Hacker at a keyboard

VPN Applications Secretly Turning Android Phones into Proxies for Cyber Criminals

Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store.  The findings come from HUMAN’s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user’s device[…]

Virtual Private Network Graphic

What are Virtual Private Networks and how do they work?

A Virtual private network (VPN) is a piece of software that allows you to access the internet privately, acting as a tunnel between you and your destination, enabling users to send and receive data securely across the internet. Much like having a firewall on your network to protect your computer, a VPN will secure your[…]