There will be a short outage between 5 to 15 minutes on each server from UTC 3:00 a.m. 19 July to UTC 3:00 a.m. 21 July due to a minor security patch being applied to all the servers. We apologise for any inconvenience in advance.
To all our users, between December 2016 and April 2017, OpenVPN 2.4.0 was audited for security vulnerabilities and the primary findings were two remote denial-of-service vulnerabilities. These have been fixed in OpenVPN 2.4.2. We have updated our GUI to the latest OpenVPN 2.4.2 and would like to advise everyone who is using our […]
There has been a vulnerability dubbed “Port Fail” revealed by Perfect Privacy that allows an attacker to reveal a person’s true IP address where the VPN provider has port forwarding enabled. This affected some of the largest VPN providers in the world including Ovpn.to, nVPN, and Private Internet Access (PIA). We would like […]
VPN Implications A couple of alarming findings have emerged namely the Logjam DHE Flaw. News reports claims that up to 66 percent of the VPN servers can be vulnerable to eavesdropping by nation-states if they use a DHE key exchange with a key that is 1024-bit or smaller. This means using huge computational […]
Lenovo recently admitted that it was installing software called Superfish in customer’s laptops that were sold between September 2014 and January 2015 although we understand that ThinkPads were unaffected. Superfish sought to improve customer’s shopping experience by analyzing the images you see during your browsing sessions and scours more than 70,000 stores to […]
Most IT users are familiar with antiviruses and spyware. What is often overlooked is the security of their data which they transmit and store online trusting the default technologies or the security of the companies that provide these services. Transmission of Data Online Anytime we use a public wi-fi connection or connect to […]
Kaspersky Lab, a prominent antivirus vendor has recently revealed that an advanced hacker group whom they call the “Equation Group” has been successfully installing malicious hard drive firmware in more than a dozen hard drive vendors (basically everyone). By reprogramming the HDD (hard drive) firmware, it is an extremely persistent infection that cannot […]
The Vulnerability The implementation of WebRTC has allowed websites to insert a few lines of code to reveal the true IP of the user even when a VPN is used. Browsers that use it such as Chrome and Firefox are affected by this vulnerability but only Windows users are affected. Mac and Linux aren’t affected. […]