Fang Binxing was forced to use a VPN to circumvent the Great Firewall of China Photograph: Kevin Frayer/Getty ImagesThe Father of China s internet censorship infrastructure, known as the Great Firewall of China, has been caught having to circumvent his own creation after attempting to display a website during a talk at the Harbin Institute of Technology in the Heilongjiang province of China.According to local reports, Fang Binxing attempted to display a South Korea website, which he said showed the views of South Koreans attempting to build similar infrastructure to China s firewall, but was blocked by said censorship system.Fang then had to resort to setting up a virtual private network VPN to circumvent the censorship, in full view of the lecture attendees, to display the site.Using VPNs to effectively make a tunnel through the Great Firewall of China to the outside internet world is a common, but frowned upon, practice used by many within China wishing to access western sites such as Facebook and Twitter.The UK also operates a system of censorship through court-ordered blocks of piracy sites by internet service providers, including the notorious Pirate Bay, which requires users to employ similar techniques such as VPNs to access.
It's Borg Bug Day, and this week Cisco's issued patches of interest to users of its Adaptive Security Appliances ASAs .The two newly-announced bugs are CVE-2016-1379, a VPN block memory exhaustion vulnerability; and CVE-2016-1385, a problem with the ASA XML parser.The software has a bug in how it handles ICMP errors in IPsec packets, and crafted packets sent either through LAN-to-LAN or remote access VPN tunnels can deplete available memory .That results in a denial-of-service, either because the system becomes unstable or it stops forwarding traffic.The software is vulnerable if the user's using IKEv1 or IKEv2 for LAN-to-LAN VPNs, or remote access VPNs using Layer 2 Tunnelling Protocol and Ipsec; and if the system is validating ICMP errors.The XML parser vulnerability is less serious, because it can only be exploited by an authenticated user.
AP Photo/Jon Super Image Source: AP Photo/Jon Super The first major European football final of 2016 is here, and you can stream it online for free this year right on YouTube.The 2016 Europa League final game between Liverpool and Sevilla kicks off at 8:45PM CET that s 2:45PM EDT , and British network BT Sport is the one streaming it live on YouTube for free.DON T MISS: Nokia is back, and this time it s making the Android phones we ve always wantedBT Sport confirmed last week that it struck a deal to stream both the Europa League and Champions League finals on YouTube this year, in a move to boost subscribers.The network had already planned to stream the two games online via its freeview channel BT Sport Showcase, The Telegraph reported last week, but those plans didn t end up panning out for several reasons.That s why BT Sport partnered up with YouTube to make the games available more widely.In an announcement on its site, BT Sport lays out two ways to stream the game live, one for subscribers and a second for people who don t subscribe to the channel.
Way back in January we talked a bit about what TP-Links claims is the world's first wireless AD router called the Talon AD7200."With the Talon AD7200, we ve bringing consumers the fastest Wi-Fi ever made," said Lewis Wu, executive vice president of TP-LINK USA.It s a completely different experience than most of us are used to from our network, and we re excited to deliver this innovative technology to the world for the very first time."The router features a 1.4GHz dual core processor, dual USB 3.0 ports, VPN, guest network, parental controls and settings can be controlled remotely with an Android or iOS app.The router also has four Gigabit Ethernet ports.The router has an MSRP of $349.99 and is available online at Newegg and at Fry's and Microcenter locations.
Many of the big-name websites and companies will track your activities to deliver targeted advertising, and can build up an astonishingly detailed profile including your interests, spending habits, age, location and more.If you would prefer to keep your personal details private, a VPN or proxy tool will help.As well as preventing third parties building up a profile of you, these privacy tools can open up the web, granting you access to sites blocked in your country, to access region-locked content when you're travelling away from home, and to add a layer of protection when you use a public Wi-Fi network.Tor The Onion Router works by bouncing your data between encrypted nodesTor is available for Windows, OS X and Linux, and has a large following in the privacy and security communities.It's based on the same code as Firefox, and guides you through the process of getting online.Read on to discover four more of the best proxy and VPN tools for anonymous browsing.
