The strengths and weaknesses of different VPN protocols
This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT).
VPN history starts back in 1996, when a Microsoft employee started developing the Peer to Peer Tunneling Protocol (PPTP). In 1999, the specification was published.
Since then, VPN protocol technology has evolved and, at the moment, there are five widely used VPN protocols.
A breakdown of these five VPN protocols complete with their pros and cons is key to understanding VPN protocols in depth.
Top 5 Security News
‘Highly Critical’ Unpatched Zero-Day Flaw Discovered In Oracle WebLogic
DNS over HTTPS is coming whether ISPs and governments like it or not
‘Karkoff’ Is the New ‘DNSpionage’ With Selective Targeting Strategy
Source Code for CARBANAK Banking Malware Found On VirusTotal
Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network
Image by Stefan Coders from Pixabay