Facebook
Name
Email
Phone
Message

Your VPN Might Be Leaking Data

VPN Might Be Leaking Data

Virtual Private Networks (VPN) are becoming more and more popular with everyday internet users. These networks allow users to access region-locked content like videos and music files. They work by encrypting your internet connection when visiting certain sites, making it seem as though you are visiting from a completely different country or region. Due to copyright issues and other problems with regard to content, certain sites have to restrict access to their content and VPNs help users to overcome these restrictions. However, a new study has shown that the use of VPNs may not be as safe as originally believe and your VPN could actually be leaking your private data.

The study was undertaken by researchers at Queen Mary University of London and has revealed a potentially problematic vulnerability in certain VPN systems. Many users install VPNs in order to protect their personal data from cyber-attacks and surveillance. However, this newly-discovered vulnerability is present in the majority of top VPN providers and could be putting a countless number of users’ personal data at risk. The vulnerability is known as IPv6 leakage and it could lead to plenty of problems for VPN users around the world.

QMUL And Two Of The Most Popular Techniques

As part of their study, the research teams at QMUL actually emulated two of the most popular techniques utilized by hackers in order to access a typical user’s private data. These two methods are known as passive monitoring and DNS hijacking. The former essentially involves unprotected data being gathered as it travels across an access point, while the latter is a more direct method that forces data to travel via a hacker’s own web server, where any private information or personal details can be easily obtained. These two methods have proven to be very effective over the years.

For the study, these methods were used with surprising results as researchers were able to obtain a lot of leaked data. The data included the names of the sites a user would visit and also the actions they would take on these sites; for instance, researchers were able to view messages posted by a user on a website’s forum. Certain sites, like the ones which make use of HTTPS encryption, were completely safe and data was not leaked from communications with these sites. However, the ease with which these researchers were able to obtain private data must be a major concern for users and websites.

Researchers concluded that the leakage is due to the introduction of a new internet protocol called IPv6, which is arriving to replace IPv4. Unfortunately, the majority of VPNs are tailored to work with IPv4 systems and have not yet been sufficiently updated to deal with IPv6, making them vulnerable to attacks. The study also took a look at mobile devices, finding that similar results occurred on tablets and smartphones but that iOS was better protected than Android. With VPNs being used more commonly, users will need to take extra precautions to avoid their data being stolen.

More about: vpn

Recommended Posts | Data Loss Prevention

Ways to Keep up with Your Critical Data
1704

6 Creative Ways to Keep up with Your Critical Data

With the growing popularity of sky drives, as well as sky drives and other storage methods, it is hard to know the best data storage methods to use to keep your data secure. There are many ways you can protect and backup your data, but which way is best for you or your business ...
Benefits of Tokenization for Data Security
1580

What are the Benefits of Tokenization for Data Security?

After Apple released their new Apple Pay for secure mobile and online payments, tokenization has become a hot topic in data security. Tokenization was designed to prevent hackers from stealing customer’s data. New technology replaces real data with a token or fake data that has no use to a hacker ...
Cursor Broken
1997

What to Do if Your Cursor is “Cursed”

Have you ever been working on your computer when all of a sudden it appears that your cursor has a mind of its own? The cursor starts moving around on your screen or opens a file or program you didn't want. There are two realy reasons why a cursor on your computer can behave in such a manner ...
Secure Your Business Data
1265

How To Secure Your Business Data?

With so much business done over the internet these days and often via multiple devices, security is paramount if a company is to survive and prosper. The larger the business, the harder it can be to keep track of operations and employee activity, leaving companies large and small open to problems ...