Posted on

Can a VPN Be Hacked?

A

virtual
private
network

is
one
of
the
easiest
ways
users
can
protect
their
online
activity.
Through
what’s
called
a
tunneling
protocol,
VPNs
encrypt
a
user’s
online
traffic
and
make
their
data
unreadable
to
prying
eyes.


SEE:



Brute
Force
and
Dictionary
Attacks:
A
Guide
for
IT
Leaders


(TechRepublic
Premium)

This
additional
layer
of
security
has
become
a
go-to
option
for
both
businesses
and
consumers
alike
to
protect
their
privacy.
According
to
Statista,
over
24%
of
all
internet
users
in
2023
used
a
VPN
to
secure
their
internet
connection.

With
this
popularity,
one
can
be
forgiven
to
ask:
Are
VPNs
invincible
against
hackers?
Are
they
susceptible
to
being
hacked?
Can
VPNs
be
used
to
steal
user
data
instead
of
protecting
it?

We’ll
answer
these
questions
and
more
below.


Can
VPNs
really
be
hacked?

Like
any
software,

all
VPNs
are
technically
capable
of
being
hacked
.
No
software
is
100%
perfect,
and
VPNs,
like
any
internet-based
software,
can
fall
victim
to
different
attacks.
That
being
said,

a
quality
VPN
will
be
incredibly
hard
to
crack


especially
if
it
has
a
secure
server
infrastructure
and
application.


SEE:



4
Different
Types
of
VPNs
&
When
to
Use
Them


(TechRepublic)

VPNs
work
by
generating
a
private
connection
where
your
internet
activity
is
encrypted
and
made
unreadable.
Your
internet
data
is
routed
to
a
VPN
server,
which
masks
your
IP
address
and
provides
you
an
additional
layer
of
anonymity
online.

This
encryption
hides
sensitive
user
data
such
as
your
IP
address,
device
location,
browsing
history
and
online
searches
from
your
internet
service
provider,
government
entities
and
cybercriminals.

While
VPNs
have
varying
types
and
sizes,
this
is
how
most
VPNs
fundamentally
work.
If
you’re
interested
in
a
more
in-depth
explanation
of
VPNs,
we
encourage
you
to
check
out
our

explainer
on
VPN
software
.
Here
we
looked
into
the
different
types
of
VPNs,
VPN
benefits
and
drawbacks,
and
a
few
popular
VPN
providers
we
recommend.

By
encrypting
user
data
and
passing
it
through
a
secure
tunnel,
VPNs
serve
as
an
easy
way
to
add
protection
to
your
online
activity.
However,
this
doesn’t
make
them
invincible.

There
are
a
few
points
of
weakness
in
which
VPNs
can
be
exploited
or
attacked
by
hackers.
Let’s
go
through
a
few
of
them:


How
VPNs
can
be
hacked

Breaking
through
VPN
encryption

One
way
VPNs
can
be
hacked
is
by
breaking
through
the
encryption.
Hackers
can
make
use
of
cryptographic
attacks
to
break
poorly
implemented
encryption
ciphers.
However,
it’s
important
to
mention
that
breaking
encryption
takes
a
considerable
amount
of
effort,
time
and
resources
to
do
so.


SEE:



Free
VPN
vs
Paid
VPN:
Which
One
Is
Right
for
You?


(TechRepublic)

Most
modern
VPNs
use
what’s
called
the

Advanced
Encryption
Standard
or
AES-256
encryption

algorithm.
This
encryption
standard
uses
256-bit
key
length
to
encrypt
and
decrypt
data
and
is
widely
recognized
as
the
gold
standard
of
encryption.

This
is
because
AES-256
is
virtually
unbreakable

requiring
millions
to
billions
of
years
to
brute
force
and
crack,
even
with
today’s
technology.
That’s
why
many
governments
and
banks
use
AES-256
encryption
to
secure
their
data.

In
any
case,
most
modern
VPN
providers
use
AES-256
encryption
for
their
VPN,
so
there’s
not
much
to
worry
about
here.

