{"id":11588,"date":"2018-02-26T06:00:25","date_gmt":"2018-02-26T14:00:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/26\/news-5359\/"},"modified":"2018-02-26T06:00:25","modified_gmt":"2018-02-26T14:00:25","slug":"news-5359","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/26\/news-5359\/","title":{"rendered":"VPN 101 \u2013 Part 1: What You Need to Know to Stay Safe and Protect Your Privacy Online"},"content":{"rendered":"<p><strong>Credit to Author: Michael Miley| Date: Mon, 26 Feb 2018 14:00:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/WikiLeaks-has-published-more-than-80-strains-of-malware_459_40137419_0_14129598_300-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"WikiLeaks has published more than 80 strains of malware.\" style=\"float: left; margin-right: 5px;\" \/><\/p>\n<p>The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect ourselves from malware and identity theft, prevent third-party trackers and advertisers slurping our private information, and keep our kids safe when browsing. One way to do this is to use a virtual private network (VPN).<\/p>\n<p>VPN tools can offer a range a privacy and security benefits, but features can vary greatly from one to the next. Trend Micro\u2019s local VPN in Content Shield, for example\u2014part of <a href=\"https:\/\/itunes.apple.com\/us\/app\/trend-micro-mobile-security\/id630442428?mt=8\">Trend Micro Mobile Security for iOS<\/a>\u2014focuses on web threat and web content filtering.<\/p>\n<p>Here are some basics on VPNs.<\/p>\n<p><strong>What is a VPN? <\/strong><\/p>\n<p>Most VPNs provide an anonymous, secure way to browse the web. How do they do this? By providing a secure connection between your computer or mobile device and a server (another computer) run by the VPN provider. In effect, you\u2019re browsing via this third-party computer. This means that the sites you visit won\u2019t be able to track your IP address \u2014 they\u2019ll only see the address of the VPN computer.<\/p>\n<p>This is great for privacy. But what about security? Well, VPNs can also provide a secure, encrypted tunnel out to the web. This will protect you from attacks that try to snoop on your connection to banking and other sensitive sites. These attacks are particularly common over public Wi-Fi hotspots, where hackers often lurk, waiting for you to connect to your Gmail or online banking account. They can then do the digital equivalent of shoulder-surfing your account logins or PIN to hijack your identity.<\/p>\n<p>With a VPN, all of this information is kept hidden in that secure tunnel. Some VPNs also claim to protect you by preventing any malware you might accidentally download, which could be hidden in a spam email attachment or a mobile app. Others, like the local VPN in Content Shield inside Trend Micro Mobile Security for iOS, also prevent you visiting fake phishing and other malicious sites.<\/p>\n<p><strong>What does a VPN <em>not<\/em> do?<\/strong><\/p>\n<p>However, you must remember that not all VPNs are created equal, so it\u2019s important to do your research before choosing one, as the quality and type of service you receive can differ considerably, as can the features\u2014such as the range of main and mobile platforms supported, the number of simultaneous connections allowed in one subscription, and even smart gear support.<\/p>\n<p>VPNs do not offer complete anonymity. VPN providers can store logs on your web browsing activity \u2014 records that, if they keep, they\u2019ll be forced to hand over if requested by the authorities.<\/p>\n<p>Also, do not rely on a VPN as your only online security tool. While some can certainly help, they\u2019re no substitute for <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/maximum-security.html\">good anti-virus<\/a> and a <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/password-manager.html\">password manager<\/a>, and should be used in combination with these and other tools rather than as a substitute.<\/p>\n<p><strong>Is a VPN the same as my private\/incognito browser?<\/strong><\/p>\n<p>No. This is an important distinction to make. Your private or incognito browser might not make your browsing habits as private you think. In this mode, the computer you\u2019re using will not store any data on what sites you search for or what pages you visit, nor will it store any login details or cookies. All that data disappears after you shut down the private window.<\/p>\n<p>This is useful if you\u2019re on a shared computer, as it means the person after you can\u2019t snoop on your browsing history or try to hijack your online accounts. It can also make it cheaper when booking flights or hotels as the providers, unable to track your browser\u2019s cookies, aren\u2019t as likely to automatically raise their prices because they know you\u2019ve visited their site recently.<\/p>\n<p>However, any files you download or bookmarks you create during a private browsing session will be kept. In addition, the private browser mode does not protect you from visiting malicious sites, or downloading malware. ISPs and any other third parties that know your IP address will also be able to track your browsing habits.<\/p>\n<p>VPNs, by contrast, spoof your originating IP Address (like proxy servers) and obscure the content of the web pages you\u2019re visiting, so your ISP or the site owners can\u2019t track it (although the VPN provider might hold these records). The most the ISP can see is that you\u2019re connected to various Internet addresses, but not the kind of information you\u2019re exchanging with those sites.