Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

3/31/2016
10:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Avira Launches Phantom VPN for Secure and Anonymous Internet Access, Anywhere

You wouldn't go on a walk naked - why go exposed online?

TETTNANG, Germany – March 30, 2016Avira, developers of the award-winning Avira Antivirus, today announced the release of Avira Phantom VPN (Virtual Private Network) to give Windows and Android users encrypted, secure, and anonymous internet access, even when using unsecured public Wi-Fi hotspots.

Avira’s Phantom VPN encrypts all communications between the Internet and your Windows computer or Android smartphone, preventing eavesdroppers from listening in on private communications and stopping cybercriminals from capturing your data. Avira Phantom VPN also masks users’ true IP addresses in order to browse anonymously, and lets users choose which country they want to virtually be identified, in order to allow unlocking geo-restricted content. 

The Avira Phantom VPN is available free for Windows and Android.

Despite the well-known risks of using unsecured public Wi-Fi networks, use of VPN among consumers is shockingly low. A BITKOM survey on cybercrime found 68% of users had antivirus software installed on their devices – but only 9% used a VPN. These low usage figures lag far behind the growth of online shopping and banking activities done via smartphones – activities that are often done over public Wi-Fi networks.

Without a VPN, data packets sent to and from users’ devices can be sniffed out and read by a passerby (‘man-in-the-middle’ attack) or captured from the router itself.  This captured data includes more than just the message content, because these packets of data also tell where the user is and give out details about their device. 

The benefits to using a VPN, where the data packets are placed in a secure and encrypted envelope, are well known within the business sector. VPNs are a mandatory component in most corporate laptops used for travelling and remote office log-ins.

“As more people bring their laptops into cafes and log into banking sites and online accounts from their smartphones, they need to have secure and encrypted connections to the Internet from anywhere,” stated Melanie Weber, head of the VPN project at Avira. “We’ve made Phantom VPN free and very simple to install on both your Windows and your Android devices. There’s no reason not to get it today.”

Avira Phantom VPN provides superior benefits in four major ways:

·         Protects individual privacy.  Without a VPN, online activities are being constantly tracked and analyzed. With Avira Phantom VPN, you can control what personal data is collected.

·         Secures and anonymizes browsing. Avira Phantom keeps others from eavesdropping on online activities and the data exchanged with friends, online shops, and banking websites.

·         Opens up the Internet. Some news channels, social media, and video-streaming websites cannot be accessed from certain regions and countries. Avira Phantom unlocks these geo-restrictions.

·         Applies across all your devices. Phantom VPN can be used on almost all devices, including PCs with Windows 7 or newer operating systems and Android devices running 4.0.3 and above

The Avira Phantom VPN is available free to all users, both for registered and unregistered users. Unregistered users have a data allowance of up to 500MB/month and registered users with a higher limit of 1GB/month. Users subscribing to the Pro version also receive unlimited data traffic.

About Avira GmbH

Avira protects people in the connected world – enabling everyone to manage, secure, and improve their digital lives. The Avira umbrella covers a portfolio of security and performance applications for Windows, Android, Mac, and iOS. In addition, the reach of our protective technologies extends through OEM partnerships. Our security solutions consistently lead in independent tests for detection, performance, and usability. Avira is a family-owned company with headquarters near Lake Constance, in Tettnang, Germany, and additional offices in Munich, Bucharest, Beijing, and Silicon Valley. A portion of Avira's sales support the Auerbach Foundation, which assists education, children, and families in need.

# # #

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
JennyBaron
50%
50%
JennyBaron,
User Rank: Apprentice
4/5/2016 | 4:10:42 AM
Like Avast purchse HMA
This become an industry trend that most antivirus providers buying or launching vpns and then added to their packages for extra security and anonymity. There are various reviews sites like VPNRanks also write an article about how antivirus provider merging the vpn industry. 
petewisdom
50%
50%
petewisdom,
User Rank: Apprentice
4/15/2016 | 7:56:17 AM
Re: Like Avast purchse HMA
I have had experience with most of the VPN providers on this list, vpnranked .com , but Nord is the only one that continues to work with Netflix flawlessly.

 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/16/2016 | 9:34:55 AM
Cyber security
I have heard somewhat mixed reviews about this one. Currently I am using PureVPN and I have been for the past 3 years and as of now it is going great for me, No issues with the connection speeds and login issues. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/16/2016 | 9:36:50 AM
Cyber security
It is high time to take up the issue and secure our connection from being tracked by deplying reliable vpn server like PureVPN which offer great services at minimal costs. They have encrypted online connections which is good for security. 
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
Will This Be the Year of the Branded Cybercriminal?
Raveed Laeb, Product Manager at KELA,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Give us your best shot! You might win an Amazon gift card!
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3686
PUBLISHED: 2020-01-17
openQA before commit c172e8883d8f32fced5e02f9b6faaacc913df27b was vulnerable to XSS in the distri and version parameter. This was reported through the bug bounty program of Offensive Security
CVE-2019-3683
PUBLISHED: 2020-01-17
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and...
CVE-2019-3682
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2019-17361
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-19142
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.