Site icon HailBytes

Android Boosts Security, TunnelVision VPN Exploit Exposed: Your Cybersecurity News Roundup

Cybersecurity news banner on Android and VPN security updates

Android Boosts Security, TunnelVision VPN Exploit Exposed: Your Cybersecurity News Roundup

Google Unveils New Robust Security Measures for Android 15

Google has announced a suite of new security features for Android devices, aimed at protecting user data in the event of theft. These features include:

These features will be available via an update to Google Play services for devices running Android 10 and later.

Deploy GoPhish Phishing Platform on Ubuntu 18.04 into AWS

DHCP Flaw Allows Attackers to Bypass VPN Encryption in “TunnelVision” Attack

Security researchers have revealed a significant vulnerability in routing-based VPNs, dubbed “TunnelVision.” This novel technique exploits a flaw in how computers handle network connections and routing tables, potentially allowing attackers to bypass VPN encryption and spy on users’ online activities.

TunnelVision leverages a built-in feature of the Dynamic Host Configuration Protocol (DHCP) to manipulate routing rules, diverting traffic away from the secure VPN tunnel and exposing it to potential interception. This attack is not limited to a specific VPN provider or implementation, as it targets a fundamental mechanism common to most VPN systems.

The vulnerability, which likely existed since the introduction of DHCP option 121 in 2002, could have been exploited by threat actors for years without detection. It affects major operating systems like Windows, Linux, iOS, and macOS, potentially leaving millions of users vulnerable. However, Android users remain unaffected due to the lack of support for the exploited DHCP option.

This discovery raises serious concerns about the security of VPNs, which are often used to protect sensitive data and maintain privacy on untrusted networks. Users who rely on VPNs for security should be aware of this vulnerability and consider additional protective measures until a fix is implemented.

Singing River Health System Data Breach Exposes 900,000 Patients’ Records

Singing River Health System (SRHS) recently announced a significant data breach stemming from a ransomware attack in August 2023. The incident compromised the personal information of approximately 900,000 individuals, including sensitive data such as names, addresses, Social Security numbers, and medical records.

Following an investigation, SRHS confirmed the breach and has initiated the process of notifying those affected. In an effort to mitigate potential harm, the healthcare provider is offering 12 months of free credit monitoring services to those whose information was exposed.

Additionally, SRHS is providing guidance to help individuals protect themselves against identity theft and fraud, urging them to carefully monitor their accounts and credit reports for any suspicious activity. The organization has also reported the incident to law enforcement and is implementing additional safeguards to prevent future breaches.

The incident highlights the growing threat of cyberattacks in the healthcare sector, underscoring the importance of robust security measures to protect sensitive patient data. The breach also serves as a reminder for individuals to remain vigilant about their personal information and take steps to protect themselves from potential identity theft or fraud.


Exit mobile version