vpn

vpn news search results

Developer news items we found relating to vpn

35 results
Secure-mobile-VNCphone-puts-an-end-to-mobile-spying

Secure mobile VNCphone puts an end to mobile spying


Tuesday, August 13, 2024 by

With the VNCphone, VNC presents a unique combination of mobile phones, hardened operating system and pre-installed applications for secure mobile communication and collaboration. Secure mobile VNCphone puts an end to mobile spying With VNCphone, VNC, a developer of open source-based enterprise applications, now enables professional mobile working without spyi...


Geo-Fraud-Detection-mobile-app-by-Appdome

Geo-Fraud Detection mobile app by Appdome


Friday, August 2, 2024 by

Appdome announced it has enhanced its Geo-Fraud Detection service to include two new defenses: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location relevant use...


Quantum-cryptography-and-network-market-is-growing

Quantum cryptography and network market is growing


Friday, May 5, 2023 by

The global quantum cryptography and network market was valued at US$ 698.31 million in 2022 and is projected to reach US$ 8,136.60 million by 2031 at a projected CAGR of around 32.99% during the forecast period 2023-2031. The increasing need for secure communication and data transfer, along with the rising adoption of quantum cryptography solutions by governments a...


SKAdNetwork-and-Private-Relay-quasi-VPN

SKAdNetwork and Private Relay quasi-VPN


Thursday, June 30, 2022 by

During Apple's Worldwide Developers Conference (WWDC) 2020 and 2021, Apple came out with major updates to privacy that impacted mobile marketers for years to come in the iOS space. It’s no surprise everyone was waiting with bated breath to see where Apple would take us with WWDC 2022 announcements around iOS 16. While there were certainly going to be some...


How-to-avoid-mobile-phone-apps-from-leaking-your-personal-data

How to avoid mobile phone apps from leaking your personal data


Wednesday, November 18, 2020 by

Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...


Ekata-releases-global-identity-verification-dataset

Ekata releases global identity verification dataset


Tuesday, June 16, 2020 by

Ekata announced the release of the latest innovation to its global identity verification dataset, Network Score. Network Score is a machine learning prediction that enables businesses to better identify good and bad customers based on a series of insights. The new dataset flags potentially risky digital transactions and fraudulent customers by analyzing the activity pat...


3-Steps-to-manage-work-from-home-assets-as-we-get-back-to-the-office

3 Steps to manage work-from-home assets as we get back to the office


Friday, April 24, 2020 by

Just over the horizon for American businesses and government agencies is the return to the traditional office work environment. But what will companies and agencies do with the new laptops and other devices they put into employee homes in order to keep things going during state-imposed stay-at-home orders? The International Association of IT Asset Managers (IAITAM) ...


MyPrivacy-app-has-officially-launched

MyPrivacy app has officially launched


Tuesday, March 3, 2020 by

MyPrivacy has officially launched. The breakthrough product, which was built to make privacy vulnerabilities easy to manage for the average user, is a one-stop app that offers a VPN, App Lock, Password Manager, Private Browser, Photo Vault, and Social Permissions Manager sharing a simple, user-friendly platform. The app has already been downloaded over 300,000 since ...


Zero-Trust-platform-from-Pulse-Secure-is-enhanced

Zero Trust platform from Pulse Secure is enhanced


Tuesday, October 29, 2019 by

Pulse Secure announced that it has introduced new Secure Access management and threat mitigation capabilities within its Zero Trust Network Access platform. Through these enhancements, Pulse Secure enables enterprise and service provider organizations to progress Zero Trust security and mitigate hybrid IT risks while simplifying access to multi-cloud and data center res...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


Building-secure-IoT-AI-Blockchain-apps-with-PiQube

Building secure IoT AI Blockchain apps with PiQube


Tuesday, January 8, 2019 by

NetObjex, Inc., a provider of Digital Operating Platforms for Smart Products, has announced it will be introducing a revolutionary new IoT-AI-Blockchain gateway device at the Consumer Electronics Show.  PiQube (pronounced "Pie-Cube") will be launched at the CES 2019 Event from January 8th to the 11th at the Las Vegas Convention Center, Nevada. This sta...


Privacy-for-Android-boosted-with-decentralized-VPN

Privacy for Android boosted with decentralized VPN


Sunday, January 6, 2019 by

Mysterium Network, an open-source, not-for-profit foundation reinventing internet privacy, security, and freedom, has announced the release of the Mysterium VPN app for Android, which is now available on the Google Play store. The app, which was released today and is also available for Windows and macOS, will allow users to participate in the world’s first dece...


Industrial-IoT-platform-gets-updates-from-Pulse-Secure

Industrial IoT platform gets updates from Pulse Secure


Monday, December 17, 2018 by

Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access...


DuckDuckGo-vs.-Google-vs.-Privacy

DuckDuckGo vs. Google vs. Privacy


Friday, October 19, 2018 by

Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


A-guide-to-ad-retargeting-responsibly

A guide to ad retargeting responsibly


Tuesday, August 7, 2018 by

Browse any website with ads, then load up your favorite mobile game and you might see advertisements from the searches you did on the website you were just on, now inside your game! How is this possible? It's called ad retargeting, or behavioral retargeting, and it's gone wild everywhere digital. How does ad retargeting work? There are actually a few ...


What-American-companies-can-learn-from-Europe

What American companies can learn from Europe's new GDPR laws


Wednesday, June 13, 2018 by

People around the world have recently started to receive tons of emails from companies updating their privacy policies. Naturally, many ask, why this is happening, and the ones with a deeper understanding of the process mutter a four-letter combination - GDPR. While an astounding part of the US Senate appears to be confused about the concept of Net Neutrality, Europe&rs...