VPNs
using
dated
tunneling
protocols

Another
way
hackers
can
hack
VPNs
is
by
exploiting
dated
VPN
tunneling
protocols.
Tunneling
protocols
are
essentially
a
set
of
rules
for
how
your
data
will
be
handled
and
sent
across
a
particular
network.

What
we
want
to
avoid
here
is
using
dated
protocols
such
as

PPTP
and
L2TP/IPSec
.
These
protocols
are
older
and
considered
to
have
medium
to
low
security
by
today’s
standards.


SEE:



Are
Password
Managers
Safe
to
Use?


(TechRepublic)

In
particular,
PPTP
is
based
on
older
technology
and
is
known
to
have
vulnerabilities
that
can
be
exploited
by
bad
actors.
L2TP/IPSec,
on
the
other
hand,
has
better
security
but
also
provides
slower
performance
than
newer
protocols
available.

Fortunately,
more
modern
VPN
protocols
like
OpenVPN,
WireGuard
and
IKEv2
provide
a
good
mix
of
both
high-end
security
and
speed.

Through
DNS,
IP
or
WebRTC
leaks

Malicious
actors
can
also
steal
user
data
through
VPN
leaks.
VPN
leaks
refer
to
user
data
being
“leaked”
out
of
the
secure
VPN
tunnel
due
to
some
flaw
or
vulnerability
within
the
app.
The
main
types
of
VPN
leaks
involve
the
following:


  • DNS
    leaks

    are
    when
    the
    VPN
    exposes
    your
    internet
    activity,
    such
    as
    DNS
    queries
    or
    browsing
    history,
    to
    the
    ISP
    DNS
    server
    despite
    being
    on
    an
    encrypted
    VPN
    connection.

  • IP
    leaks

    happen
    when
    your
    IP
    address
    is
    inadvertently
    revealed
    or
    exposed
    to
    the
    internet,
    defeating
    the
    main
    purpose
    of
    a
    VPN
    in
    masking
    your
    real
    IP
    address
    and
    location.

  • WebRTC
    leaks

    involve
    a
    leak
    with
    browser
    technology
    wherein
    websites
    get
    unauthorized
    access
    to
    your
    actual
    IP
    address
    by
    bypassing
    the
    encrypted
    VPN
    tunnel.

VPNs
themselves
logging
user
data

Finally,
hacking
can
also
occur
when
VPN
providers
themselves
take
hold
of
user
data
without
their
consent.

While
many
VPN
providers
claim
to
have

no-logs
policies
,
stating
they
don’t
record
user
data,
there
have
been
times
when
VPNs
were
found
to
have
stored
user
information
regardless
of
such
policies.


Real-world
examples
of
VPN
hacks

Here
are
some
concrete
examples
of
VPNs
being
hacked
or
compromised
by
malicious
third-parties.

Ivanti
VPN
zero-day
exploits
in
early
2024

In
January
2024,

five
new
zero-day
vulnerabilities

were
discovered
in
Ivanti
Secure
VPN.
The
vulnerabilities
allowed
an
unauthenticated
attacker
to
execute
remote
code
and
compromise
systems,
possibly
affecting
almost
30,000
Ivanti
Secure
VPN
appliances
connected
to
the
internet.

Ivanti
Secure
VPN
is
a
popular,
remote-access
VPN
used
by
organizations
around
the
world.
Since
the
discovery
of
these
zero-day
vulnerabilities,
Ivanti
has
released
patches
to
address
some
of
the
vulnerabilities.

But
if
you
were
interested
in
Ivanti
and
want
an
alternative
solution,
or
if
you
were
a
former
Ivanti
user
yourself,
we’ve
rounded
up
a
list
of
the

top
four
Ivanti
competitors
and
alternatives
.

NordVPN
breach
in
2018

In
2019,
NordVPN
announced
that
one
of
its
third-party
servers
was
breached
in
2018.
In
particular,
a
single
NordVPN
server
in
Finland
was
attacked.
According
to
NordVPN,
this
was
due
to
a
third-party
data
center’s
poor
configuration
of
the
server
that
they
weren’t
notified
about.