The internet has been a remarkable development for humanity, allowing people worldwide to quickly access information.Information flows both ways, however, and many people have realized that when they browse the internet they are not merely seeing information displayed on those sites; the sites themselves and even outside observers can follow a user s online activity.Despite the large amount of network theory behind the development of VPNs, they are remarkably simple to understand, and even easier to use.As mentioned earlier, campus and office networks are examples of VPNs, and they re fine if you are simply looking for a secure connection to the internet.There are some things to consider when choosing a VPN.In order to keep foreign users from accessing its U.S. library, Netflix routinely blocks users if it detects they are coming from a VPN.
Ashley Madison is a perfect example of that and many people were shocked at just how many real identities were contained in the data, identities that then caused a great deal of grief for their owners.I'm going to focus on what's readily accessible to the bulk of the population.Also consider how you fill out the following form when you create the account:These attributes won't show up on other sites where the address is used, but they can start to surface in other places.Thing is though, as much as I love Bitcoin (try using it for perfectly legitimate, above board purposes one day just to experience it), the mainstream, above board places you can use it are pretty limited.Not always, mind you; whilst many people have "static" IP addresses (the one IP sticks with them for the life of their time with the ISP), many others are dynamic (the ISP rotates the addresses over time).Here's what I'm seeing as I write this:The primary value proposition of a VPN for me is that it means I can use public wifi while travelling and not worry about my traffic being intercepted by an airport or the hotel.
Browser maker Opera s proposed $1.2 billion acquisition by a consortium of Chinese companies just took a major step towards completion after its shareholders voted in favor of the deal.Opera announced today that 90.6 percent of the outstanding share capital and 90.9 percent of the votes in the company have approved the acquisition.That s a preliminary result that the firm will confirm for sure soon, but, if the number stays as it is or is higher, that will be enough to enable the sale to proceed.Today s approval is notable because there have been murmurs of discontent about the proposed sale to Golden Brick, a group comprised of Qihoo 360, one of China s most visible and controversial Internet companies which recently went private in a $9.3 billion deal, listed games firm Kunlun, which owns a 60 percent share in gay dating service Grindr, and investment firm Yonglian.We ve been with Opera for many years.The proposed deal hasn t stopped Opera from introducing a busy slate of product updates, including a built-in VPN for its desktop browser and mobile apps, and an ad-blocker, too.
With almost 11 billion crowns in his pocket, it looks like that Chinese investors will soon take over the Norwegian Opera. 91 per cent of the Norwegian browser company Opera Software's shareholders accept the bid from a Chinese consortium of 1.24 billion dollars, equivalent to nearly 11 billion, writes Reuters. Opera Software is behind the Opera browser by just over 5 percent of the browser market, according to StatCounter greatest Chrome by nearly 44 percent. The browser began in 1994 as a research project in Telenor. Especially great success has been the mobile version Opera Mini had in recent years. The web browser has automatic adblock blocking ads, special power-saving features and built-in VPN, making it easy to surf anonymously.
Only VPN users know the peace of mind that comes with establishing an encrypted, secure internet connection, immune to hackers, prying eyes, and data caps.Thankfully, CyberGhost VPN does all that and more – and a three-year Premium Plan subscription is now a full 80 percent off from TNW Deals.Eliminate concerns over surveillance, snooping bosses, geographical restrictions and more with one of the web s highest-rated VPNs, and you ll soon see why PC Mag praises CyberGhost VPN as:the VPN service you ve been looking for.GhostVPN also offers the added benefit of unblocking geo-restricted content from all over the globe, meaning you ll be able to watch the latest Game of Thrones episode no matter where you may be in the world.You ll also free yourself from the invasiveness of annoying ads as you enjoy unrestricted, anonymous web use with unlimited bandwidth.Read next: Apple might soon build walkie-talkie headphones for talking to people around you
This WiFi router claims to use spectrum turbocharger technology inside to bring access to 300% more airwaves than any other router out there.The maker claims that extra airwave coverage brings as much as 300x more range and coverage.This allows the router to operate in a protected portion of the 5GHz radio spectrum that was originally designated for use by weather radar systems.VPN access and WiFi Protected Access is supported.There is no indication that the tech or approvals allowing use of this spectrum are limited to the Portal device alone.Most crowdfunding sites, like Kickstarter and Indiegogo, have policies about what happens to your money if the project fails to deliver on its goals, but choosing to back a project is inevitably a risk.
