Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

8/20/2018
02:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Surfshark Launches Lightweight VPN App for iOS Devices

The new app uses the latest encryption technology for speed, security, and longer battery life

Surfshark Ltd., a company developing Surfshark privacy protection software, announces the global release of its VPN application for iOS devices. The new app seeks to differentiate itself with its user interface, speed, and low energy consumption.

Surfshark iOS app is a VPN service based on an IKEv2 security protocol and AES-256-GCM encryption.

‘We’ve managed to create a VPN app as seamless as turning on Wi-Fi’, says Magnus Steinberg, Surfshark’s chief technology officer, ‘Many features such as IP address masking, Zero-Knowledge DNS, IPV6 leak and WebRTC protection are embedded in Surfshark by default.”

Surfshark is using AES-256-GCM encryption, which is different from a widespread AES-256-CBC. The main difference between these ciphers is speed. AES-256-GCM has a built-in authentication which makes encryption process much faster than using AES-256-CBC.

‘Our encryption method is a refined version of the industry standard. Combined with a progressive IKEv2 security protocol, it makes Surfshark noticeably faster than others. Also, our app is easy on phone’s battery. It is neatly coded, so it simply doesn’t drain the device’s power,’ explains Steinberg.

The no-frills Surfshark iOS app creates its protection layer using industry-leading encryption methods. All the internet traffic sent to and from iOS devices using Surfshark is strongly encrypted and protected from tracking or surveillance.

It is the only VPN app for iOS which allows unlimited simultaneous connections, meaning that one Surfshark subscription can be used to protect many devices.

Price of a Surfshark subscription starts at $3.95 per month. Its iOS app offers a 7-day free trial period and a 30-day money-back guarantee.

Surfshark iOS app can be downloaded from the App Store.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
APT Groups Set Sights on Linux Targets: Inside the Trend
Kelly Sheridan, Staff Editor, Dark Reading,  9/11/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9739
PUBLISHED: 2020-09-18
Adobe Media Encoder version 14.3.2 (and earlier versions) has an out-of-bounds read vulnerability that could be exploited to read past the end of an allocated buffer, possibly resulting in a crash or disclosure of sensitive information from other memory locations. User interaction is required to exp...
CVE-2020-9744
PUBLISHED: 2020-09-18
Adobe Media Encoder version 14.3.2 (and earlier versions) has an out-of-bounds read vulnerability that could be exploited to read past the end of an allocated buffer, possibly resulting in a crash or disclosure of sensitive information from other memory locations. User interaction is required to exp...
CVE-2020-9745
PUBLISHED: 2020-09-18
Adobe Media Encoder version 14.3.2 (and earlier versions) has an out-of-bounds read vulnerability that could be exploited to read past the end of an allocated buffer, possibly resulting in a crash or disclosure of sensitive information from other memory locations. User interaction is required to exp...
CVE-2020-0089
PUBLISHED: 2020-09-18
In the audio server, there is a missing permission check. This could lead to local escalation of privilege regarding audio settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137015603
CVE-2020-0262
PUBLISHED: 2020-09-18
In WiFi tethering, there is a possible attacker controlled intent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156353008