NordVPN
says
no
other
servers
or
user
credentials
were
affected
in
the
incident.
Following
the
breach,
the
VPN
provider
said
they
had
taken
all
necessary
measures
to
enhance
their
security
and
had
undergone
audits
to
confirm
these
efforts.

Since
the
incident,
NordVPN
has
been
widely
regarded
as
one
of
the
safest
VPNs
available
today.
You
can
read
our

full
NordVPN
review
here
.

VPNs
with
no-logs
policies
caught
logging
data

There
have
also
been
a
handful
of
instances
where
VPNs
with
no-logs
policies
were
seemingly
caught
or
suspected
of
logging
user
data.



  • IPVanish
    VPN
    in
    2016
    :
    IPVanish
    allegedly
    handed
    user
    data
    logs
    to
    the
    United
    States
    Department
    of
    Homeland
    Security
    to
    track
    down
    a
    child
    pornography
    suspect.
    This
    was
    in
    spite
    of
    an
    initial
    no-logs
    claim,
    eventually
    confirming
    they
    did
    in
    fact
    provide
    logs
    to
    government
    authorities.


  • Hotspot
    Shield
    VPN
    in
    2017
    :
    The
    Center
    for
    Democracy
    and
    Technology
    accused
    Hotspot
    Shield
    of
    logging
    user
    data
    and
    selling
    it
    to
    third-parties
    via
    its
    free
    VPN
    application.


  • Norton
    Secure
    VPN
    :
    Despite
    having
    a
    no-logs
    policy,
    Norton’s
    Global
    Privacy
    Statement
    states
    that
    it
    stores
    user
    data
    such
    as
    device
    names,
    IP
    addresses
    and
    URLs

    info
    that
    we
    primarily
    don’t
    want
    a
    VPN
    to
    ever
    have
    access
    to.

If
you’re
interested
in
a
rundown
of
the
best
no-logs
VPNs,
we’ve
got
you
covered.
Check
out
our

best
no-logs
VPN
roundup
here
.


Measures
to
enhance
VPN
security

Given
these
points
of
weakness,
there
are
several
key
things
you
can
do
to
improve
your
security
and
VPN
experience.

Invest
in
a
paid
VPN
over
a
free
one

While
free
VPNs
can
be
convenient
for
the
one-off
time
you
need
to
change
your
IP
address,
they’re
not
the
most
secure
solution
out
there.
VPNs
take
money
to
operate
and
run.
With
this,
some
free
VPNs
are
known
to
sell
user
data
to
third-parties.
This
may
be
to
serve
these
users
with
personalized
ads
or
for
other
purposes.

What’s
clear,
though,
is
that
a
paid
VPN
subscription
is
going
to
offer
a
far
more
secure
overall
experience.
With
premium
VPNs,
you
get
the
full
server
network,
better
customer
support
and
stronger
security.

Check
for
no-logs
policies
with
independent
audits

You
should
also
check
for
VPNs
that
offer
both
a

no-logs
policy
and
independent
audits
.
While
promises
of
no-logs
are
important,
we
can
only
leave
it
up
to
trust
if
providers
actually
abide
by
their
words
or
not.

A
good
way
to
combat
this
is
to
look
for
VPNs
that
have
been
independently
audited.
These
are
providers
that
have
had
third-party
firms
look
into
their
software,
audit
them
and
share
whether
their
services
pass
security
standards
or
not.

I
highly
recommend
looking
at
VPNs
that
offer
both
no-logs
policies
and
third-party
security
audits.

Use
modern
security
protocols

Another
useful
measure
is
to
use
modern
VPN
protocols
instead
of
older
ones.
In
particular,
I
recommend
using

OpenVPN,
WireGuard
or
IKEv2

protocols
as
your
main
tunneling
protocols
of
choice.

While
these
protocols
are
different,
they
all
provide
high-end
security
and
VPN
speed
that
won’t
affect
your
regular
browsing.
There
are
also
proprietary
protocols
from
VPN
providers
themselves,
such
as
ExpressVPN’s
Lightway
or
NordVPN’s
NordLynx.
These
are
also
viable
options
that
provide
good
security
and
performance.