Pulse-Secure-expands-to-support-hybrid-IT-with-secure-access

Pulse Secure expands to support hybrid IT with secure access


Monday, April 16, 2018 by

Pulse Secure has announced new cloud and virtual appliances to protect access and support applications in hybrid IT environments. Enterprises are quickly moving to deploy hybrid IT, leveraging the cloud to introduce new user services and gain disaster recovery resiliency, as well as continuing to use the data center when they must have total control of the application. ...


Netskope-unifies-enterprise-cloud-and-web-security

Netskope unifies enterprise cloud and web security


Thursday, April 5, 2018 by

Netskope has announced the general availability of Netskope for Web, an expansion of the Netskope Cloud Security platform that enables safe web use for enterprise organizations. Powered by the same cloud-native architecture and patented Cloud XD technology of the award-winning and market-leading Netskope cloud access security broker (CASB), Netskope for Web uniquely und...


What-the-Section-702-bill-means-to-your-digital-privacy

What the Section 702 bill means to your digital privacy


Wednesday, January 24, 2018 by

Recently, President Trump signed the Section 702 bill “to reauthorize foreign intelligence collection.” The NSA warrantless surveillance program is still a sweeping up Americans’ online communications, even though Trump has tweeted:“This is NOT the same FISA law that was so wrongly abused during the election. I will always do the right thing for our country and put the ...


DevSecOps-is-important-and-here-is-why

DevSecOps is important and here is why


Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...


CoachGuitar-teaches-you-guitar-and-lets-us-look-under-the-hood

CoachGuitar teaches you guitar and lets us look under the hood


Wednesday, September 6, 2017 by

CoachGuitar is a five-year old, France-based company that offers a unique method of teaching guitar enthusiasts of all skill levels how to play their favorite songs. Using the visual guitar teaching app, millions of students from around the globe download video tutorials and learn to play along. With a typical traffic of 2,000-3,000 downloads per day - and even reaching...


Appdome-integrates-into-the-AppConfig-community

Appdome integrates into the AppConfig community


Monday, August 14, 2017 by

Appdome, a cloud hub for mobile app integration, has joined the AppConfig Community, re-affirming its ongoing commitment to a secure and efficient mobile industry. AppConfig’s best practice feature-set can now be automatically integrated in apps via the Appdome platform, all without any code or coding. App Publishers (ISVs) and enterprise app developers can add AppConfi...


Metadata-can-be-deadly-in-cyber-exploitation

Metadata can be deadly in cyber exploitation


Tuesday, July 18, 2017 by

When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...


Enterprise-threat-dubbed-HospitalGown-infests-thousands-of-apps

Enterprise threat dubbed HospitalGown infests thousands of apps


Tuesday, June 6, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...


Many-fintech-DevOps-are-not-enforcing-security

Many fintech DevOps are not enforcing security


Tuesday, June 6, 2017 by

Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...


Improve-mobile-app-security-by-turning-it-into-code

Improve mobile app security by turning it into code


Monday, May 8, 2017 by

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...


Instart-Logic-brings-Helios-AIDriven-security-out-into-the-open

Instart Logic brings Helios AIDriven security out into the open


Friday, April 28, 2017 by

In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac...


NodeSource-N|Solid-for-Alpine-Linux

NodeSource N|Solid for Alpine Linux


Wednesday, April 19, 2017 by

NodeSource, the Node.js company, has announced the release of NodeSource N|Solid for Alpine Linux, the newest addition to its enterprise-grade Node.js platform that enables a secure, reliable and extensible platform for Node.js applications. The latest release makes it easier for teams using Docker containers with the popular Alpine Linux distribution to leverage the en...


Google-Machine-Learning-autotranslation-included-in-Collavate-3.9.1

Google Machine Learning autotranslation included in Collavate 3.9.1


Tuesday, April 18, 2017 by

Collavate, Inc. has released Collavate version 3.9.1. The upgraded version includes improvements to enhance the use of their platform - an original Cloud-based document management and workflow processing solution with security for personal Gmail and Google G Suite. This update includes website widgets, a fully-functional task master, an auto-translating feature and a ne...


VPNs-will-not-protect-your-privacy-but-this-might

VPNs will not protect your privacy but this might


Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...


How-companies-can-keep-their-remote-teams-safe

How companies can keep their remote teams safe


Monday, April 3, 2017 by

If you hate bringing your work home with you, spare a thought for the 3.7 million Americans for whom home is the workplace.The telecommuter population is growing faster than the overall employee base, according to Global Workplace Analytics, and with half of all jobs deemed suitable for performing from home, it is a trend that is set to go on growing. Already, around a ...


Wait,-the-CIA-can-comprimise-my-iPhone-or-Android

Wait, the CIA can comprimise my iPhone or Android


Tuesday, March 14, 2017 by

In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...


10-reasons-to-hide-your-IP-address

10 reasons to hide your IP address


Wednesday, March 1, 2017 by

You have an IP address if you are reading this. Your IP (Internet Protocol) address is simply a series of numbers separated by dots (or octets) that represent where you are, or "what network" you are originating traffic from. Now, you might be behind a firewall - which means you have a NATed IP address, in fact all computers behind your NAT firewall will have the same p...


Ways-you-can-protect-yourself-on-the-Internet

Ways you can protect yourself on the Internet


Thursday, February 23, 2017 by

Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...