A using Android. They also talked about more

A Recent report 1 suggested that VPNs are not as secure as they claim
to be. VPN services claim that they provide privacy and anonymity. They studied
these claims in various VPN services. They analyzed a few of the most popular VPNs.
They decided to investigate the internals and the infrastructures. They tested the VPNs using two kinds of attacks: passive monitoring, and DNS hijacking. Passive monitoring is
when a user’s unencrypted information is collected by a third party, and DNS
hijacking is when the user’s browser is being redirected to a controlled Web server
which pretends to be a popular site like Twitter2. What their
experiment revealed is very agitating, that most of the VPN services suffer
from IPv6 traf?c leakage. Majority of the VPNs leaked information and not only the
information of the websites the user was accessing but also the content of the
user’s communications. They also investigated the security of various mobile
platforms which use VPNs and revealed that they were much more secure when they
use iOS, however, were vulnerable when using Android.  They also talked about more sophisticated DNS
hijacking attacks that allow all traf?c to be transparently captured. To make things worse, most of the
VPNs that were part of the experiment used Point-to-Point Tunneling Protocol
with MS-CHAPv2 authentications, which according to TechReport, makes them
vulnerable to brute force hacks 10.

Akamai argued that “VPNs are a Weak Security Solution and Management
Burden for Third Party Remote Access. If your company routinely interacts with
third parties — consultants, contractors, suppliers, partners, and customers —
who need remote access to enterprise applications hosted in your data center
environment or hybrid cloud, a VPN is a poor solution. After all, you don’t
want to give untrusted third parties carte-blanche access to the network when
all they need is access to a limited number of applications. Typically, third
parties only need access to a given application for a limited time. The time it
takes to configure, manage, and deploy a separate set of subnets for third parties
— coupled with managing user moves, adds, and changes — are all time-intensive
activities. Whether the process takes days or weeks, it is clearly an
impediment to business. If your company routinely interacts with third parties
— consultants, contractors, suppliers, partners, and customers — who need
remote access to enterprise applications hosted in your data center environment
or hybrid cloud, a VPN is a poor solution. After all, you don’t want to give
untrusted third parties carte-blanche access to the network when all they need
is access to a limited number of applications. Typically, third parties only
need access to a given application for a limited time. The time it takes to
configure, manage, and deploy a separate set of subnets for third parties —
coupled with managing user moves, adds, and changes — are all time-intensive
activities. Whether the process takes days or weeks, it is clearly an
impediment to business.”

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now