Utilize
built-in
VPN
kill
switches

VPNs
come
with
a
number
of
included
security
features
that
further
enhance
your
security.
One
of
these
is
a

VPN
kill
switch
.

Kill
switches
automatically
block
any
connection
between
your
machine
and
the
internet
that’s
not
routed
via
an
encrypted
VPN
tunnel.
This
means
that
if
your
VPN
connection
drops,
the
kill
switch
will
immediately
prevent
any
of
your
sensitive
data
from
being
leaked.

Many
modern
VPNs
include
a
kill
switch
turned
on
out
of
the
box,
but
it’s
a
good
idea
to
double-check
your
VPN
settings
to
be
sure.


Why
you
should
still
invest
in
a
VPN

Even
after
learning
the
different
ways
VPNs
can
be
compromised,

using
a
VPN
is
still
far
more
secure
than
not
using
one
.
VPNs
allow
you
and
your
business
to
hide
your
IP
address
at
a
click
of
a
button.

Hiding
your
IP
address
is
important,
as
this
can
be
used
by
malicious
actors
to
serve
you
intrusive
ads,
gain
data
about
your
location
and
gather
data
about
your
personal
identity.
VPNs
are
some
of
the
easiest
and
most
accessible
ways
to
do
this.

For
larger
organizations,
VPNs
are
also
a
great
way
to
ensure
company
data
is
kept
secure

especially
if
your
business
consists
of
remote
workers
who
access
company
resources
over
the
internet.

VPNs
also
let
you
access
region-locked
content
by
using
a
VPN
server
from
a
different
location.
This
can
be
incredibly
useful,
especially
for
businesses
that
need
access
to
various
types
of
content
in
other
parts
of
the
world.

Posted on

TechnologyAdvice and Epicor Roundtable event, March 2024: Exploring The High Potential of the Enterprise Connected Shop Floor

Group
Photo,
left
to
right:
Angelo
Di
Benedetto
(SVP
Worldwide),
Andrew
Fist
(Epicor),
Seamus
Byrne
(TechnologyAdvice),
Naghmeh
Mkhani
(Motorola
Solutions),
Vilesh
Chand
(Rondo
Building
Services),
Scott
Simmons
(BlastOne
International),
Bettina
Turnbull
(Sonova),
Rebecca
Cohen
(TechnologyAdvice),
Graeme
Evans
(Epicor),
Ben
Abbott
(TechnologyAdvice)

TechnologyAdvice
welcomed
an
esteemed
group
of
manufacturing
industry
technology
leaders
to
an
exclusive
roundtable
in
Sydney,
Australia
in
March,
to
explore
how
technology
could
supercharge
their
efforts
to
create
more
connected,
efficient
factories
and
businesses
now
and
into
the
future.

Hosted
in
partnership
with
Epicor,
one
of
the
leading
providers
of
ERP
solutions
globally,
guests
discussed
how
technology
could
empower
manufacturers
to
automate
key
processes
within
their
operations,
from
the
top
floor
to
the
plant
floor.

The
roundtable
looked
at
how
streamlining
operations
could
drive
productivity
and
cut
costs,
boosting
margins
and
revenue
growth.
Industry
leaders
also
looked
at
the
impact
of
artificial
intelligence,
including
how
it
could
accelerate
innovation
through
advanced
MES,
AI
and
machine
learning.

A
huge
thank
you
to
our
guests
and
Epicor
for
sharing
a
wealth
of
experience
and
insight.


Photography
by



Dan
Gray

Posted on

KeePass vs. Keeper (2024): Which One is Safer & Easier to Use?

With
so
many
different
accounts
and
passwords
to
manage,
it’s
a
good
thing
that
you’re
looking
for
a
password
manager.
However,
the
number
of
password
management
solutions
can
complicate
the
selection
process.
If
you’ve
narrowed
your
search
down
to
Keeper
vs.
KeePass,
you’re
getting
closer
to
making
the
best
decision
for
you.

