Endpoint

3/31/2016
10:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Avira Launches Phantom VPN for Secure and Anonymous Internet Access, Anywhere

You wouldn't go on a walk naked - why go exposed online?

TETTNANG, Germany – March 30, 2016Avira, developers of the award-winning Avira Antivirus, today announced the release of Avira Phantom VPN (Virtual Private Network) to give Windows and Android users encrypted, secure, and anonymous internet access, even when using unsecured public Wi-Fi hotspots.

Avira’s Phantom VPN encrypts all communications between the Internet and your Windows computer or Android smartphone, preventing eavesdroppers from listening in on private communications and stopping cybercriminals from capturing your data. Avira Phantom VPN also masks users’ true IP addresses in order to browse anonymously, and lets users choose which country they want to virtually be identified, in order to allow unlocking geo-restricted content. 

The Avira Phantom VPN is available free for Windows and Android.

Despite the well-known risks of using unsecured public Wi-Fi networks, use of VPN among consumers is shockingly low. A BITKOM survey on cybercrime found 68% of users had antivirus software installed on their devices – but only 9% used a VPN. These low usage figures lag far behind the growth of online shopping and banking activities done via smartphones – activities that are often done over public Wi-Fi networks.

Without a VPN, data packets sent to and from users’ devices can be sniffed out and read by a passerby (‘man-in-the-middle’ attack) or captured from the router itself.  This captured data includes more than just the message content, because these packets of data also tell where the user is and give out details about their device. 

The benefits to using a VPN, where the data packets are placed in a secure and encrypted envelope, are well known within the business sector. VPNs are a mandatory component in most corporate laptops used for travelling and remote office log-ins.

“As more people bring their laptops into cafes and log into banking sites and online accounts from their smartphones, they need to have secure and encrypted connections to the Internet from anywhere,” stated Melanie Weber, head of the VPN project at Avira. “We’ve made Phantom VPN free and very simple to install on both your Windows and your Android devices. There’s no reason not to get it today.”

Avira Phantom VPN provides superior benefits in four major ways:

·         Protects individual privacy.  Without a VPN, online activities are being constantly tracked and analyzed. With Avira Phantom VPN, you can control what personal data is collected.

·         Secures and anonymizes browsing. Avira Phantom keeps others from eavesdropping on online activities and the data exchanged with friends, online shops, and banking websites.

·         Opens up the Internet. Some news channels, social media, and video-streaming websites cannot be accessed from certain regions and countries. Avira Phantom unlocks these geo-restrictions.

·         Applies across all your devices. Phantom VPN can be used on almost all devices, including PCs with Windows 7 or newer operating systems and Android devices running 4.0.3 and above

The Avira Phantom VPN is available free to all users, both for registered and unregistered users. Unregistered users have a data allowance of up to 500MB/month and registered users with a higher limit of 1GB/month. Users subscribing to the Pro version also receive unlimited data traffic.

About Avira GmbH

Avira protects people in the connected world – enabling everyone to manage, secure, and improve their digital lives. The Avira umbrella covers a portfolio of security and performance applications for Windows, Android, Mac, and iOS. In addition, the reach of our protective technologies extends through OEM partnerships. Our security solutions consistently lead in independent tests for detection, performance, and usability. Avira is a family-owned company with headquarters near Lake Constance, in Tettnang, Germany, and additional offices in Munich, Bucharest, Beijing, and Silicon Valley. A portion of Avira's sales support the Auerbach Foundation, which assists education, children, and families in need.

# # #

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/16/2016 | 9:36:50 AM
Cyber security
It is high time to take up the issue and secure our connection from being tracked by deplying reliable vpn server like PureVPN which offer great services at minimal costs. They have encrypted online connections which is good for security. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/16/2016 | 9:34:55 AM
Cyber security
I have heard somewhat mixed reviews about this one. Currently I am using PureVPN and I have been for the past 3 years and as of now it is going great for me, No issues with the connection speeds and login issues. 
petewisdom
50%
50%
petewisdom,
User Rank: Apprentice
4/15/2016 | 7:56:17 AM
Re: Like Avast purchse HMA
I have had experience with most of the VPN providers on this list, vpnranked .com , but Nord is the only one that continues to work with Netflix flawlessly.

 
JennyBaron
50%
50%
JennyBaron,
User Rank: Apprentice
4/5/2016 | 4:10:42 AM
Like Avast purchse HMA
This become an industry trend that most antivirus providers buying or launching vpns and then added to their packages for extra security and anonymity. There are various reviews sites like VPNRanks also write an article about how antivirus provider merging the vpn industry. 
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.