when connected to untrusted WiFi networks, leaving details of HTTPS websites exposed. - At least 35 VPNs used sub-optimal 128-bit encryption instead of stronger 256-bit encryption. - 11 VPNs used AES-128-CBC for PRF instead of the stronger HMAC-SHA2-256. - 16 VPNs always used TLSv1.2 as the handshake protocol, with 2 using it some of the time. - Four VPNs were found using SSLv2 as the handshake protocol, an obsolete and vulnerable protocol. - Two other VPN apps used SSLv2 in a different and unusual manner, sending and receiving insecure connections.
AppWizard
April 2, 2024
Nearly 30 VPN applications on Android devices were found to have a hidden threat, turning devices into residential proxies without users' knowledge. This allowed cybercriminals to conceal unauthorized activities under the guise of legitimate IP addresses.
Search