<\/p>\n<p><strong>What can ISPs and VPN vendors track?<\/strong><\/p>\n<p>In short, without using a VPN, your Internet service provider (ISP) can see all the URLs and content of sites you visit, unless they are encrypted. If the site is encrypted (i.e., the URL begins HTTPS:\/\/), your ISP can\u2019t see the URLs or content in unencrypted form, but it may monitor and <a href=\"https:\/\/www.teamupturn.com\/reports\/2016\/what-isps-can-see\">log your DNS queries<\/a>, allowing them to see what sites you visit in a slightly different way. Other techniques known as website fingerprinting could allow the ISP to identify what web pages you\u2019re visiting. And ISPs in the US can sell this kind of data to advertisers, and of course hand it over to the authorities if requested.<\/p>\n<p>A VPN can hide this kind of data from your ISP, but <a href=\"https:\/\/www.theverge.com\/2017\/3\/25\/15056290\/vpn-isp-internet-privacy-security-fcc-repeal\">some are not as effective as others<\/a>, plus the tool must be properly configured \u2014 making it difficult for many consumers to know if they\u2019re truly protected or not. Another fact to consider is that the VPN provider itself can technically see everything you\u2019re doing online during a session, and it can be difficult to find out what they do with that data. This makes it important to find a provider you trust \u2013 <a href=\"https:\/\/www.tomsguide.com\/us\/free-vs-paid-vpn,news-24992.html\">many experts advise<\/a> that users avoid free services.<\/p>\n<p>There are multiple different types of VPN implementation, and in some cases the encrypted tunnel isn\u2019t quite as impenetrable as consumers would like. Some services also been <a href=\"https:\/\/www.theregister.co.uk\/2016\/02\/26\/ssl_vpns_survey\">accused in the past<\/a> of security flaws which could allow the bad guys into that tunnel, to snoop on your data\u2014so do your homework when deciding which VPN service to use.<\/p>\n<p><strong>Local VPNs vs cloud VPNs<\/strong><\/p>\n<p>Up until now, we\u2019ve been talking mainly about \u201ccloud\u201d VPNs: that is, VPNs that allow users to tunnel out securely and privately to cloud services on the worldwide web. Another option is one used by Trend Micro: a local VPN inside Trend Micro Mobile Security for iOS. It\u2019s part of the Content Shield function.<\/p>\n<p>Content Shield\u2019s local VPN doesn\u2019t use an encrypted tunnel to connect to a VPN provider\u2019s server out on the web. Instead, a scaled-down web threat and filtering \u201cserver\u201d is located on right on your device. When compared to a cloud VPN, this optimizes the speed at which you can browse the web, because typically the local VPN only has to check web data stored on the device rather than connect out to the web every time it checks a website.<\/p>\n<p><strong>Content Shield: Secure browsing and parental controls<\/strong><\/p>\n<p>In short, Trend Micro\u2019s local VPN focuses on <em>web threat protection<\/em> and <em>parental controls<\/em> within the Content Shield in Mobile Security for iOS. It provides highly effective protection from visiting malicious URLs, and filters and blocks inappropriate sites when your kids are browsing. It intercepts search queries and results to ensure your family doesn\u2019t visit any sites which could steal their identity or download malware to their device, and filters URLs according to pre-set parental controls stored on the device. By also checking many of these URLs according to data stored temporarily on the device, it speeds up browsing.<\/p>\n<p>Content Shield works across all iOS browsers and even other apps that might try to load a website, like Facebook, Line, Gmail and others.<\/p>\n<p>For more information on Trend Micro Mobile Security go <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/mobile-security.html\">here<\/a>, or view our Mobile Security for iOS video on YouTube <a href=\"https:\/\/youtu.be\/J3wzAqYa3ZM\">here<\/a>.<\/p>\n<p>To download Trend Micro Mobile Security for iOS, go to the App Store for iOS on your iPhone, iPad, or iPod. You can view the app preview <a href=\"https:\/\/itunes.apple.com\/us\/app\/trend-micro-mobile-security\/id630442428?mt=8\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/vpn-101-part-1-need-know-stay-safe-protect-privacy-online\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Michael Miley| Date: Mon, 26 Feb 2018 14:00:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/08\/WikiLeaks-has-published-more-than-80-strains-of-malware_459_40137419_0_14129598_300-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"WikiLeaks has published more than 80 strains of malware.\" style=\"float: left; margin-right: 5px;\" \/>The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect ourselves from malware and identity theft, prevent third-party trackers and advertisers slurping our private information, and keep our kids safe when browsing. One way to do this is to use a virtual private&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,10789,714],"class_list":["post-11588","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-consumer","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11588"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11588\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11588"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}