Keeper
is
an
excellent
choice
because
of
its
many
features
and
secure
reputation;
though,
they
come
at
a
cost.
Alternatively,
KeePass
is
a
free
password
manager
with
limited
features.
Overall,
it’s
important
to
determine
which
is
the
best,
and
our
KeePass
vs.
Keeper
debate
will
help
you.

In
this
comparison,
we
will
explore
the
features,
performance,
pricing
and
overall
user
experience
of
Keeper
vs.
KeePass
to
help
you
decide
the
best
password
manager
for
your
needs.


Keeper
vs.
KeePass:
Comparison
table

Keeper KeePass
Best
for:
Those
who
want
more
features,
higher
security
and
ease
of
use.
Those
who
want
a
free
service
for
password
protection.
Starting
Price
$2.04/month Free
(with
donation
options)
Available
Platforms
Android,
iOS,
Linux,
Windows,
Mac
Android,
iOS,
Linux,
Windows,
Mac
Service
and
Support
24/7
ticket
system,
detailed
FAQs
and
guides,
free
Q&A
sessions
and
technical
support
webinars
No
customer
support
team
Browser
Extensions
Internet
Explorer,
Chrome,
Opera,
Safari,
Firefox,
Edge
Only
available
with
plugins
Password
Importing
Yes Yes
(but
more
tedious)
Password
Sharing
Yes,
with
many
ways
to
share
Yes,
with
fewer
ways
to
share
Password
Generator
Yes Yes
Autofill Yes No


Keeper
vs.
KeePass:
Pricing

The
biggest
difference
between
Keeper
and
KeePass
is
pricing.
KeePass
is
completely
free
but
a
subscription
to
Keeper
costs.

Keeper
pricing

Keeper logo.
Image:
Keeper

Keeper
divides
its
plans
into
two
groups:
Personal
&
Family
and
Organizations.

Keeper’s
Personal
plan
is
$2.92/month
for
one
user
vault
and
includes:

  • Unlimited
    password
    storage.
  • Unlimited
    devices.
  • Unlimited
    password
    sharing.
  • Fingerprint
    and
    Face
    ID.
  • Emergency
    access.
  • 24/7
    customer
    support.

Keeper’s
Family
plan
is
$6.25/month
for
five
user
vaults
and
includes
everything
in
the
Personal
plan,
plus:

  • 10
    GB
    secure
    file
    storage.
  • Shared
    folders,
    records
    and
    manage
    permissions.

Keeper’s
Organizations
tier
includes
Business
Starter,
Business
and
Enterprise
plans
with
various
features
to
cater
to
organizations,
small
and
large.

Keeper
offers
a
30-day
trial
for
its
Personal
plan
and
a
14-day
trial
for
its
Business
and
Enterprise
plans.

KeePass
pricing

KeePass logo.
Image:
KeePass

KeePass
is
an
open-source
password
manager,
which
means
that
many
of
its
features
can
be
configured
through
plugins.
You
can
customize
KeePass
with
as
many
plugins
as
you’d
like

free
of
charge.
However,
KeePass
asks
for
donations
upon
sign
in.

Some
premium
features
for
mobile
apps
require
payment.
For
example,
if
you
download
KeePass
from
the
Play
Store,
you
must
pay
$10
to
use
the
password
generator.


Feature
comparison:
Keeper
vs.
KeePass

Whether
you’re
searching
for
an
alternative
to
KeePass
or
believe
that
Keeper
is
ideal,
it’s
still
wise
to
compare
the
features.
Here
are
a
few
notable
features
to
consider:

Password
importing

You
can
import
passwords
from
many
browsers
using
both
KeePass
and
Keeper.
However,
Keeper
seems
more
intuitive
and
allows
you
to
import
passwords
from
other
password
managers
and
browsers.

Though
KeePass
makes
it
possible
to
import
passwords,
it’s
tedious
because
you’ll
need
to
add
a
plugin
for
this
capability.

Password
generator

Most
people
can’t
create
strong
and
unique
passwords
themselves,
so
they
require
a
password
generator.
KeePass
wins
here
because
it
has
many
customizable
options.
You’ll
find
nine
toggles
to
disable
or
enable,
allowing
you
to
choose
the
characters,
symbols
and
length.

