{"id":1289,"date":"2024-05-14T16:04:10","date_gmt":"2024-05-14T19:04:10","guid":{"rendered":"https:\/\/www.insside.net\/en\/?p=1289"},"modified":"2024-05-14T16:04:10","modified_gmt":"2024-05-14T19:04:10","slug":"vpns-are-also-vulnerable-to-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/","title":{"rendered":"VPNs are also vulnerable to cyberattacks"},"content":{"rendered":"\n\n\n<p>A VPN, or Virtual Private Network, is a computer networking technology that enables a secure extension of a local area network over an uncontrolled or public infrastructure, such as the Internet.<\/p>\n\n\n\n<p>&#8216;TunnelVision&#8217; is the technique that allows cybercriminals to access VPNs without needing to decrypt their encryption. This vulnerability affects four main operating systems: Windows, Linux, iOS, and MacOS.<\/p>\n\n\n\n<p>By exploiting the Dynamic Host Configuration Protocol (DHCP), &#8216;TunnelVision&#8217; redirects traffic outside of the VPN, enabling the spying of transmitted information.<\/p>\n\n\n\n<p>Although VPNs can be an effective tool for protecting online privacy and are designed to ensure data security by hiding IP addresses and using encryption, this new technique reveals vulnerabilities in their operation. Therefore, it is crucial to choose reliable providers to avoid exposing sensitive data to potential threats.<\/p>\n\n\n\n<p>Aligned with the highest security standards, INSSIDE Cybersecurity has been providing users with guidance and support for over 16 years. For more information, <a href=\"https:\/\/www.insside.net\/en\/contact\/\">click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A VPN, or Virtual Private Network, is a computer networking technology that enables a secure extension of a local area network over an uncontrolled or public infrastructure, such as the Internet. &#8216;TunnelVision&#8217; is the technique that allows cybercriminals to access VPNs without needing to decrypt their encryption. This vulnerability affects four main operating systems: Windows, [&#8230;]\n","protected":false},"author":6,"featured_media":1290,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>VPNs are also vulnerable to cyberattacks - Insside EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPNs are also vulnerable to cyberattacks - Insside EN\" \/>\n<meta property=\"og:description\" content=\"A VPN, or Virtual Private Network, is a computer networking technology that enables a secure extension of a local area network over an uncontrolled or public infrastructure, such as the Internet. &#8216;TunnelVision&#8217; is the technique that allows cybercriminals to access VPNs without needing to decrypt their encryption. This vulnerability affects four main operating systems: Windows, [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Insside EN\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T19:04:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2024\/05\/close-up-hand-with-watch-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"INSSIDE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"INSSIDE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\"},\"author\":{\"name\":\"INSSIDE\",\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/person\/29fd4435cc942b7f057aad1569eb84b1\"},\"headline\":\"VPNs are also vulnerable to cyberattacks\",\"datePublished\":\"2024-05-14T19:04:10+00:00\",\"dateModified\":\"2024-05-14T19:04:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\"},\"wordCount\":159,\"publisher\":{\"@id\":\"https:\/\/www.insside.net\/en\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\",\"url\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\",\"name\":\"VPNs are also vulnerable to cyberattacks - Insside EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.insside.net\/en\/#website\"},\"datePublished\":\"2024-05-14T19:04:10+00:00\",\"dateModified\":\"2024-05-14T19:04:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/www.insside.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VPNs are also vulnerable to cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insside.net\/en\/#website\",\"url\":\"https:\/\/www.insside.net\/en\/\",\"name\":\"Insside EN\",\"description\":\"L\u00edderes en Ciberseguridad\",\"publisher\":{\"@id\":\"https:\/\/www.insside.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insside.net\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insside.net\/en\/#organization\",\"name\":\"Insside EN\",\"url\":\"https:\/\/www.insside.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png\",\"contentUrl\":\"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png\",\"width\":77,\"height\":77,\"caption\":\"Insside EN\"},\"image\":{\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.insside.net\/en\/#\/schema\/person\/29fd4435cc942b7f057aad1569eb84b1\",\"name\":\"INSSIDE\",\"url\":\"https:\/\/www.insside.net\/en\/author\/cruiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPNs are also vulnerable to cyberattacks - Insside EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"VPNs are also vulnerable to cyberattacks - Insside EN","og_description":"A VPN, or Virtual Private Network, is a computer networking technology that enables a secure extension of a local area network over an uncontrolled or public infrastructure, such as the Internet. &#8216;TunnelVision&#8217; is the technique that allows cybercriminals to access VPNs without needing to decrypt their encryption. This vulnerability affects four main operating systems: Windows, [...]","og_url":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/","og_site_name":"Insside EN","article_published_time":"2024-05-14T19:04:10+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2024\/05\/close-up-hand-with-watch-scaled.jpg","type":"image\/jpeg"}],"author":"INSSIDE","twitter_card":"summary_large_image","twitter_misc":{"Written by":"INSSIDE","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/"},"author":{"name":"INSSIDE","@id":"https:\/\/www.insside.net\/en\/#\/schema\/person\/29fd4435cc942b7f057aad1569eb84b1"},"headline":"VPNs are also vulnerable to cyberattacks","datePublished":"2024-05-14T19:04:10+00:00","dateModified":"2024-05-14T19:04:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/"},"wordCount":159,"publisher":{"@id":"https:\/\/www.insside.net\/en\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/","url":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/","name":"VPNs are also vulnerable to cyberattacks - Insside EN","isPartOf":{"@id":"https:\/\/www.insside.net\/en\/#website"},"datePublished":"2024-05-14T19:04:10+00:00","dateModified":"2024-05-14T19:04:10+00:00","breadcrumb":{"@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.insside.net\/en\/vpns-are-also-vulnerable-to-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.insside.net\/en\/"},{"@type":"ListItem","position":2,"name":"VPNs are also vulnerable to cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.insside.net\/en\/#website","url":"https:\/\/www.insside.net\/en\/","name":"Insside EN","description":"L\u00edderes en Ciberseguridad","publisher":{"@id":"https:\/\/www.insside.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insside.net\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.insside.net\/en\/#organization","name":"Insside EN","url":"https:\/\/www.insside.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png","contentUrl":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2023\/03\/insside_logo-fav-1.png","width":77,"height":77,"caption":"Insside EN"},"image":{"@id":"https:\/\/www.insside.net\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.insside.net\/en\/#\/schema\/person\/29fd4435cc942b7f057aad1569eb84b1","name":"INSSIDE","url":"https:\/\/www.insside.net\/en\/author\/cruiz\/"}]}},"jetpack_featured_media_url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2024\/05\/close-up-hand-with-watch-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/posts\/1289"}],"collection":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/comments?post=1289"}],"version-history":[{"count":1,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/posts\/1289\/revisions"}],"predecessor-version":[{"id":1291,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/posts\/1289\/revisions\/1291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/media\/1290"}],"wp:attachment":[{"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/media?parent=1289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/categories?post=1289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insside.net\/en\/wp-json\/wp\/v2\/tags?post=1289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}