{"id":3767,"date":"2018-03-24T15:00:43","date_gmt":"2018-03-24T19:00:43","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/?p=3767"},"modified":"2018-03-24T15:00:43","modified_gmt":"2018-03-24T19:00:43","slug":"vpn-leaks-data","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/2018\/03\/24\/vpn-leaks-data\/","title":{"rendered":"VPN Leaks Data"},"content":{"rendered":"<p>This report identified three vulnerabilities with VPN services leaking sensitive IP Address and location information.\u00a0 Virtual Private Networks are used for several different reasons, but in this case it is used to connect privately to an internal network.\u00a0 The VPN service will encrypt your data and hide your true IP address for security reasons.<\/p>\n<p>Vulnerabilities were found at PureVPN, HotSpot Shield, and Zenmate.<\/p>\n<p>It was also noted that these vulnerabilities were with the Chrome plug-in.\u00a0 Not the desktop or smartphone version.\u00a0 The other vulnerabilities were not disclosed because no patch has been created.<\/p>\n<p>https:\/\/thehackernews.com\/2018\/03\/vpn-leak-ip-address.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This report identified three vulnerabilities with VPN services leaking sensitive IP Address and location information.\u00a0 Virtual Private Networks are used for several different reasons, but in this case it is used to connect privately to an internal network.\u00a0 The VPN service will encrypt your data and hide your true IP address for security reasons. Vulnerabilities [&hellip;]<\/p>\n","protected":false},"author":14419,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[714826],"tags":[],"class_list":{"0":"post-3767","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-02-its-role-the-control-environment","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/users\/14419"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/comments?post=3767"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3767\/revisions"}],"predecessor-version":[{"id":3768,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3767\/revisions\/3768"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/media?parent=3767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/categories?post=3767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/tags?post=3767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}