Still,
Keeper
has
much
to
offer.
You
can
choose
the
length
of
every
password,
up
to
100
characters,
and
specify
whether
it
should
include
special
characters,
numbers
or
capital
letters.

Password
sharing

Password
sharing
is
a
helpful
feature
that
most
password
managers
offer.
Keeper
is
the
winner
here
because
it
makes
it
easy
to
share
files
and
passwords.
You
have
many
options,
such
as
SMS,
AirDrop,
email
and
links.
The
default
mode
is
set
to
“view
only,”
but
you
can
change
this.
There’s
also
a
one-time
share
feature.

Keeper one-time share.
Figure
A:
Keeper
One-Time
Share
Image:
Keeper

KeePass
isn’t
ideal
for
password
sharing.
You
could
share
the
whole
database
by
sending
the
file
through
email.
However,
there
is
no
built-in
messaging
system,
so
it’s
not
easy
or
safe
to
do
this.

Autofill

Autofill
is
excellent
because
it
helps
you
make
payments,
speed
up
the
login
process
and
more.
Luckily,
both
products
have
this
feature,
though
they’re
implemented
in
different
ways.

Keeper
makes
it
easy
to
set
up;
simply
add
it
to
the
browser
extension
or
through
the
app.
Once
you
log
in,
select
the
“autofill
credentials”
toggle
and
click
“enter”
to
go
to
websites
and
apps.

KeePass
doesn’t
offer
an
autofill
feature,
but
it
does
have
Auto-Type.
This
lets
you
choose
keypresses
that
will
happen
automatically.
Still,
it’s
not
as
intuitive
or
user-friendly
as
Keeper.

KeePass Auto-Type Image.
Figure
B:
KeePass
Auto-Type
Image:
KeePass


Keeper:
Pros
and
cons

Pros

  • Offline
    support,
    regardless
    of
    platform.
  • Available
    on
    all
    major
    browser
    extensions,
    platforms
    and
    operating
    systems.
  • BreachWatch
    is
    available
    to
    protect
    usernames
    and
    passwords
    from
    the
    Dark
    Web.
  • Helps
    with
    onboarding.

Cons

  • Must
    pay
    to
    use
    most
    services.
  • Limited
    options
    available
    from
    the
    free
    version.
  • Security
    vulnerabilities
    reported
    in
    the
    past.

In
our

full
review,
Keeper

received
a
rating
of
4.4
out
of
5
stars.


KeePass:
Pros
and
cons

Pros

  • Completely
    free
    and
    open-source.
  • Highly
    reliable
    and
    stable.
  • Doesn’t
    depend
    on
    the
    cloud.
  • Offers
    multi
    factor
    authentication.

Cons

  • Doesn’t
    feature
    a
    modern
    user
    interface.
  • Can’t
    support
    multiple
    logins.
  • Various
    KeePass
    apps
    from
    different
    vendors
    make
    it
    hard
    to
    trust
    the
    source.

In
our

full
review,
KeePass

received
a
rating
of
3.2
out
of
5
stars.


Methodology

Having
a
good
password
manager
is
crucial,
but
it’s
often
hard
to
determine
which
one
is
the
best.
When
comparing
Keeper
and
KeePass,
we
considered
factors
such
as
security,
ease
of
use,
portability
and
value.
We
scored
each
product
using
an
internal
algorithm.
The
scoring
was
based
on
the
products
individually
and
in
relation
to
other
password
managers.


Should
your
organization
use
Keeper
or
KeePass?

Overall,
Keeper
outperforms
KeePass
in
many
categories.
It
offers
more
features
and
stronger
security
while
being
easier
to
use.

However,
you
shouldn’t
automatically
discount
KeePass.
It’s
a
free
service
with
no
reported
history
of
data
breaches.
Its
functionality
can
be
increased
through
the
use
of
plugins.

Still,
KeePass
isn’t
user-friendly.
If
you’re
not
tech-savvy
or
willing
to
play
around
with
the
system,
it
might
be
hard
to
configure.

Ultimately,
it
will
be
up
to
you
to
decide
which
password
manager
is
best
for
your
needs.