Traveling soon?Heads up: many streaming services have international streaming restrictions, with Netflix and Hulu included.But with Getflix, you don t have to give up your shows every time you travel.Some key details:Enjoy popular streaming services no matter your locationGet access to over 50 VPN nodes worldwideQuickly watch TV, listen to online radio, and moreEasy-to-use Smart DNS technologyEncrypt all your traffic with 256bit SSL encryptionGetflix unblocks over 100 streaming channels around the world, so you can watch movies, TV, sports, and more regardless of where you may end up.For a limited time, you can nab Getflix for only $39, or over 90% off — an offer that s simply too good to pass up.
The company argues its customers would be harmed by removing iMessage, Facetime and VPN On Demand from its devicesApple has said it plans to challenge efforts by a patent licensing company that aim to disable Apple s Facetime and iMessage services, following a jury verdict that found the software contained patented technology.The case casts light on the extensive litigation that has accompanied the growth of the mobile device business upon which Apple s current fortunes are founded.The jury agreed once again that Apple has been using the technology developed by our inventors, said VirnetX chief executive Kendall Larsen at the time.Mistrial argumentApple is contesting the court s findings, is seeking a mistrial and a termination to any royalty obligations.The company argues that any injunction would be inappropriate since the patents involved in the case have been invalidated by the US Patent and Trademark Office USPTO .The validity of VirnetX s patents hasn t been settled definitively, and is currently being contested before the Supreme Court.
TunnelBear VPNA free VPN app is always a good place to start, so here s TunnelBear, which, rather excellently, has a roaring bear as its official mascot.There are also options to browse anonymously, as well as unblock proxy sites – and with 400 million downloads in the bank, it s evidently an app that people have put their trust in.It s glad you asked: offering multiple servers across four different continents not Antarctica – sorry, penguins , round-the-clock customer support and unlimited bandwidth, it also won t throttle your internet connection when performing its duties.Offering high-speed and encrypted connections, VPN Master may be trying to cash in on its name alone – but, given its strong rating on the App Store, it may be a sales tactic that s working handsomely.Cloud Ark VPNLooking for the smartest VPN around?This free well, mostly – we ll get onto that VPN app gives you at least 10 VPN hours a month which apparently is enough, say the app s makers , as well as promises of high security, unlimited data transfers and the fastest VPN servers around.
Securing the rapidly-expanding universe of connected technology just got a helping hand from a new assurance testing program for Internet of Things IoT sensors and devices.According to a press release, ICSA Labs is launching a new security testing program that will focus on assurance testing for IoT.The new IoT Security Testing and Certification Program will see ICSA Labs test six key components: communications, alert/logging, platform security, cryptography, physical security and authentication.A projected 25.6 billion IoT devices are expected to enter the marketplace in 2019, rising from 9.7 billion in 2014, according to Verizon s State of the Market: Internet of Things 2016 report.UL s move was a response to the Cybersecurity National Action Plan launched by the White House in February, with UL s IoT standards developed with the help of several government departments.ICSA Labs is an independent security testing division of Verizon Business covering anti-virus, firewalls, IPsec VPN, cryptography, SSL VPN, network IPS and anti-spyware technology.
In this paper at Arxiv, Tel Aviv University's Uri Kanonov and Avishai Wool dissect KNOX for your enjoyment.The ARM TrustZone, they write, does a good job of mitigating root and kernel exploits, but only if it's used right, and that requires proper usage of its features in all surrounding areas to gain the promised security boost.For The Register, one of the killer phrases in the paper is: we contrast KNOX 1.0 with the most recent version of KNOX: we show how the latest KNOX improves security— while also making security sacrifices in favour of user satisfaction .Here's the short version from the paper: The attack scenario is an Evil Maid attack short-term physical access against an unlocked device for example the attacker may ask the victim to make a quick phone call from her device .Serve forged SSL/TLS certificates while performing MITM.The only social engineering required, the authors note, is to present a benign-looking Knox icon for the VPN and a similarly innocuous connection name, users will probably continue past the warning.
The victims of a major financial scam in China are bypassing the Great Firewall and using Twitter to contact human rights organisations and the media to try to get help about their plightThousands of people affected by one of China's biggest financial scams are starting to use virtual private networks VPN to bypass the Great Firewall of China in order to spread word of their plight to outside media over social networks like Twitter and Facebook.In April 2015, the FanYa Metal Exchange, a rare metals trading platform-turned-asset manager that has partnerships with many of China's biggest banks and metal companies, suddenly suspended trading and froze all its members' accounts after running into liquidation problems.About 220,000 people invested their life savings into the platform and their funds have been frozen, but the Chinese government doesn't seem to have taken much official action to get their money back, and the regulators have remained silent.They have been protesting outside public buildings and banking regulators across China in places like Shanghai, Yunnan and Kunming since September 2015, and although the protests eventually led to the Kunming police starting an investigation in December 2015 and finally arresting the head of FanYa in January, nothing has been done to help the victims get their money back.Instead, some investors have been arrested for protesting in Beijing, so the victims have now turned to the internet, using VPNs to bypass the infamous Great Firewall to tweet their plight to the outside world.One Twitter account, @554013604a, has a profile picture that says "Help!"
Advanced users can use virtual machines or multiple browsers isolated in sandboxes.Preshared keysWhite offered a quick list of VPNs that have preshared keys posted online: GoldenFrog, GFwVPN, VPNReactor, UnblockVPN, IBVPN, Astril, PureVPN, PrivateInternetAccess, TorGuard, IPVanish, NordicVPN, and EarthVPN.Among these alternatives, IPsec can be set up without installing extra software, but some believe it was either compromised or intentionally weakened by the NSA.VPNs aren t exempt, and many make claims that lack credibility offering 100 percent online security, for example .Any VPN service that respects their customers privacy will self-host all systems that interact with customers, such as third-party live chat scripts, support ticketing systems, blog comments, etc.Many users will skip these optional and time-consuming enhancement steps if they are configuring OpenVPN by hand.
Duo SecurityThe next time you're in the market for a new Windows computer, consider this: if it comes from one of the top five manufacturers, it's vulnerable to man-in-the-middle attacks that allow hackers to install malware.It found third-party updating tools installed by default threatened customers of Dell, HP, Lenovo, Acer, and Asus.As a result, PCs from all five makers are vulnerable to exploits that allow attackers to install malware."Hacking in practice means taking the path of least resistance, and OEM software is often a weak link in the chain," the Duo Security report stated.In short, every single manufacturer was found to use pre-installed updaters that allowed someone with the ability to monitor a PC's network traffic—say someone on the same unsecured Wi-Fi network or a rogue employee at an ISP or VPN provider—to execute code of their choice that runs with System-level privileges.The report provides a strong reason why it's a good idea to wipe newly purchased machines and reinstall Windows minus all the custom crapware., a non-profit that monitors censorship by the Chinese government, first spotted the lockout earlier this week.Unlike other social media sites like Facebook and Twitter, Tumblr has managed to escape being completely banned in China so far .According to s web analyzer, a tool that shows what sites and keywords are currently blocked by the Great Firewall, access to Tumblr has been limited since May 25 and the platform was completely blocked on several days: May 26, May 30, and June 2 today s historical data, however, shows that Tumblr was also more heavily blocked or restricted than usual in June 2014 and 2015.Tumblr was also blocked for several weeks in February and March 2011 after activists issued calls for pro-democracy demonstrations on social media platforms.Other reasons why Tumblr might be currently firewalled include a sex tape that is currently going viral, as That s Mag notes online porn is banned in China , and more stringent online censorship measures that include a crackdown on the VPN services many people use to access blocked sites.